SSRF in proxy.duckduckgo.com via the image_host parameter
High
D
DuckDuckGo
Submitted None
Actions:
Reported by
fpatrik
Vulnerability Details
Technical details and impact analysis
# Description
https://proxy.duckduckgo.com/iur/ endpoint is vulnerable to ssrf via image_host
get parameter.
## Vulnerable URL:
https://proxy.duckduckgo.com/iur/?f=1&image_host=https://tudomanyok.hu/
## Some internal URL:
https://proxy.duckduckgo.com/iur/?f=1&image_host=https://127.0.0.1:18091/
http://127.0.0.1:9998/
http://127.0.0.1:8092/
http://127.0.0.1:8091/
The only restriction that is there must be a http:// or https:// before the URL so you can't go with ssh://
# How to reporduce
1. Go to one of the internal urls and you will see that there is something (some url is only visible with view-source)
2. The best example is the http://127.0.0.1:18091/ one if you will visit: view-source:https://proxy.duckduckgo.com/iur/?f=1&image_host=https://127.0.0.1:18091/ui/ that there is something called couchebase console. (only visible in view-source)
These are I think internal web ports because I wasn't able to go to these ports from the external proxy.duckduckgo.com url.
## Impact
Attacker can scan your internal network, finding internal port, and internal web applications
The hacker selected the **Server-Side Request Forgery (SSRF)** weakness. This vulnerability type requires contextual information from the hacker. They provided the following answers:
**Can internal services be reached bypassing network access control?**
Yes
**What internal services were accessible?**
http://127.0.0.1:9998/
http://127.0.0.1:8092/
http://127.0.0.1:8091/
https://127.0.0.1:18091/
...
**Security Impact**
I was possible to reach internal services, however I didn't tested that is that important or not (because i didn't want to violate any law)
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Server-Side Request Forgery (SSRF)