Server-Side Request Forgery in "icons.bitwarden.net"
Medium
Vulnerability Details
As, I already checked with support team via portal, due to domain confirmation I checked with them. Here, adding the required information:
##Title: Server-Side Request Forgery in "icons.bitwarden.net".
##URL: https://icons.bitwarden.net/spoofed.burpcollaborator.net/icon.png
##Parameter: REST based in "https://icons.bitwarden.net/{DOMAIN-HERE}/icon.png"
##Summary: The application failed to validate the vulnerable URL which led to internal port scanning through SSRF vulnerability.
##Severity: High
##Proof of Concept:
1. The application shows "https://icons.bitwarden.net/localhost/icon.png". - 400 Bad Request.
2. The application shows https://icons.bitwarden.net/spoofed.burpcollaborator.net/icon.png - 404 Not Found.
Note: Furthermore, an attacker would be able to perform host discovery and internal port scanning which I did not perform as the scope was not mentioned in the list so better that you can proceed with the above Proof of Concept steps.
##Recommendation:
In the above steps, localhost was restricted but was able to bypass using domain "spoofed.burpcollaborator.net" which resolves "127.0.0.1". The application should resolve the domain and restrict access to internal resources.
## Impact
* An attacker would be able to perform SSRF attack to retrieve internal infrastructure information.
Actions
View on HackerOneReport Stats
- Report ID: 913276
- State: Closed
- Substate: resolved
- Upvotes: 13