Submitter : c2a
Date: 2 July 2023
Bounty : undisclosed
Vulnerabilities :
Programs :
Authors :
Link : https://blog.prodefense.io/how-abusing-aws-cloudformation-led-to-a-total-takeover-of-an-aws-environment-7f94cabd671d