GitBook: [#3338] No subject

This commit is contained in:
CPol 2022-07-27 16:14:43 +00:00 committed by gitbook-bot
parent 86a43a8bc0
commit 9fd4c3d000
No known key found for this signature in database
GPG Key ID: 07D2180C7B12D0FF

View File

@ -128,7 +128,7 @@ The **name** of the **interesting env variables** are:
* `AWS_SECRET_ACCESS_KEY`
* `AWS_ACCES_KEY_ID`
Moreover, in addition to IAM credentials, Lambda functions also have **event data that is passed to the function when it is started**. This data is made available to the function via the [runtime interface](https://docs.aws.amazon.com/lambda/latest/dg/runtimes-api.html). Unlike IAM credentials, this data is accessible over standard SSRF at `http://localhost:9001/2018-06-01/runtime/invocation/next`.
Moreover, in addition to IAM credentials, Lambda functions also have **event data that is passed to the function when it is started**. This data is made available to the function via the [runtime interface](https://docs.aws.amazon.com/lambda/latest/dg/runtimes-api.html). Unlike IAM credentials, this data is accessible over standard SSRF at **`http://localhost:9001/2018-06-01/runtime/invocation/next`**.
{% hint style="warning" %}
Note that **lambda credentials** are inside the **env variables**. So if the **stack trace** of the lambda code prints env vars, it's possible to **exfiltrate them provoking an error** in the app.