Member-only story

25,000$ Bounty — Simple SSRF Led to AWS Credentials Exposure

Exploiting SSRF in Analytics Reports to Gain AWS Access

Karthikeyan Nagaraj
OSINT Team
3 min read6 days ago

Timeline

  • 📅 Reported: November 23, 2023
  • ✅ Fixed: November 24, 2023
  • 💰 Bounty: $25,000
  • Severity: Critical (9.8/10)

Introduction

Server Side Request Forgery (SSRF) is one of the most dangerous vulnerabilities in web applications, especially when it allows attackers to access internal services or cloud metadata endpoints.

Recently, a researcher found a critical SSRF vulnerability in an Analytics Reports feature that exposed AWS credentials, which could potentially allow full control over cloud services.

In this article, I’ll break down the vulnerability, how it was exploited, and how such attacks can be prevented.

What is SSRF?

Server Side Request Forgery (SSRF) happens when an attacker tricks a web server into making requests to internal services or external systems.

Types of SSRF Attacks:

  1. Basic SSRF — The attacker forces a server to make a request to an unintended destination.

Create an account to read the full story.

The author made this story available to Medium members only.
If you’re new to Medium, create a new account to read this story on us.

Or, continue in mobile web

Already have an account? Sign in

Published in OSINT Team

We teach OSINT from multiple perspectives. InfoSec experts, journalists, law enforcement and other intelligence specialists read us to grow their skills faster.

Written by Karthikeyan Nagaraj

Entrepreneur | Writer | Cyber Security Consultant | AI Researcher TopMate - https://topmate.io/cyberw1ng

Responses (1)

Write a response