AWS Addresses Critical ‘FlowFixation’ Vulnerability in Airflow Service to Prevent Session Hijacking


Cybersecurity experts have recently disclosed a significant, now-resolved vulnerability in Amazon Web Services (AWS) Managed Workflows for Apache Airflow (MWAA) that could have enabled attackers to hijack user sessions and execute remote code on affected instances. This vulnerability, coined FlowFixation by the cybersecurity firm Tenable, poses alarming implications for AWS users reliant on this service.

The incident allows malicious actors, if they had successfully compromised a victim’s account, to undertake unauthorized actions such as accessing connection strings, modifying configurations, and executing directed acyclic graphs (DAGs). Liv Matan, a senior security researcher at Tenable, emphasized that under particular circumstances, such maneuvers could lead to remote code execution (RCE) on the underlying MWAA instances, facilitating lateral movement across additional services.

Investigations indicate that the root cause of the vulnerability is twofold: session fixation associated with the AWS MWAA web management panel and a misconfiguration of AWS domains leading to cross-site scripting (XSS) vulnerabilities. Session fixation is a known web attack technique where an attacker tricks a user into using a pre-established session identifier, thus allowing unauthorized access to the authenticated session.

Exploiting this configuration flaw, an adversary could have compelled victims to authenticate using the attacker’s known session, thereby seizing control of the victim’s management panel for MWAA. Matan pointed out that the FlowFixation vulnerability highlights a deeper issue surrounding the architecture of cloud service providers’ domains, particularly concerning the Public Suffix List (PSL) and shared-parent domains, which can lead to same-site attacks. The implications of this misconfiguration extend beyond AWS, also affecting platforms like Microsoft Azure and Google Cloud.

Tenable has noted that the shared architecture involved, wherein multiple customers use identical parent domains, poses substantial risks. Attackers can exploit vulnerabilities such as same-site attacks, cross-origin issues, and cookie tossing, resulting in unauthorized access, data breaches, and potential code execution.

AWS and Azure took prompt action by adding the identified misconfigured domains to the PSL, a move that helps web browsers recognize these domains correctly. However, Google Cloud has classified the issue as not severe enough to warrant a similar fix, raising concerns among security professionals about how significant vulnerabilities may be overlooked in cloud environments.

The implications for organizations are alarming, particularly in light of the increased risk posed by same-site attacks within cloud infrastructures. Notably, cookie-tossing attacks and violations of cookie protection algorithms represent significant threats, as they can bypass Cross-Site Request Forgery (CSRF) protections and interact dangerously with session fixation vulnerabilities.

As businesses increasingly rely on cloud solutions, the prominence of such vulnerabilities accentuates the essential need for robust cybersecurity measures. Organizations should remain vigilant, assess their security postures, and consider how the MITRE ATT&CK framework can aid in identifying potential adversary tactics, such as initial access and privilege escalation, that could be leveraged in such attacks. The cybersecurity landscape continues to evolve, underscoring the necessity for proactive security strategies to mitigate these emerging risks.


This revision maintains a technical and authoritative tone appropriate for a US-based, tech-savvy professional audience while successfully incorporating key elements from the original article.

Source link