Miggo Logo

CVE-2025-23206:
AWS Cloud Development Kit (AWS CDK) IAM OIDC custom resource allows connection to unauthorized OIDC provider

N/A

CVSS Score

Basic Information

EPSS Score
0.11601%
Published
1/17/2025
Updated
1/29/2025
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
aws-cdk-libnpm< 2.177.02.177.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the tls.connect call in the OIDC handler's certificate thumbprint retrieval process. The code explicitly sets rejectUnauthorized: false in the TLS connection options (visible in the provided code snippet from external.ts line 34), which disables certificate chain validation. This matches CWE-347 (Improper Verification of Cryptographic Signature) and the advisory's description. The commit diff references a security fix in this handler, and the patch adds a feature flag to control this parameter. The function is directly tied to the vulnerability's root cause described in all provided sources.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t Us*rs w*o us* I*M OI** *ustom r*sour** provi**r p**k*** will *ownlo** ** T*um*prints *s p*rt o* t** *ustom r*sour** work*low, *ttps://*it*u*.*om/*ws/*ws-**k/*lo*/****************************************/p**k***s/%***ws-**k/*ustom-r*sour**-

Reasoning

T** vuln*r**ility st*ms *rom t** `tls.*onn**t` **ll in t** OI** **n*l*r's **rti*i**t* t*um*print r*tri*v*l pro**ss. T** *o** *xpli*itly s*ts `r*j**tUn*ut*oriz**: **ls*` in t** TLS *onn**tion options (visi*l* in t** provi*** *o** snipp*t *rom `*xt*rn*