Sponsored By

Cloud Security; A StudyCloud Security; A Study

German researchers find potential vulnerabilities.

Gary Audin

January 6, 2012

3 Min Read
No Jitter logo in a gray background | No Jitter

German researchers find potential vulnerabilities.

A group of German researchers from Ruhr-University Bochum, NEC Europe, and Cologne University found holes in Amazon Web Services' (AWS) cloud architecture that allowed hackers to become administrators and then access user data, according to a paper published by the researchers. AWS was informed of the flaws and has fixed them.

The ongoing issue is that similar flaws may exist in other cloud architectures. Not only are public clouds at risk, those enterprises planning or operating private clouds are at risk as well. The potential danger for private cloud may be greater because of the dependence on cloud products that may not have the same level support as found at AWS.

The researches have published a paper, "All Your Clouds are Belong to us--Security Analysis of Cloud Management Interfaces". The paper was published by the Association of Computing Machinery (ACM). The paper focuses on Amazon's EC2 and S3 control interfaces; it does not analyze other cloud services or products. It discussed the attacks performed, the vulnerability analysis, attack prerequisites, attack rationale, and assessment. The paper even provides an attack scenario for Twitter that demonstrates that many high profile and popular applications that use AWS were susceptible to these attacks. The paper has a long list of useful references to support its conclusions.

The paper is highly technical in content. For most readers of NoJitter, the content may appear to be beyond their interest. However, since many enterprises have moved applications to the cloud or are considering a private cloud, the content and conclusions are very relevant.

When I performed my survey of cloud based communications providers, Cloud/Hosted Communications Providers: Survey Results, I located more than one provider that uses the Amazon EC2 as their platform to deliver their communications features and functions. This means that the enterprise should be aware of this class of vulnerabilities and discuss them with their cloud communications service provider.

The researchers used a technique called "signature wrapping". XML signature wrapping is defined at WS-Attacks.org as follows:

"Web services offer designers enormous flexibility when it comes to employing integrity features. Usually in order to guarantee message integrity, certain predefined parts of the SOAP [Simple Object Oriented Protocol] message get signed. Let's assume that a web service client sends a signed message to the receiving web service. Ideally any malicious modification of the signed data is detected by the receiving web service unless the attacker is able to break the signature algorithm itself. However, when executing a XML Signature Wrapping attack, an attacker is able to change the content of the signed part without invalidating the signature."

The control interfaces can then be compromised with signature wrapping. The result of signature wrapping is that the party that has gained administrative access can create, change, and delete user data while appearing to be legitimate.

A second form of attack was analyzed that deals with browser based front ends. Cross Site Scripting (XSS) allows an attacker to perform an automated attack that steals user names and passwords from AWS.

This paper demonstrates that as complexity increases in the cloud so do vulnerabilities. Control interfaces have become very attractive targets. Fortunately, the paper also provides a number of countermeasures that can be employed by the cloud architects, designers and operators, whether the cloud is public or private.

About the Author

Gary Audin

Gary Audin is the President of Delphi, Inc. He has more than 40 years of computer, communications and security experience. He has planned, designed, specified, implemented and operated data, LAN and telephone networks. These have included local area, national and international networks as well as VoIP and IP convergent networks in the U.S., Canada, Europe, Australia, Asia and Caribbean. He has advised domestic and international venture capital and investment bankers in communications, VoIP, and microprocessor technologies.

For 30+ years, Gary has been an independent communications and security consultant. Beginning his career in the USAF as an R&D officer in military intelligence and data communications, Gary was decorated for his accomplishments in these areas.

Mr. Audin has been published extensively in the Business Communications Review, ACUTA Journal, Computer Weekly, Telecom Reseller, Data Communications Magazine, Infosystems, Computerworld, Computer Business News, Auerbach Publications and other magazines. He has been Keynote speaker at many user conferences and delivered many webcasts on VoIP and IP communications technologies from 2004 through 2009. He is a founder of the ANSI X.9 committee, a senior member of the IEEE, and is on the steering committee for the VoiceCon conference. Most of his articles can be found on www.webtorials.com and www.acuta.org. In addition to www.nojitter.com, he publishes technical tips at www.Searchvoip.com.