-
Notifications
You must be signed in to change notification settings - Fork 2
chore(deps): update dependency aws-cdk-lib to v2.187.0 [security] #64
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
renovate
wants to merge
1
commit into
master
Choose a base branch
from
renovate/npm-aws-cdk-lib-vulnerability
base: master
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Contributor
Author
Branch automerge failureThis PR was configured for branch automerge. However, this is not possible, so it has been raised as a PR instead.
|
9cf029d to
8130f23
Compare
8130f23 to
92c20ae
Compare
92c20ae to
06df20a
Compare
06df20a to
dd39a2c
Compare
dd39a2c to
866b8d9
Compare
866b8d9 to
7a8c1e2
Compare
55b5840 to
1dd5e21
Compare
1dd5e21 to
94274aa
Compare
94274aa to
af71463
Compare
af71463 to
c663c59
Compare
18734f1 to
e6654a3
Compare
e6654a3 to
b557723
Compare
b557723 to
182ffbb
Compare
68e8dff to
3bc9ac9
Compare
3bc9ac9 to
af75372
Compare
4555046 to
ab5f8ff
Compare
33c546f to
a9eb715
Compare
a9eb715 to
cd010dc
Compare
7491fe5 to
5e5e867
Compare
62825aa to
bf17d76
Compare
5756b7d to
089a7dd
Compare
089a7dd to
3869199
Compare
3869199 to
3087e2f
Compare
3087e2f to
15850c1
Compare
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
2.84.0→2.187.0GitHub Vulnerability Alerts
CVE-2025-23206
Impact
Users who use IAM OIDC custom resource provider package will download CA Thumbprints as part of the custom resource workflow, https://github.com/aws/aws-cdk/blob/d16482fc8a4a3e1f62751f481b770c09034df7d2/packages/%40aws-cdk/custom-resource-handlers/lib/aws-iam/oidc-handler/external.ts#L34.
However, the current
tls.connectmethod will always setrejectUnauthorized: falsewhich is a potential security concern. CDK should follow the best practice and setrejectUnauthorized: true. However, this could be a breaking change for existing CDK applications and we should fix this with a feature flag.Note that this is marked as low severity Security advisory because the issuer url is provided by CDK users who define the CDK application. If they insist on connecting to a unauthorized OIDC provider, CDK should not disallow this. Additionally, the code block is run in a Lambda environment which mitigate the MITM attack.
As a best practice, CDK should still fix this issue under a feature flag to avoid regression.
Patches
The patch is in progress. To mitigate, upgrade to CDK v2.177.0 (Expected release date 2025-02-22).
Once upgraded, please make sure the feature flag '@aws-cdk/aws-iam:oidcRejectUnauthorizedConnections' is set to true in
cdk.context.jsonorcdk.json. More details on feature flag setting is here.Workarounds
N/A
References
https://github.com/aws/aws-cdk/issues/32920
GHSA-qq4x-c6h6-rfxh
Summary
The AWS Cloud Development Kit (CDK) is an open-source framework for defining cloud infrastructure using code. Customers use it to create their own applications which are converted to AWS CloudFormation templates during deployment to a customer’s AWS account. CDK contains pre-built components called "constructs" that are higher-level abstractions providing defaults and best practices. This approach enables developers to use familiar programming languages to define complex cloud infrastructure more efficiently than writing raw CloudFormation templates.
The CDK Cognito UserPool construct deploys an AWS cognito user pool. An Amazon Cognito user pool is a user directory for web and mobile app authentication and authorization. Customers can deploy a client under this user pool through construct ‘UserPoolClient’ or through helper method 'addClient'. A user pool client resource represents an Amazon Cognito user pool client which is a configuration within a user pool that interacts with one mobile or web application authenticating with Amazon Cognito.
When users of the 'cognito.UserPoolClient' construct generate a secret value for the application client in AWS CDK, they can then reference the generated secrets in their stack. The CDK had an issue where, when the custom resource performed an SDK API call to 'DescribeCognitoUserPoolClient' to retrieve the generated secret, the full response was logged in the associated lambda function's log group. Any user authenticated in the account where logs of the custom resource are accessible and who has read-only permission could view the secret written to those logs.
This issue does not affect customers who are generating the secret value outside of the CDK as the secret is not referenced or logged.
Impact
To leverage this issue, an actor has to be authenticated in the account where logs of the custom resource Custom::DescribeCognitoUserPoolClient are accessible and have read-only permission for lambda function logs.
Users can review access to their log group through AWS CloudTrail logs to detect any unexpected access to read the logs.
Impacted versions: >2.37.0 and <=2.187.0
Patches
The patches are included in the AWS CDK Library release v2.187.0. We recommend upgrading to the latest version and ensuring any forked or derivative code is patched to incorporate the new fixes. To fully address this issue, users should rotate the secret by generating a new secret stored in AWS Secrets Manager. References to the secret will use the new secret on update.
When new CDK applications using the latest version are initialized, they will use the new behavior with updated logging.
Existing applications must upgrade to the latest version, change the feature flag (@aws-cdk/cognito:logUserPoolClientSecretValue) to false, redeploy the application to apply this fix and use the new implementation with updated logging behavior.
Workarounds
Users can override the implementation changing Logging to be Logging.withDataHidden(). For example define class CustomUserPoolClient extends UserPoolClient and in the new class define get userPoolClientSecret() to use Logging.withDataHidden().
Example
References
If you have any questions or comments about this advisory please contact AWS/Amazon Security via our vulnerability reporting page or directly via email to aws-security@amazon.com. Please do not create a public GitHub issue.
Release Notes
aws/aws-cdk (aws-cdk-lib)
v2.187.0Compare Source
Features
NodegroupsupportnodeRepairConfig(#32626) (b9cb47c), closes #32562ValidationErrorsinstead of untyped Errors (#33912) (8b23b5d), closes #32569Bug Fixes
Alpha modules (2.187.0-alpha.0)
Features
placementGrouptoLaunchTemplatePropsandLaunchTemplate(#33726) (e5f71db), closes #33721SupportedRegionsproperty forAWS::EC2::VPCEndpointService(#33959) (0c77cb6)v2.186.0Compare Source
⚠ BREAKING CHANGES TO EXPERIMENTAL FEATURES
CfnWorkgroup.attrWorkgroupMaxCapacityattribute has been removed.CfnAnalysis.SheetTextBoxProperty.interactions,CfnDashboard.SheetTextBoxProperty.interactions, andCfnTemplate.SheetTextBoxProperty.interactionsproperties have been removed.CfnDistributionConfiguration.DistributionProperty.ssmParameterConfigurationsproperty has been removed.Features
ValidationErrorsinstead of untyped Errors (#33854) (f28eae2), closes #32569ValidationErrorsinstead of untyped Errors (#33853) (b6b91dd), closes #32569ValidationErrorsinstead of untyped Errors (#33855) (3ff5501), closes #32569ValidationErrorsinstead of untyped Errors (#33869) (5bc9292), closes #32569ValidationErrorsinstead of untyped Errors (#33870) (2dc5d70), closes #32569ValidationErrorsinstead of untyped Errors (#33871) (a9bae27), closes #32569ValidationErrorsinstead of untyped Errors (#33899) (0787840)ValidationErrorsinstead of untyped Errors (#33885) (6bf8095)Bug Fixes
ignoreErrorOnMissingContextparameter is misleading (#33875) (b3187b9)EventBus.grantPutEventsTocorrectly handles service principals (under feature flag) (#33729) (38d82c4), closes #22080 #22080Alpha modules (2.186.0-alpha.0)
Features
PrefixList.fromLookup()(#33619) (b6a15f3), closes aws/aws-cdk#33606 aws/aws-cdk#15115Bug Fixes
v2.185.0Compare Source
Features
ValidationErrorinstead of untyped Errors (#33753) (1fea9f1)Bug Fixes
Alpha modules (2.185.0-alpha.0)
