Severity Framework
Snyk CCSS
Rule category
Network / Public Access
Is your enviroment affected by this misconfiguration?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsFrameworks
CIS-Controls
CSA-CCM
ISO-27001
NIST-800-53
PCI-DSS
SOC-2
- Snyk ID SNYK-CC-00317
- credit Snyk Research Team
Description
Inbound traffic is allowed to a resource from any source instead of a restricted range, and potentially everyone can access your resource.
How to fix?
Set ingress.cidr_block
to specific CIDR block range only, e.g. 192.168.1.0/24
.
Example Configuration
resource "aws_default_network_acl" "default" {
default_network_acl_id = aws_vpc.mainvpc.default_network_acl_id
ingress {
protocol = -1
rule_no = 100
action = "allow"
cidr_block = "192.168.1.0/24"
from_port = 0
to_port = 0
}
egress {
protocol = -1
rule_no = 100
action = "allow"
cidr_block = "0.0.0.0/0"
from_port = 0
to_port = 0
}
}