chore(deps): update dependency aws-cdk-lib to v2.187.0 [security]#91
Open
renovate[bot] wants to merge 1 commit intomasterfrom
Open
chore(deps): update dependency aws-cdk-lib to v2.187.0 [security]#91renovate[bot] wants to merge 1 commit intomasterfrom
renovate[bot] wants to merge 1 commit intomasterfrom
Conversation
Contributor
Author
Branch automerge failureThis PR was configured for branch automerge. However, this is not possible, so it has been raised as a PR instead.
|
c3b7db6 to
8bda2d5
Compare
7c3ad0f to
88eb8e3
Compare
3d3af31 to
571a4a5
Compare
c3e9657 to
039cea5
Compare
f16862f to
b83be3e
Compare
2069877 to
07623d3
Compare
07623d3 to
592a193
Compare
592a193 to
84e57ac
Compare
9e1bcc9 to
d602088
Compare
d602088 to
a1e5a63
Compare
a1e5a63 to
857012d
Compare
857012d to
a741619
Compare
a741619 to
a55d3e0
Compare
a55d3e0 to
68d1471
Compare
68d1471 to
42f30b4
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
2.76.0→2.187.02.87.0→2.187.0GitHub Vulnerability Alerts
CVE-2023-35165
If you are using the
eks.Clusteroreks.FargateClusterconstruct we need you to take action. Other users are not affected and can stop reading.Impact
The AWS Cloud Development Kit (CDK) allows for the definition of Amazon Elastic Container Service for Kubernetes (EKS) clusters.
eks.Clusterandeks.FargateClusterconstructs create two roles that have an overly permissive trust policy.The first, referred to as the CreationRole, is used by lambda handlers to create the cluster and deploy Kubernetes resources (e.g
KubernetesManifest,HelmChart, ...) onto it. Users with CDK version higher or equal to 1.62.0 (including v2 users) will be affected.The second, referred to as the default MastersRole, is provisioned only if the
mastersRoleproperty isn't provided and has permissions to executekubectlcommands on the cluster. Users with CDK version higher or equal to 1.57.0 (including v2 users) will be affected.Both these roles use the account root principal in their trust policy, which allows any identity in the account with the appropriate
sts:AssumeRolepermissions to assume it. For example, this can happen if another role in your account hassts:AssumeRolepermissions onResource: "*".CreationRole
Users with CDK version higher or equal to 1.62.0 (including v2 users). The role in question can be located in the IAM console. It will have the following name pattern:
*-ClusterCreationRole-*MastersRole
Users with CDK version higher or equal to 1.57.0 (including v2 users) that are not specifying the
mastersRoleproperty. The role in question can be located in the IAM console. It will have the following name pattern:*-MastersRole-*Patches
The issue has been fixed in versions v1.202.0, v2.80.0. We recommend you upgrade to a fixed version as soon as possible. See Managing Dependencies in the CDK Developer Guide for instructions on how to do this.
The new versions no longer use the account root principal. Instead, they restrict the trust policy to the specific roles of lambda handlers that need it. This introduces some breaking changes that might require you to perform code changes. Refer to https://github.com/aws/aws-cdk/issues/25674 for a detailed discussion of options.
Workarounds
CreationRole
There is no workaround available for CreationRole.
MastersRole
To avoid creating the default MastersRole, use the
mastersRoleproperty to explicitly provide a role. For example:References
https://github.com/aws/aws-cdk/issues/25674
If you have any questions or comments about this advisory we ask that you contact AWS/Amazon Security via our vulnerability reporting page or directly via email to aws-security@amazon.com. Please do not create a public GitHub issue.
CVE-2025-23206
Impact
Users who use IAM OIDC custom resource provider package will download CA Thumbprints as part of the custom resource workflow, https://github.com/aws/aws-cdk/blob/d16482fc8a4a3e1f62751f481b770c09034df7d2/packages/%40aws-cdk/custom-resource-handlers/lib/aws-iam/oidc-handler/external.ts#L34.
However, the current
tls.connectmethod will always setrejectUnauthorized: falsewhich is a potential security concern. CDK should follow the best practice and setrejectUnauthorized: true. However, this could be a breaking change for existing CDK applications and we should fix this with a feature flag.Note that this is marked as low severity Security advisory because the issuer url is provided by CDK users who define the CDK application. If they insist on connecting to a unauthorized OIDC provider, CDK should not disallow this. Additionally, the code block is run in a Lambda environment which mitigate the MITM attack.
As a best practice, CDK should still fix this issue under a feature flag to avoid regression.
Patches
The patch is in progress. To mitigate, upgrade to CDK v2.177.0 (Expected release date 2025-02-22).
