You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
During an AWS Inspector scan of our Lambda code that utilizes the cfn-response npm package, a CWE-117 vulnerability was detected. CWE-117 is a vulnerability related to improper input validation, which could lead to potential security risks and attacks, such as injection attacks and data manipulation.
Expected Behavior
The Lambda function should execute successfully without any security vulnerabilities detected by AWS Inspector.
Current Behavior
cfn-response.js package throws We detected that unsanitized user data is being written to the logs. Unsanitized data can inject malicious content. To increase the security of your code, sanitize your inputs before logging them. [Learn more](https://cwe.mitre.org/data/definitions/117.html)
Reproduction Steps
Steps to Reproduce:
Create an AWS Lambda function that uses the cfn-response npm package.
Deploy the Lambda function and associated CloudFormation template.
Trigger the Lambda function by invoking the CloudFormation stack it's a part of.
Review the Lambda Runtime code that uses the cfn-response package and ensure that proper input validation and handling practices are followed.
Conduct thorough testing to verify that the vulnerability has been addressed and that the Lambda function behaves as expected.
Additional Information/Context
No response
SDK version used
latest
Environment details (OS name and version, etc.)
lambda function with runtime node.js 14.x and AWS inspector
The text was updated successfully, but these errors were encountered:
Describe the bug
During an AWS Inspector scan of our Lambda code that utilizes the cfn-response npm package, a CWE-117 vulnerability was detected. CWE-117 is a vulnerability related to improper input validation, which could lead to potential security risks and attacks, such as injection attacks and data manipulation.
Expected Behavior
The Lambda function should execute successfully without any security vulnerabilities detected by AWS Inspector.
Current Behavior
cfn-response.js package throws We detected that unsanitized user data is being written to the logs. Unsanitized data can inject malicious content. To increase the security of your code, sanitize your inputs before logging them. [Learn
more](https://cwe.mitre.org/data/definitions/117.html)
Reproduction Steps
Steps to Reproduce:
Create an AWS Lambda function that uses the cfn-response npm package.
Deploy the Lambda function and associated CloudFormation template.
Trigger the Lambda function by invoking the CloudFormation stack it's a part of.
Possible Solution
Review the Lambda Runtime code that uses the cfn-response package and ensure that proper input validation and handling practices are followed.
Conduct thorough testing to verify that the vulnerability has been addressed and that the Lambda function behaves as expected.
Additional Information/Context
No response
SDK version used
latest
Environment details (OS name and version, etc.)
lambda function with runtime node.js 14.x and AWS inspector
The text was updated successfully, but these errors were encountered: