Server-Side Request Forgery in "icons.bitwarden.net"
Medium
B
Bitwarden
Submitted None
Actions:
Reported by
njgadhiya
Vulnerability Details
Technical details and impact analysis
As, I already checked with support team via portal, due to domain confirmation I checked with them. Here, adding the required information:
##Title: Server-Side Request Forgery in "icons.bitwarden.net".
##URL: https://icons.bitwarden.net/spoofed.burpcollaborator.net/icon.png
##Parameter: REST based in "https://icons.bitwarden.net/{DOMAIN-HERE}/icon.png"
##Summary: The application failed to validate the vulnerable URL which led to internal port scanning through SSRF vulnerability.
##Severity: High
##Proof of Concept:
1. The application shows "https://icons.bitwarden.net/localhost/icon.png". - 400 Bad Request.
2. The application shows https://icons.bitwarden.net/spoofed.burpcollaborator.net/icon.png - 404 Not Found.
Note: Furthermore, an attacker would be able to perform host discovery and internal port scanning which I did not perform as the scope was not mentioned in the list so better that you can proceed with the above Proof of Concept steps.
##Recommendation:
In the above steps, localhost was restricted but was able to bypass using domain "spoofed.burpcollaborator.net" which resolves "127.0.0.1". The application should resolve the domain and restrict access to internal resources.
## Impact
* An attacker would be able to perform SSRF attack to retrieve internal infrastructure information.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Server-Side Request Forgery (SSRF)