Once upgraded, please make sure the feature flag '@aws-cdk/aws-iam:oidcRejectUnauthorizedConnections' is set to true in
cdk.context.jsonorcdk.json. More details on feature flag setting is here.Workarounds
N/A
References
https://github.com/aws/aws-cdk/issues/32920
GHSA-qq4x-c6h6-rfxh
Summary
The AWS Cloud Development Kit (CDK) is an open-source framework for defining cloud infrastructure using code. Customers use it to create their own applications which are converted to AWS CloudFormation templates during deployment to a customer’s AWS account. CDK contains pre-built components called "constructs" that are higher-level abstractions providing defaults and best practices. This approach enables developers to use familiar programming languages to define complex cloud infrastructure more efficiently than writing raw CloudFormation templates.
The CDK Cognito UserPool construct deploys an AWS cognito user pool. An Amazon Cognito user pool is a user directory for web and mobile app authentication and authorization. Customers can deploy a client under this user pool through construct ‘UserPoolClient’ or through helper method 'addClient'. A user pool client resource represents an Amazon Cognito user pool client which is a configuration within a user pool that interacts with one mobile or web application authenticating with Amazon Cognito.
When users of the 'cognito.UserPoolClient' construct generate a secret value for the application client in AWS CDK, they can then reference the generated secrets in their stack. The CDK had an issue where, when the custom resource performed an SDK API call to 'DescribeCognitoUserPoolClient' to retrieve the generated secret, the full response was logged in the associated lambda function's log group. Any user authenticated in the account where logs of the custom resource are accessible and who has read-only permission could view the secret written to those logs.
This issue does not affect customers who are generating the secret value outside of the CDK as the secret is not referenced or logged.
Impact
To leverage this issue, an actor has to be authenticated in the account where logs of the custom resource Custom::DescribeCognitoUserPoolClient are accessible and have read-only permission for lambda function logs.
Users can review access to their log group through AWS CloudTrail logs to detect any unexpected access to read the logs.
Impacted versions: >2.37.0 and <=2.187.0
Patches
The patches are included in the AWS CDK Library release v2.187.0. We recommend upgrading to the latest version and ensuring any forked or derivative code is patched to incorporate the new fixes. To fully address this issue, users should rotate the secret by generating a new secret stored in AWS Secrets Manager. References to the secret will use the new secret on update.
When new CDK applications using the latest version are initialized, they will use the new behavior with updated logging.
Existing applications must upgrade to the latest version, change the feature flag (@aws-cdk/cognito:logUserPoolClientSecretValue) to false, redeploy the application to apply this fix and use the new implementation with updated logging behavior.
Workarounds
Users can override the implementation changing Logging to be Logging.withDataHidden(). For example define class CustomUserPoolClient extends UserPoolClient and in the new class define get userPoolClientSecret() to use Logging.withDataHidden().
Example
References
If you have any questions or comments about this advisory please contact AWS/Amazon Security via our vulnerability reporting page or directly via email to aws-security@amazon.com. Please do not create a public GitHub issue.
Release Notes
aws/aws-cdk (aws-cdk-lib)
v2.187.0Compare Source
Features
NodegroupsupportnodeRepairConfig(#32626) (b9cb47c), closes #32562ValidationErrorsinstead of untyped Errors (#33912) (8b23b5d), closes #32569Bug Fixes
Alpha modules (2.187.0-alpha.0)
Features
placementGrouptoLaunchTemplatePropsandLaunchTemplate(#33726) (e5f71db), closes #33721SupportedRegionsproperty forAWS::EC2::VPCEndpointService(#33959) (0c77cb6)v2.186.0Compare Source
⚠ BREAKING CHANGES TO EXPERIMENTAL FEATURES
