Loading HuntDB...

Server-Side Request Forgery in "icons.bitwarden.net"

Medium
B
Bitwarden
Submitted None
Reported by njgadhiya

Vulnerability Details

Technical details and impact analysis

Server-Side Request Forgery (SSRF)
As, I already checked with support team via portal, due to domain confirmation I checked with them. Here, adding the required information: ##Title: Server-Side Request Forgery in "icons.bitwarden.net". ##URL: https://icons.bitwarden.net/spoofed.burpcollaborator.net/icon.png ##Parameter: REST based in "https://icons.bitwarden.net/{DOMAIN-HERE}/icon.png" ##Summary: The application failed to validate the vulnerable URL which led to internal port scanning through SSRF vulnerability. ##Severity: High ##Proof of Concept: 1. The application shows "https://icons.bitwarden.net/localhost/icon.png". - 400 Bad Request. 2. The application shows https://icons.bitwarden.net/spoofed.burpcollaborator.net/icon.png - 404 Not Found. Note: Furthermore, an attacker would be able to perform host discovery and internal port scanning which I did not perform as the scope was not mentioned in the list so better that you can proceed with the above Proof of Concept steps. ##Recommendation: In the above steps, localhost was restricted but was able to bypass using domain "spoofed.burpcollaborator.net" which resolves "127.0.0.1". The application should resolve the domain and restrict access to internal resources. ## Impact * An attacker would be able to perform SSRF attack to retrieve internal infrastructure information.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Server-Side Request Forgery (SSRF)