Blind SSRF in Skype (Microsoft)

Jayateertha Guruprasad
InfoSec Write-ups
Published in
2 min readOct 28, 2022

--

Server Side Request Forgery is a vulnerability that allows attacker to make server request to attacker controlled network location/path.

While analyzing requests in Burp for Skype for Web, found a endpoint at *.*.skype.com/path?url=https://example.com , As the url param appeared interesting tried to change the url with my ngrok instance & got a hit !

Confirmed that it’s Skype which hit the url by looking at the ngrok inspect web console by verifying received User-Agent header(Skype)and IP address in who.is.

Although I was able to make the server hit arbitrary webpage, I couldn’t get full response. I could only get status code, content-type, content-length(size) of response and text content from few selected HTML tags. That’s, it’s not full SSRF as expected, but is a blind/partial SSRF.

Tried to access below paths —

  1. localhost/internal ip address -> Failed
  2. Tried to bypass localhost/internal ip address using url redirect/url shortner methods -> Failed
  3. External ip address/webpage -> Success
  4. Common Azure/AWS/DigitalOcean Meta data IP addresses -> Failed
  5. Not so commonly used, Azure related IP address (168.63.129.16) -> Success -> This IP can be used to determine VM’s health by using http://168.63.129.16/metadata/v1/maintenance endpoint, which should return OK (200 Status Code) if VM is functioning. (Refer this for more information)

Tried changing url param value to http://168.63.129.16/metadata/v1/maintenance , got 200 Ok response, with size of response as 2 bytes which confirms that response text probably contains OK in response.

Made a nice report mentioning all the details and sat back waiting for Microsoft to reproduce and fix the report.

Fortunately this was in scope for bounty under the M365 Bounty Program and got a nice $$$$ bounty !

Party Hard!

Report Timeline:

  1. Reported — Sep 23, 2022
  2. Additional Details Updated — Oct 3, 2022
  3. Bounty Rewarded — Oct 8, 2022
  4. Fixed — Oct 12, 2022

Liked my article ? Follow me on twitter (@jayateerthaG) and medium for more content about bugbounty, Infosec, cybersecurity and hacking.

From Infosec Writeups: A lot is coming up in the Infosec every day that it’s hard to keep up with. Join our weekly newsletter to get all the latest Infosec trends in the form of 5 articles, 4 Threads, 3 videos, 2 GitHub Repos and tools, and 1 job alert for FREE!

--

--