The application, a user or a role have more privileges than they require. This can be leveraged by an attacker to execute normally restricted actions on a system.
Execute actions that should be restricted to other groups or roles.
Explicitly assign permissions to the appropriate groups and roles following the principle of least privilege.
Authenticated attacker from the Internet with access to a misconfigured role.
⌚ 30 minutes.
Default score using CVSS 3.1. It may change depending on the context of the src.
Default score using CVSS 4.0. It may change depending on the context of the src.
To configure many AWS services,
you must pass an IAM role to the service.
This allows the service to later assume the role
and perform actions on your behalf.
By giving a role or user the
iam:PassRole
permission,
you are saying:
> this principal is allowed to assign AWS roles to resources
and services in this account.
You can limit which roles a user or service
can pass to others by specifying the role ARN(s)
in the Resource field of the policy
that grants them
iam:PassRole
:
{
"Effect": "Allow",
"Action": "iam:PassRole",
"Resource": [
"arn:aws:::123456789012:role/SomeRole"
"arn:aws:::123456789012:role/OtherRole"
]
}