By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Two Missing Characters: How a Regex Flaw Exposed AWS GitHub Repos to Supply-Chain Risk
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Two Missing Characters: How a Regex Flaw Exposed AWS GitHub Repos to Supply-Chain Risk
News

Two Missing Characters: How a Regex Flaw Exposed AWS GitHub Repos to Supply-Chain Risk

News Room
Last updated: 2026/01/25 at 3:28 AM
News Room Published 25 January 2026
Share
Two Missing Characters: How a Regex Flaw Exposed AWS GitHub Repos to Supply-Chain Risk
SHARE

AWS recently published a security bulletin acknowledging a configuration issue affecting some popular AWS-managed open-source GitHub repositories. Dubbed CodeBreach, the critical vulnerability could have resulted in the introduction of malicious code and hijacking of the repositories leveraging AWS CodeBuild.

Wiz Security’s research team identified that a subset of repositories configured regular expressions for AWS CodeBuild webhook filters intended to limit trusted actor IDs, but these filters were insufficient, allowing a predictably acquired actor ID to gain administrative permissions. The four affected repositories that put the AWS Console supply chain at risk were the AWS SDK for JavaScript v3, the general-purpose cryptographic library aws-lc, amazon-corretto-crypto-provider, and awslabs/open-data-registry, a repository of publicly available datasets accessible from AWS resources.

Yuval Avrahami, vulnerability researcher at Wiz, and Nir Ohfeld, head of vulnerability research at Wiz, explain:

The vulnerability stemmed from a subtle flaw in how the repositories’ AWS CodeBuild CI pipelines handled build triggers. Just two missing characters in a Regex filter allowed unauthenticated attackers to infiltrate the build environment and leak privileged credentials.

The ACTOR_ID filter that checked which GitHub users could trigger builds was missing the start (^) and end ($) anchors, allowing any user ID containing a trusted ID as a substring to bypass the restriction. Because GitHub IDs are sequential, researchers created automated GitHub Apps and captured credentials from the build cache, gaining full admin access to the compromised repositories. As the AWS SDK for JavaScript is bundled with the AWS Console, a successful attack could have compromised the console supply chain for countless AWS accounts.

While confirming the vulnerability and thanking Wiz Security’s research team for identifying the issue, the cloud provider confirmed that no such misconfigurations exist across other AWS-managed open-source repositories. The issue in the affected repositories was mitigated within 48 hours of initial disclosure. Avrahami and Ohfeld add:

This issue follows a familiar pattern seen in recent supply-chain attacks like the Nx S1ngularity incident, where subtle CI/CD misconfigurations lead to disproportionately impactful attacks. Just last July, a threat actor abused a similar CodeBuild issue to launch a supply chain attack against users of the Amazon Q VS Code extension.

As similar attacks are becoming more prevalent, Wiz encourages organizations to harden their CI/CD pipelines, ensuring that any access controls using the ACTOR_ID filter are properly scoped and configured to allow only allow-listed identities. User hashkent comments on Reddit:

It feels like it’s getting harder to keep your source code secure. Getting scary out there.

This and other recent attacks highlight the importance of not allowing untrusted contributions to run privileged CI/CD pipelines. Corey Quinn, chief cloud economist at The Duckbill Group, comments:

This is the second major CodeBuild lapse in the past year. Something in the water over there? Pro tip: if AWS can’t configure their own security correctly, maybe double-check yours.

The CodeBreach vulnerability was initially reported by Wiz to AWS on August 25, with the cloud provider anchoring the vulnerable actor ID filters and revoking the personal access token of aws-sdk-js-automation on August 27. Additional hardening to prevent non-privileged builds from accessing project credentials via memory dumping was implemented in September, but public disclosure did not occur until January 15.

 

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Google’s big change to the Android phone app prevents users from “flipping” out Google’s big change to the Android phone app prevents users from “flipping” out
Next Article Should we believe the crazy promises of Donut Lab and its miracle battery? Should we believe the crazy promises of Donut Lab and its miracle battery?
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

CPU Fail? Asus Investigates Issue With Its Motherboards and Ryzen 7 9800X3D
CPU Fail? Asus Investigates Issue With Its Motherboards and Ryzen 7 9800X3D
News
Apple Rumored to Partner With Intel on iPhone Chips
Apple Rumored to Partner With Intel on iPhone Chips
News
Best robot vacuum deal: Save 0 on eufy E25
Best robot vacuum deal: Save $250 on eufy E25
News
Asus is stepping away from making smartphones, but is anyone really surprised?
Asus is stepping away from making smartphones, but is anyone really surprised?
Gadget

You Might also Like

CPU Fail? Asus Investigates Issue With Its Motherboards and Ryzen 7 9800X3D
News

CPU Fail? Asus Investigates Issue With Its Motherboards and Ryzen 7 9800X3D

6 Min Read
Apple Rumored to Partner With Intel on iPhone Chips
News

Apple Rumored to Partner With Intel on iPhone Chips

5 Min Read
Best robot vacuum deal: Save 0 on eufy E25
News

Best robot vacuum deal: Save $250 on eufy E25

3 Min Read
Why Costco Still Relies On IBM Computers From The ’80s – BGR
News

Why Costco Still Relies On IBM Computers From The ’80s – BGR

7 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?