Loading HuntDB...

Internal Blind Server-Side Request Forgery (SSRF) allows scanning internal ports

None
M
Mozilla
Submitted None
Reported by harshdranjan

Vulnerability Details

Technical details and impact analysis

Server-Side Request Forgery (SSRF)
## Summary: Blind SSRF reports on services that are designed to load resources from the internet is Out of scope but this is a Internal Blind SSRF report so should be a Valid find as I am reading the localhost not someone else server. I found a Blind SSRF issue that allows scanning internal ports on https://getpocket.com/saves , the server will give different response the request to all the closed ports and we can use this in our advantage. I also confirm this by doing a scan on my network for open ports and closed ports thus proving that the open and closed ports show different response ## Steps To Reproduce: 1. Go to https://getpocket.com/saves? as an Authenticated person 2. Click on the Plus Icon at the Top and enter the URL "https://127.0.0.1:1" 3. intercept this request using a Proxy like BURP and send the request to the Repeater Tab [Intruder Tab if you want to scan ] 4. change the ports to see different results , You will see different response for the different ports which shows which one is open and which one is closed. Such as https://127.0.0.1:22 Open https://127.0.0.1:21 close https://127.0.0.1:86 Open https://127.0.0.1:88 Open https://127.0.0.1:87 close ## Supporting Material/References: https://hackerone.com/reports/1300585 ##PoC Scanning the Internal system {F2403088} Proving that the Open ports gives greater then 3000 length response {F2403089} ## Impact This vulnerability can be used for reconnaissance. Attacker can enumerate services and launch attacks against them Example: Port Scan by different response from the server

Report Details

Additional information and metadata

State

Closed

Substate

Informative

Submitted

Weakness

Server-Side Request Forgery (SSRF)