25,000$ Bounty โ€” Simple SSRF Led to AWS Credentials Exposure

Timeline

  • ๐Ÿ“… Reported: November 23, 2023

  • โœ… Fixed: November 24, 2023

  • ๐Ÿ’ฐ Bounty: $25,000

  • Severity: Critical (9.8/10)

Introduction

Server Side Request Forgery (SSRF) is one of the most dangerous vulnerabilities in web applications, especially when it allows attackers to access internal services or cloud metadata endpoints.

Recently, a researcher found a critical SSRF vulnerability in an Analytics Reports feature that exposed AWS credentials, which could potentially allow full control over cloud services.

In this article, Iโ€™ll break down the vulnerability, how it was exploited, and how such attacks can be prevented.

What is SSRF?

Server Side Request Forgery (SSRF) happens when an attacker tricks a web server into making requests to internal services or external systems.

Types of SSRF Attacks:

  1. Basic SSRF โ€” The attacker forces a server to make a request to an unintended destination.

  2. Blind SSRF โ€” The response is not visible to the attacker, but actions may still be executed on the target system.

  3. SSRF to Internal Services โ€” Attackers exploit internal APIs or cloud metadata endpoints, gaining unauthorized access.

Read the Complete Writeup on Medium - https://cyberw1ng.medium.com/25-000-bounty-simple-ssrf-led-to-aws-credentials-exposure-a6938e0875f9

0
Subscribe to my newsletter

Read articles from Karthikeyan Nagaraj directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Karthikeyan Nagaraj
Karthikeyan Nagaraj