DEV Community

CVE Reports
CVE Reports

Posted on • Originally published at cvereports.com

GHSA-443W-3RQ3-5M5H: GHSA-443w-3rq3-5m5h: Policy Injection via Improper Input Escaping in AWS SDK for Java v2 CloudFront Utilities

GHSA-443w-3rq3-5m5h: Policy Injection via Improper Input Escaping in AWS SDK for Java v2 CloudFront Utilities

Vulnerability ID: GHSA-443W-3RQ3-5M5H
CVSS Score: 4.0
Published: 2026-03-27

The AWS SDK for Java v2 (versions 2.18.33 through 2.41.29) contains a vulnerability within the CloudFront utilities module. Improper neutralization of special characters allows attackers to manipulate JSON policy documents, potentially granting unauthorized access to CloudFront-protected resources by bypassing intended constraints.

TL;DR

Improper escaping of double quotes in the AWS SDK for Java v2 CloudFront utilities allows attackers to inject arbitrary JSON conditions into signed URL policies, enabling authorization bypass.


⚠️ Exploit Status: POC

Technical Details

  • Vulnerability Type: Improper Neutralization of Special Elements (Injection)
  • CWE IDs: CWE-74, CWE-20, CWE-707
  • CVSS v4 Score: 4.0 (Medium)
  • Attack Vector: Network
  • Privileges Required: None
  • Subsequent Impact: High (Confidentiality)
  • Affected Package: software.amazon.awssdk:cloudfront

Affected Systems

  • AWS SDK for Java v2 (software.amazon.awssdk:cloudfront module)
  • software.amazon.awssdk:cloudfront: >= 2.18.33, <= 2.41.29 (Fixed in: 2.41.30)

Mitigation Strategies

  • Update AWS SDK for Java v2 to version 2.41.30 or later.
  • Implement strict allow-list validation for user inputs used in CloudFront resource paths.
  • Reject HTTP requests containing unescaped double quotes or backslashes in parameters intended for policy generation.
  • Monitor CloudFront access logs for anomalous URL patterns and injected JSON structures.

Remediation Steps:

  1. Identify all projects utilizing the software.amazon.awssdk:cloudfront dependency.
  2. Update the dependency version in the project build configuration (pom.xml or build.gradle) to 2.41.30 or higher.
  3. Recompile and run unit tests to ensure compatibility with the updated SDK.
  4. Deploy the updated application to production environments.
  5. Audit application logic to verify that defense-in-depth input validation is applied to all user-controllable data interacting with the SDK.

References


Read the full report for GHSA-443W-3RQ3-5M5H on our website for more details including interactive diagrams and full exploit analysis.

Top comments (0)