CfnWorkgroup.attrWorkgroupMaxCapacityattribute has been removed.CfnAnalysis.SheetTextBoxProperty.interactions,CfnDashboard.SheetTextBoxProperty.interactions, andCfnTemplate.SheetTextBoxProperty.interactionsproperties have been removed.CfnDistributionConfiguration.DistributionProperty.ssmParameterConfigurationsproperty has been removed.Features
ValidationErrorsinstead of untyped Errors (#33854) (f28eae2), closes #32569ValidationErrorsinstead of untyped Errors (#33853) (b6b91dd), closes #32569ValidationErrorsinstead of untyped Errors (#33855) (3ff5501), closes #32569ValidationErrorsinstead of untyped Errors (#33869) (5bc9292), closes #32569ValidationErrorsinstead of untyped Errors (#33870) (2dc5d70), closes #32569ValidationErrorsinstead of untyped Errors (#33871) (a9bae27), closes #32569ValidationErrorsinstead of untyped Errors (#33899) (0787840)ValidationErrorsinstead of untyped Errors (#33885) (6bf8095)Bug Fixes
ignoreErrorOnMissingContextparameter is misleading (#33875) (b3187b9)EventBus.grantPutEventsTocorrectly handles service principals (under feature flag) (#33729) (38d82c4), closes #22080 #22080Alpha modules (2.186.0-alpha.0)
Features
PrefixList.fromLookup()(#33619) (b6a15f3), closes aws/aws-cdk#33606 aws/aws-cdk#15115Bug Fixes
v2.185.0Compare Source
Features
ValidationErrorinstead of untyped Errors (#33753) (1fea9f1)Bug Fixes
Alpha modules (2.185.0-alpha.0)
⚠ BREAKING CHANGES TO EXPERIMENTAL FEATURES
KinesisDataFirehosePutRecordhas been renamed toFirehosePutRecord.Bug Fixes
KinesisDataFirehosePutRecordtoFirehosePutRecord(#33758) (e6f5bc8), closes #33757 #33798v2.184.1Compare Source
Reverts
Alpha modules (2.184.1-alpha.0)
v2.184.0Compare Source
Features
Bug Fixes
Alpha modules (2.184.0-alpha.0)
⚠ BREAKING CHANGES TO EXPERIMENTAL FEATURES
workflow.addconditionalTriggertoworkflow.addConditionalTrigger.Bug Fixes
v2.183.0Compare Source
Features
ValidationErrorinstead of untyped Errors (#33700) (d12854a), closes #32569RemovalPolicies.of(scope)(#32283) (34c547c)Bug Fixes
transitionToArchivePolicyis specified andthroughputModeisundefined(#33713) (842201c)Alpha modules (2.183.0-alpha.0)
⚠ BREAKING CHANGES TO EXPERIMENTAL FEATURES
InspectorStartAssessmentRuntarget's constructor now acceptsIAssessmentTemplateinstead ofCfnAssessmentTemplateas its parameter type. To migrate existing code, use theAssessmentTemplate.fromCfnAssessmentTemplate()method to convert yourCfnAssessmentTemplateinstances toIAssessmentTemplate.Features
Bug Fixes
Groupin favour ofScheduleGroup(#33678) (4d8eae9)v2.182.0Compare Source
Features
HealthChecksfor multiple health check types, including EBS and VPC_LATTICE types (#31286) (b3edd0d), closes #31289 /github.com/aws/aws-cdk/blob/main/packages/aws-cdk-lib/aws-autoscaling/lib/auto-scaling-group.ts#L233 /github.com/aws/aws-cdk/blob/main/packages/aws-cdk-lib/aws-autoscaling/lib/auto-scaling-group.ts#L2232-L2258 /github.com/aws/aws-cdk/pull/31286#discussion_r1740763781DatabaseClustersupportreplicationSourceIdentifier(#33471) (878ad54), closes #33280Bug Fixes
Alpha modules (2.182.0-alpha.0)
Features
Bug Fixes
v2.181.1Compare Source
Alpha modules (2.181.1-alpha.0)
⚠ BREAKING CHANGES TO EXPERIMENTAL FEATURES
IdentityPoolresources deployed in versions>=2.179.0will now fail to deploy. You will need to delete theIdentityPoolRoleAttachmentfrom your stack via the console before redeploying.Bug Fixes
v2.181.0Compare Source
Features
Bug Fixes
serviceTimeoutforCustomResourcedoes not work with token (#33541) (bc91c70), closes #33513 /github.com/go-to-k/aws-cdk/blob/75e52619cd09f363882ff62561a53cd5cd79ab30/packages/aws-cdk-lib/core/lib/custom-resource.ts#L169 /github.com/go-to-k/aws-cdk/blob/75e52619cd09f363882ff62561a53cd5cd79ab30/packages/aws-cdk-lib/core/lib/duration.ts#L332monitoringIntervalinDatabaseClusterPropsdoes not work with token (#33516) (f9b28b9), closes #33504SageMakerCreateTrainingJobadd sagemaker:AddTags permission (#32536) (3b07346), closes #32294Alpha modules (2.181.0-alpha.0)
Features
v2.180.0Compare Source
Features
ValidationErrorsinstead of untyped Errors (#33456) (6098816), closes #32569timeoutforManualApprovalAction(#33472) (7901f07), closes #33473Bug Fixes
DataProtectionPolicytemplate key must be PascalCase (#33462) (0379878), closes #33408 #26728Configuration
📅 Schedule: Branch creation - "" in timezone Europe/Oslo, Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about these updates again.
This PR was generated by Mend Renovate. View the repository job log.