Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Google fixes issue with CVSS 10 Gemini CLI CI RCE and cursor flaw that could allow code execution

U.S.-Europe fusion agreement extends Wendelstein 7-X research for another 10 years

Source: Anthropic could raise new $50 billion round at $900 billion valuation

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Patch after privilege escalation due to defective path traversal in Amazon EC2 SSM agent
Identity

Patch after privilege escalation due to defective path traversal in Amazon EC2 SSM agent

By April 8, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 8, 2025Ravi LakshmananCloud Security/Vulnerability

Amazon EC2 SSM Agent Fault

Cybersecurity researchers have revealed details of the currently patched security flaws in the Amazon EC2 Simple Systems Manager (SSM) agent.

The vulnerability makes an attacker likely to create directories in an unintended location on the file system, run arbitrary scripts with root privileges, and perform malicious activity by writing files to sensitive areas of the system, reports shared with Hacker News.

Cybersecurity

The Amazon SSM Agent is a component of Amazon Web Services (AWS) that allows administrators to remotely manage, configure, and execute commands on EC2 instances and on-premises servers.

The software processes commands and tasks defined in the SSM documentation. This includes one or more plugins. Each plug-in is responsible for performing certain tasks, such as running shell scripts and automating deployment and configuration-related activities.

Additionally, the SSM agent dynamically creates directories and files based on plugin specifications. It usually depends on the plugin ID as part of the directory structure. This introduces security risks in that inappropriate verification of these plugin IDs can lead to potential vulnerabilities.

Cymulate discovery is a path traversal flaw that results from inappropriate verification of plugin IDs, allowing attackers to manipulate the file system and execute arbitrary code with high privileges. This problem is rooted in a function named “ValidatePluginid” in Plaginutil.go.

“This function fails to properly sanitize inputs and allows attackers to provide malicious plug-in IDs that contain the path traversal sequence (../),” said security researcher Elad Beber.

Cybersecurity

As a result of this flaw, an attacker can essentially provide a specially created plugin ID when creating an SSM document (such as .././../../../../../../../../../../../../../../../../.. As a result of this flaw, an attacker can essentially provide a specially created plugin ID when creating an SSM document (such as .././../../../../../../../../../../../../../../../../../../.. The attacker can essentially provide a specially created plugin ID when creating an SSM document (such as .././../../../../../../../../../../../../../../../../../../../../.. The attacker can essentially provide a specially created plugin ID when creating an SSM document (such as .././../../../../../../../../../../../../../../../../../../../../../.. The attacker can essentially provide a specially created plugin ID when creating an SSM document (such as ../../../../../../../../../../../../../../../../../../../../../../../.. The attacker can essentially provide a specially created plugin ID when creating an SSM document (such as ../../../../../../../

Following the responsible disclosure on February 12, 2025, the vulnerability was addressed on March 5, 2025 with the release of Amazon SSM Agent version 3.3.1957.0.

According to release notes shared by GitHub project maintainers, “We will use the buildsafepath method by adding and using it to prevent path traversal within the orchestration directory.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleNonprofits use AI agents to raise funds for charity
Next Article Does Colossal Biosciences’ miserable wolf creation justify a valuation of over $10 billion?

Related Posts

Google fixes issue with CVSS 10 Gemini CLI CI RCE and cursor flaw that could allow code execution

April 30, 2026

SAP-related npm packages compromised in supply chain attack that steals credentials

April 29, 2026

New wave of North Korean attacks using AI-embedded npm malware, fake companies, and RATs

April 29, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Google fixes issue with CVSS 10 Gemini CLI CI RCE and cursor flaw that could allow code execution

U.S.-Europe fusion agreement extends Wendelstein 7-X research for another 10 years

Source: Anthropic could raise new $50 billion round at $900 billion valuation

Elon Musk can’t escape his own tweets on stage

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.