<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>@Hulumi/Drift (&lt; 1.3.2) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/@hulumi/drift--1.3.2/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 21 May 2026 20:45:34 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/@hulumi/drift--1.3.2/feed.xml" rel="self" type="application/rss+xml"/><item><title>@hulumi/drift Orphan Reconciler Accepts Externally Supplied Execute Plans</title><link>https://feed.craftedsignal.io/briefs/2026-05-hulumi-drift-execute-plan/</link><pubDate>Thu, 21 May 2026 20:45:34 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-hulumi-drift-execute-plan/</guid><description>@hulumi/drift versions before 1.3.2 could accept externally supplied execute plans without sufficient provenance checks, allowing unsafe reconciliation input to be treated as trusted; upgrade to version 1.3.2 or later to resolve this vulnerability.</description><content:encoded><![CDATA[<p>@hulumi/drift, a package available on npm and used in the <code>kerberosmansour/hulumi</code> repository, was found to have a vulnerability where it could accept externally supplied execute plans without properly validating their provenance. This issue, affecting versions prior to 1.3.2, allows potentially unsafe reconciliation input to be processed as trusted, posing a risk to applications utilizing this package. Version 1.3.2 introduces enhanced execute-plan handling with provenance validation and regression coverage. This vulnerability could allow attackers to manipulate the reconciliation process, potentially leading to unintended or malicious outcomes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>This attack chain describes the potential exploitation of the vulnerability where @hulumi/drift accepts externally supplied execute plans without proper validation.</p>
<ol>
<li>An attacker crafts a malicious execute plan designed to manipulate the reconciliation process.</li>
<li>The attacker supplies the crafted execute plan to an application using a vulnerable version of @hulumi/drift.</li>
<li>@hulumi/drift, lacking sufficient provenance checks, accepts the externally supplied execute plan.</li>
<li>The application processes the malicious execute plan, treating it as a trusted input.</li>
<li>The reconciliation process is influenced by the attacker&rsquo;s crafted plan, leading to unintended consequences.</li>
<li>The attacker achieves their objective, which could include data manipulation, privilege escalation, or denial of service, depending on the application&rsquo;s functionality and the scope of the reconciliation process.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could lead to a compromise of the integrity of applications using the vulnerable versions of @hulumi/drift. By supplying malicious execute plans, attackers can manipulate the reconciliation process, potentially leading to unauthorized data modification or unintended system behavior. This could have significant consequences for applications relying on the integrity of the reconciliation process.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade @hulumi/drift to version 1.3.2 or later to remediate the vulnerability as advised in the GitHub Advisory <a href="https://github.com/advisories/GHSA-2ffm-hxrq-qqmm">GHSA-2ffm-hxrq-qqmm</a>.</li>
<li>Implement additional input validation and sanitization measures within applications using @hulumi/drift to further mitigate the risk of malicious input.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>supply-chain</category><category>vulnerability</category><category>npm</category></item></channel></rss>