SSRF via webhook

Disclosed: 2017-07-18 18:20:49 By cablej To mixmax
Unknown
Vulnerability Details
Hi, There exists an SSRF vulnerability with the account webhook feature, allowing an attacker to verify the existence of the EC2 metadata url and enumerate URL's. POC: 1. Create a webhook at https://app.mixmax.com/dashboard/settings/rules with url `http://169.254.169.254/latest/meta-data/`. 2. Trigger this webhook by sending/receiving an email. Wait a few hours. 3. Note that an email is not sent saying the webhook failed. I tried for other internal urls such as 'http://localhost', but they sent a failure email, indicating that `http://169.254.169.254/latest/meta-data/` is open to the webhook. 4. In addition to verifying that this endpoint exists, an attacker could enumerate endpoints on this domain. For example, an attacker could enumerate MAC addresses at `http://169.254.169.254/latest/meta-data/network/interfaces/macs/xx:xx:...`. Suggested fix: Blacklist the AWS metadata url and any other sensitive internal urls. Thanks.
Actions
View on HackerOne
Report Stats
  • Report ID: 243277
  • State: Closed
  • Substate: resolved
  • Upvotes: 15
Share this report