Skip to content

Commit

Permalink
Merge pull request nccgroup#112 from Hacking-the-Cloud/update_terrafo…
Browse files Browse the repository at this point in the history
…rm_rce

Address nccgroup#110: Added note about stealing env variables from TFE runs
  • Loading branch information
Frichetten authored Jan 23, 2022
2 parents 816acc6 + e50d70c commit 76963cc
Showing 1 changed file with 3 additions and 0 deletions.
3 changes: 3 additions & 0 deletions content/terraform/terraform_enterprise_metadata_service.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,9 @@ If Terraform Enterprise is deployed to a VM from a cloud provider we may be able

"By default, Terraform Enterprise does not prevent Terraform operations from accessing the instance metadata service, which may contain IAM credentials or other sensitive data" ([source](https://www.terraform.io/enterprise/system-overview/security-model#restrict-terraform-build-worker-metadata-access))

!!! Note
While the focus of this article is on targeting the metadata service, it is worth noting that gaining code execution inside a Terraform run may provide other avenues for attack. For example, environment variables could be leaked which may contain sensitive credentials.

## Remote (Code) Execution

For many engineers, their first experience with Terraform was locally on their workstations. When they invoked a `terraform apply` or `terraform plan` all of that activity took place on the local machine (reaching out to cloud APIs, tracking state, etc.)
Expand Down

0 comments on commit 76963cc

Please sign in to comment.