Loading HuntDB...

SSRF By adding a custom integration on console.helium.com

High
H
Helium
Submitted None
Reported by th0roid

Vulnerability Details

Technical details and impact analysis

Server-Side Request Forgery (SSRF)
A Server Side Request Forgery vulnerability was found in the *Add a custom Integration* feature on *console.helium.com*. By creating a custom HTTP integration, and setting the integration endpoint to http://169.254.169.254/latest/meta-data private meta-data from the AWS EC2 instance running can be retrieved. {F1111768} {F1111767} The server makes the HTTP request and sets the response body as the integration message every time that the device sends a packet. As the endpoint input is not validated, this makes the application vulnerable to a critical SSRF. {F1111779} {F1111780} Endpoint set as: http://169.254.169.254/latest/meta-data/ami-id {F1111781} ## Impact By exploiting this vulnerability an attacker can get access to the server internal network and access private and critical information.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Bounty

$500.00

Submitted

Weakness

Server-Side Request Forgery (SSRF)