| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/awslabs/aws-sdk-swift | swift | < 1.5.79 | 1.5.79 |
The vulnerability advisory stated that a defense-in-depth enhancement was added to validate the region parameter. The patched version was specified as 1.5.79. By comparing the git tags of the awslabs/aws-sdk-swift repository for version 1.5.78 (last vulnerable) and 1.5.79 (first patched), I located the specific commit 382974ea0f68841caa9742790b89c3e27c83aeb3 which introduced the fix. The commit message, "fix: Add region validation to endpoint resolver middleware", clearly indicates its purpose. The code changes are confined to Sources/Core/AWSClientRuntime/Sources/AWSClientRuntime/Endpoints/EndpointResolverMiddleware.swift. The patch adds a new isValidRegion function and, more importantly, modifies the apply function in AWSEndpointResolverMiddleware to use this validation. The vulnerability existed because the apply function previously used the region value without checking if it was a valid host label. Therefore, AWSEndpointResolverMiddleware.apply is the function that would appear in a runtime profile when the vulnerability is triggered, as it's the function that processes the malicious input.
AWSEndpointResolverMiddleware.applySources/Core/AWSClientRuntime/Sources/AWSClientRuntime/Endpoints/EndpointResolverMiddleware.swift
A Semantic Attack on Google Gemini - Read the Latest Research