File upload to RCE
Verify file upload
List Buckets
Upload file
List files in bucket
Download file
Exploit
We attempt to retrieve the Lambda environment and reveal the role Access Key. The output might be reflected in the uploaded file, another file in the same bucket or a log file.
Malicious filenames
Malicious script
This script executes a command and stores the output in a S3 bucket controlled by the attacker
Last updated