Disclosure
S3 Full Read/Write/Delete via Unauthenticated Cognito Role
AWS Cognito Identity Pool us-east-1:b1cc32f2-117f-41c3-b797-e19d0e41b75e unauthenticated erisime acik. Elde edilen IAM role amplify-korapaykyc-dev-41238-unauthRole, [vendor] S3 bucket'ina s3:PutObject, s3:GetObject, s3:DeleteObject, s3:ListBucket dahil tam erisim sagliyor. Bucket versioning KAPALI. Bu, saldirganin KYC dokumentlarini okuyabil
- Target
- EU Crypto Exchange
- Category
- S3 Misconfig
- Channel
- Responsible Disclosure
- Disclosed
- 2026-04
Redaction note
Vendor identity withheld.
This finding is documented here as part of MemCyber’s public disclosure record. The vendor has been anonymized to a sector and region descriptor. Full technical detail — including root cause, reproducible proof-of-concept, remediation guidance, and vendor attribution where granted — is available to qualified prospects under NDA.
Coordinated disclosure
How we handled it.
- Reported to the vendor via Responsible Disclosure with a reproducible proof-of-concept.
- Triage + remediation window coordinated with the vendor security team.
- Fix verified before any public reference.
- This record published only after the embargo period closed.