logo

Database

Aws Public Queue

Description

Detects Amazon SQS queues that are configured with overly permissive access policies that allow public access. A publicly accessible queue poses a security risk as it could allow any AWS user to send or receive messages, potentially exposing sensitive data or enabling denial of service attacks.

Weakness:

325 - Excessive privileges - Wildcards

Category: Access Subversion

Detection Strategy

    Scans all SQS queues in the specified AWS region

    Examines each queue's resource policy for statements that have Effect: Allow

    Checks if the Principal is set to '*' or {'AWS': '*'} indicating public access

    Verifies there are no Condition elements that would restrict the access

    Reports a vulnerability if any queue policy grants unrestricted public access

Severity v4.0

0.5

Low

Method ID

CSPM-3WUW3

Technique

CSPM

Target

AWS

Technology

SQS

CWE ID(s)

CWE-250