March 21, 2024, midnight |

The Open Cloud Vulnerability & Security Issue Database www.cloudvulndb.org

A flaw in Amazon Managed Workflows for Apache Airflow (MWAA) could have allowed potential session hijacking and remote code execution.
The issue stemmed from a combination of session fixation in the MWAA web management panel and an AWS domain configuration error leading
to a cross-site scripting (XSS) attack. Attackers exploiting this could manipulate victims' configurations, trigger workflows, and
potentially move laterally to other services within the cloud environment. The exploit of this bug involved deploying malicious code
via an Amazon …

airflow amazon apache attack attackers aws code code execution configuration cross-site domain error exploiting flaw hijacking issue managed management panel remote code remote code execution scripting session session hijacking trigger web web management workflows xss

Sr. Product Manager

@ MixMode | Remote, US

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Vulnerability Research and Reverse Engineer (Onsite)

@ SNC-Lavalin | FL711: Raytheon SI Gov Dixie Hwy 3520 Dixie Highway NE , Palm Bay, FL, 32905 USA

Principal Consultant, Offensive Security

@ Kroll | CDMX, Mexico