Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

The world is being held hostage by its reliance on oil. How can we break free from the fossil fuel?

Researchers trick Perplexity’s Comet AI browser into phishing scam in under 4 minutes

Meta didn’t buy Moltbook for bots, they bought Agent Web

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Patch after privilege escalation due to defective path traversal in Amazon EC2 SSM agent
Identity

Patch after privilege escalation due to defective path traversal in Amazon EC2 SSM agent

userBy userApril 8, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 8, 2025Ravi LakshmananCloud Security/Vulnerability

Amazon EC2 SSM Agent Fault

Cybersecurity researchers have revealed details of the currently patched security flaws in the Amazon EC2 Simple Systems Manager (SSM) agent.

The vulnerability makes an attacker likely to create directories in an unintended location on the file system, run arbitrary scripts with root privileges, and perform malicious activity by writing files to sensitive areas of the system, reports shared with Hacker News.

Cybersecurity

The Amazon SSM Agent is a component of Amazon Web Services (AWS) that allows administrators to remotely manage, configure, and execute commands on EC2 instances and on-premises servers.

The software processes commands and tasks defined in the SSM documentation. This includes one or more plugins. Each plug-in is responsible for performing certain tasks, such as running shell scripts and automating deployment and configuration-related activities.

Additionally, the SSM agent dynamically creates directories and files based on plugin specifications. It usually depends on the plugin ID as part of the directory structure. This introduces security risks in that inappropriate verification of these plugin IDs can lead to potential vulnerabilities.

Cymulate discovery is a path traversal flaw that results from inappropriate verification of plugin IDs, allowing attackers to manipulate the file system and execute arbitrary code with high privileges. This problem is rooted in a function named “ValidatePluginid” in Plaginutil.go.

“This function fails to properly sanitize inputs and allows attackers to provide malicious plug-in IDs that contain the path traversal sequence (../),” said security researcher Elad Beber.

Cybersecurity

As a result of this flaw, an attacker can essentially provide a specially created plugin ID when creating an SSM document (such as .././../../../../../../../../../../../../../../../../.. As a result of this flaw, an attacker can essentially provide a specially created plugin ID when creating an SSM document (such as .././../../../../../../../../../../../../../../../../../../.. The attacker can essentially provide a specially created plugin ID when creating an SSM document (such as .././../../../../../../../../../../../../../../../../../../../../.. The attacker can essentially provide a specially created plugin ID when creating an SSM document (such as .././../../../../../../../../../../../../../../../../../../../../../.. The attacker can essentially provide a specially created plugin ID when creating an SSM document (such as ../../../../../../../../../../../../../../../../../../../../../../../.. The attacker can essentially provide a specially created plugin ID when creating an SSM document (such as ../../../../../../../

Following the responsible disclosure on February 12, 2025, the vulnerability was addressed on March 5, 2025 with the release of Amazon SSM Agent version 3.3.1957.0.

According to release notes shared by GitHub project maintainers, “We will use the buildsafepath method by adding and using it to prevent path traversal within the orchestration directory.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleNonprofits use AI agents to raise funds for charity
Next Article Does Colossal Biosciences’ miserable wolf creation justify a valuation of over $10 billion?
user
  • Website

Related Posts

Researchers trick Perplexity’s Comet AI browser into phishing scam in under 4 minutes

March 11, 2026

Critical flaw in n8n could allow remote code execution and disclosure of stored credentials

March 11, 2026

Meta disables 150,000 accounts linked to Southeast Asia fraud center in global crackdown

March 11, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

The world is being held hostage by its reliance on oil. How can we break free from the fossil fuel?

Researchers trick Perplexity’s Comet AI browser into phishing scam in under 4 minutes

Meta didn’t buy Moltbook for bots, they bought Agent Web

Critical flaw in n8n could allow remote code execution and disclosure of stored credentials

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.