Skip to content

Conversation

@AI-redteam
Copy link
Contributor

AWS MWAA Execution Role Vulnerability:

    • MWAA requires wildcard account ID in SQS permissions (arn:aws:sqs::airflow-celery-) - cannot be fixed without breaking the service
  • -Allows any DAG to send data to external SQS queues in any AWS account
    • Enables data exfiltration, C2 channels, and cross-account attacks
    • Bypasses all network controls - works even in private VPCs via AWS internal APIs
    • Architectural flaw in AWS's official documentation with no mitigation available

Document the security risks and attack vectors associated with AWS MWAA's execution role, including data exfiltration and command and control channels.
fix location and structure
Clarified the process of tightening the policy after deployment and the implications for defenders.
Updated README to reflect the AWS MWAA execution role vulnerability and its implications for security, including detailed attack vectors
Clarified that all Airflow DAGs run with the execution role's permissions.
@carlospolop carlospolop merged commit a41bcbc into HackTricks-wiki:master Oct 23, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants