Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The only tragedy here is that this Paige person will get in trouble and Amazon will likely not.


What did amazon do wrong here?


The metadata service is a big issue. When you pair EC2 with common, off-the-shelf software, you can end up inadvertently allowing requests to EC2's metadata service. That allows an attacker to gain the same privileges as the EC2 instance they're hitting, which often means they can access resources like private S3 buckets.

While the metadata service isn't technically a vulnerability, it's poorly designed. Not enough thought went into its security, but too much relies on it for them to disable the current version overnight. Any changes are going to take many years.


How is "technically not a vulnerability" not a vulnerability?

This kind of thinking strikes me as exactly how Amazon gets away with this stuff.


Not fix a gaping hole that was reported to them repeatedly for years.




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: