Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. aws-cdk-lib
  4. ›
  5. CVE-2025-23206

CVE-2025-23206: AWS Cloud Development Kit (AWS CDK) IAM OIDC custom resource allows connection to unauthorized OIDC provider

January 17, 2025 (updated January 29, 2025)

Users who use IAM OIDC custom resource provider package will download CA Thumbprints as part of the custom resource workflow, https://github.com/aws/aws-cdk/blob/d16482fc8a4a3e1f62751f481b770c09034df7d2/packages/%40aws-cdk/custom-resource-handlers/lib/aws-iam/oidc-handler/external.ts#L34.

However, the current tls.connect method will always set rejectUnauthorized: false which is a potential security concern. CDK should follow the best practice and set rejectUnauthorized: true. However, this could be a breaking change for existing CDK applications and we should fix this with a feature flag.

Note that this is marked as low severity Security advisory because the issuer url is provided by CDK users who define the CDK application. If they insist on connecting to a unauthorized OIDC provider, CDK should not disallow this. Additionally, the code block is run in a Lambda environment which mitigate the MITM attack.

As a best practice, CDK should still fix this issue under a feature flag to avoid regression.

packages/@aws-cdk/custom-resource-handlers/lib/aws-iam/oidc-handler/external.ts
❯❱ problem-based-packs.insecure-transport.js-node.bypass-tls-verification.bypass-tls-verification
Checks for setting the environment variable NODE_TLS_REJECT_UNAUTHORIZED to 0, which disables TLS
verification. This should only be used for debugging purposes. Setting the option rejectUnauthorized
to false bypasses verification against the list of trusted CAs, which also leads to insecure
transport.

References

  • docs.aws.amazon.com/cdk/v2/guide/featureflags.html
  • github.com/advisories/GHSA-v4mq-x674-ff73
  • github.com/aws/aws-cdk
  • github.com/aws/aws-cdk/blob/d16482fc8a4a3e1f62751f481b770c09034df7d2/packages/%40aws-cdk/custom-resource-handlers/lib/aws-iam/oidc-handler/external.ts
  • github.com/aws/aws-cdk/commit/3e4f3773bfa48b75bf0adc7d53d46bbec7714a9e
  • github.com/aws/aws-cdk/issues/32920
  • github.com/aws/aws-cdk/pull/32921
  • github.com/aws/aws-cdk/releases/tag/v2.177.0
  • github.com/aws/aws-cdk/security/advisories/GHSA-v4mq-x674-ff73
  • nvd.nist.gov/vuln/detail/CVE-2025-23206

Code Behaviors & Features

Detect and mitigate CVE-2025-23206 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.177.0

Fixed versions

  • 2.177.0

Solution

Upgrade to version 2.177.0 or above.

Weakness

  • CWE-347: Improper Verification of Cryptographic Signature

Source file

npm/aws-cdk-lib/CVE-2025-23206.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:44 +0000.