⚠ BREAKING CHANGES TO EXPERIMENTAL FEATURES
KinesisDataFirehosePutRecordhas been renamed toFirehosePutRecord.Bug Fixes
KinesisDataFirehosePutRecordtoFirehosePutRecord(#33758) (e6f5bc8), closes #33757 #33798v2.184.1Compare Source
Reverts
Alpha modules (2.184.1-alpha.0)
v2.184.0Compare Source
Features
Bug Fixes
Alpha modules (2.184.0-alpha.0)
⚠ BREAKING CHANGES TO EXPERIMENTAL FEATURES
workflow.addconditionalTriggertoworkflow.addConditionalTrigger.Bug Fixes
v2.183.0Compare Source
Features
ValidationErrorinstead of untyped Errors (#33700) (d12854a), closes #32569RemovalPolicies.of(scope)(#32283) (34c547c)Bug Fixes
transitionToArchivePolicyis specified andthroughputModeisundefined(#33713) (842201c)Alpha modules (2.183.0-alpha.0)
⚠ BREAKING CHANGES TO EXPERIMENTAL FEATURES
InspectorStartAssessmentRuntarget's constructor now acceptsIAssessmentTemplateinstead ofCfnAssessmentTemplateas its parameter type. To migrate existing code, use theAssessmentTemplate.fromCfnAssessmentTemplate()method to convert yourCfnAssessmentTemplateinstances toIAssessmentTemplate.Features
Bug Fixes
Groupin favour ofScheduleGroup(#33678) (4d8eae9)v2.182.0Compare Source
Features
HealthChecksfor multiple health check types, including EBS and VPC_LATTICE types (#31286) (b3edd0d), closes #31289 /github.com/aws/aws-cdk/blob/main/packages/aws-cdk-lib/aws-autoscaling/lib/auto-scaling-group.ts#L233 /github.com/aws/aws-cdk/blob/main/packages/aws-cdk-lib/aws-autoscaling/lib/auto-scaling-group.ts#L2232-L2258 /github.com/aws/aws-cdk/pull/31286#discussion_r1740763781DatabaseClustersupportreplicationSourceIdentifier(#33471) (878ad54), closes #33280Bug Fixes
Alpha modules (2.182.0-alpha.0)
Features
Bug Fixes
v2.181.1Compare Source
Alpha modules (2.181.1-alpha.0)
⚠ BREAKING CHANGES TO EXPERIMENTAL FEATURES
IdentityPoolresources deployed in versions>=2.179.0will now fail to deploy. You will need to delete theIdentityPoolRoleAttachmentfrom your stack via the console before redeploying.Bug Fixes
v2.181.0Compare Source
Features
Bug Fixes
serviceTimeoutforCustomResourcedoes not work with token (#33541) (bc91c70), closes #33513 /github.com/go-to-k/aws-cdk/blob/75e52619cd09f363882ff62561a53cd5cd79ab30/packages/aws-cdk-lib/core/lib/custom-resource.ts#L169 /github.com/go-to-k/aws-cdk/blob/75e52619cd09f363882ff62561a53cd5cd79ab30/packages/aws-cdk-lib/core/lib/duration.ts#L332monitoringIntervalinDatabaseClusterPropsdoes not work with token (#33516) (f9b28b9), closes #33504SageMakerCreateTrainingJobadd sagemaker:AddTags permission (#32536) (3b07346), closes #32294Alpha modules (2.181.0-alpha.0)
Features
v2.180.0Compare Source
Features
ValidationErrorsinstead of untyped Errors (#33456) (6098816), closes #32569timeoutforManualApprovalAction(#33472) (7901f07), closes #33473Bug Fixes
DataProtectionPolicytemplate key must be PascalCase (#33462) (0379878), closes #33408 #26728Alpha modules (2.180.0-alpha.0)
Features
v2.179.0Compare Source
⚠ BREAKING CHANGES TO EXPERIMENTAL FEATURES
kubectlLayerproperty is now required in EKSClusterandFargateClusterconstructs. The default value forkubectlLayeris outdated and hence being removed. You can specify your own kubectlLayer version based on your Kubernetes version.Features
ValidationErrorsinstead of untyped Errors (#33455) (11a75b2), closes #32569detailedMetricsEnabledproperty (#33267) (0abcacf), closes #33222ValidationErrorinstead of untyped Errors (#33386) (b4efb1e), closes #32569Configuration
📅 Schedule: Branch creation - "" in timezone Europe/Oslo, Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about these updates again.
This PR was generated by Mend Renovate. View the repository job log.