InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties…

Follow publication

SSRF in redacted.com: How I Found and Reported a Vulnerability

--

As a security researcher, it’s always exciting to uncover vulnerabilities in popular web applications. Recently, I came across a Server-Side Request Forgery (SSRF) vulnerability in redacted.com, a well-known platform. In this post, I will be sharing the details of my discovery, including the steps I took to identify the vulnerability and the actions taken by the company to fix the issue.

While testing redacted.com, I noticed that when an error occurred, the application sent a request to the Sentry endpoint. I realized that the filename in the request could be manipulated to send a request to my own Local machine with server. I created a proof of concept and sent it to the company’s security team. They confirmed the vulnerability and took immediate action to fix it.

How to find this vulnerability?

  1. Begin by accessing the target website that utilizes Sentry
  2. Utilize a web application scanner such as Burp Suite to spider the website and locate the Sentry endpoint, which typically appears as “/api/14/store/?sentry_version=7&sentry_client=raven-js%2F3.27.0&sentry_key=<key>”
  3. Once the endpoint has been located, examine the request body for a parameter named “filename”. This parameter is vulnerable to Blind SSRF attacks and can allow an attacker to send GET requests to their own server.

Impact:

The vulnerability could have allowed an attacker to perform a Blind SSRF attack, which could have led to exfiltration if we change attack scenario.

Conclusion:

This incident serves as a reminder that even popular and well-established web applications are vulnerable to SSRF attacks and it’s important for security researchers to actively test for such vulnerabilities. The company rewarded me with a $100 bounty for my findings.

Peace…

Instagram: https://www.instagram.com/rootx_narayanan/
Twitter:
https://twitter.com/itsnarayananm
LinkedIn:
https://www.linkedin.com/in/narayanan-m-836197199/

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Responses (1)

Write a response