25,000$ Bounty โ Simple SSRF Led to AWS Credentials Exposure


Timeline
๐ Reported: November 23, 2023
โ Fixed: November 24, 2023
๐ฐ Bounty: $25,000
Severity: Critical (9.8/10)
Introduction
Server Side Request Forgery (SSRF) is one of the most dangerous vulnerabilities in web applications, especially when it allows attackers to access internal services or cloud metadata endpoints.
Recently, a researcher found a critical SSRF vulnerability in an Analytics Reports feature that exposed AWS credentials, which could potentially allow full control over cloud services.
In this article, Iโll break down the vulnerability, how it was exploited, and how such attacks can be prevented.
What is SSRF?
Server Side Request Forgery (SSRF) happens when an attacker tricks a web server into making requests to internal services or external systems.
Types of SSRF Attacks:
Basic SSRF โ The attacker forces a server to make a request to an unintended destination.
Blind SSRF โ The response is not visible to the attacker, but actions may still be executed on the target system.
SSRF to Internal Services โ Attackers exploit internal APIs or cloud metadata endpoints, gaining unauthorized access.
Read the Complete Writeup on Medium - https://cyberw1ng.medium.com/25-000-bounty-simple-ssrf-led-to-aws-credentials-exposure-a6938e0875f9
Subscribe to my newsletter
Read articles from Karthikeyan Nagaraj directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by
