-
Notifications
You must be signed in to change notification settings - Fork 170
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Local user who can assume an admin role not in graph #114
Comments
Hello @Kamerabuilt , First look, I'm guessing it's the Please confirm the following:
|
|
Added a fix in |
Can I test the 1.2.0-dev (if so how)? Is there a way to display the current version of PMapper? |
Sure can! Just clone the repo and checkout the |
Nice work! Looks like its fixed :) |
…dential_exfiltration Updated EC2 credential exfiltration description for new bypass
I created a local IAM user, with the following policy:
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": "sts:AssumeRole",
"Resource": "arn:aws:iam::000000000000:role/Admin-Role"
}
]
}
The "Admin-Role" has an Administrator policy attached, and the following Trust-policy:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::000000000000:root"
},
"Action": "sts:AssumeRole",
"Condition": {
"Bool": {
"aws:MultiFactorAuthPresent": "true"
}
}
}
]
}
When generating an svg with pmapper --account 000000000000 visualize, the produced image does not include any links or arrows between that local IAM user, and the Admin-Role.
If you need further info, please let me know.
The text was updated successfully, but these errors were encountered: