Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io

Made with 💙 by Wiz

Last Updated: April 3, 2025

Cloud Threat Landscape
/Incidents
Incidents
/
AWS CodeBuild Vulnerability Allows Build Process Secrets Extraction

AWS CodeBuild Vulnerability Allows Build Process Secrets Extraction

Type
Research
Actors
❓Unknown
Pub. date
July 23, 2025
Initial access
Supply chain vector
Impact
Data exfiltration
Observed techniques
Malicious pull request submissionVulnerability exploitationCredential theft
Targeted technologies
GitHubAWS Codebuild
References
https://archive.md/JPjuk#selection-547.0-727.104
Status
Finalized
Last edited
Aug 5, 2025 9:03 AM

The vulnerability in AWS CodeBuild arises when a source code repository is configured to trigger builds based on pull requests or other actions from untrusted contributors. In such cases, an attacker can submit a pull request containing arbitrary code, which is then executed in the build environment. This allows the attacker to dump the environment's memory and extract sensitive secrets, such as credentials. A similar memory-dumping technique was previously observed in a supply chain attack involving GitHub Actions and the tj-actions/changed-files workflow.

In this incident, the attacker used the vulnerability to obtain credentials from a CodeBuild environment and leveraged them to inject malicious code into the Amazon Q Developer Extension for Visual Studio. Although the code failed to execute as intended, it was designed to delete all files on systems where the extension was installed. Users of the Amazon Q extension should ensure they are using version 1.85.0 or later, which removes the malicious code and addresses the issue.