SSRF By adding a custom integration on console.helium.com
High
Vulnerability Details
A Server Side Request Forgery vulnerability was found in the *Add a custom Integration* feature on *console.helium.com*. By creating a custom HTTP integration, and setting the integration endpoint to http://169.254.169.254/latest/meta-data private meta-data from the AWS EC2 instance running can be retrieved.
{F1111768}
{F1111767}
The server makes the HTTP request and sets the response body as the integration message every time that the device sends a packet. As the endpoint input is not validated, this makes the application vulnerable to a critical SSRF.
{F1111779}
{F1111780}
Endpoint set as: http://169.254.169.254/latest/meta-data/ami-id
{F1111781}
## Impact
By exploiting this vulnerability an attacker can get access to the server internal network and access private and critical information.
Actions
View on HackerOneReport Stats
- Report ID: 1055823
- State: Closed
- Substate: resolved
- Upvotes: 49