Skip to content

Latest commit

 

History

History
12 lines (6 loc) · 774 Bytes

File metadata and controls

12 lines (6 loc) · 774 Bytes

InjectMyServerlessEvent

Logo

A sample AWS Lambda code that contains a Serverless Event Injection vulnerability (OS injection).

To run this, you need to give it an execution role (doesn't need any particular permision), then create a cloudwatch rule that sends S3 bucket level event PutBucketPolicy to this serverless function.

This should run on Lambda python 3.8. The only thing it needs to run is a configured cloudwatch rule. To make sure your cloudwatch rules trigger correctly, create an empty CloudTrail Trail.

You will need to make modifications to a particular element in an S3 bucket's policy to trigger the vulnerability, can you tell which element?