- Video: https://securing-the-stack.teachable.com/p/injection-fundamentals-2
- Prerequisites: https://sts.tools/if2k
- Env Setup: https://sts.tools/setup
- Ask A Question: https://sts.tools/injection-question
- Speak To Human: https://sts.tools/live-support
- Overarching Playlist: https://securing-the-stack.teachable.com/courses/category/injection-fundamentals
- Injection Fundamentals: What Is
SSRF?
- Intro
- Inject The Curl Context (Assignment Prep)
- Inject The Curl Context (Assignment)
- Inject The Curl Context (Answer)
- Server Side Request Forgery (SSRF)
- Semantic Injection
- AWS EC2 Metadata SSRF
- AWS EC2 Metadata SSRF (Takeaways)
- New Relic Webhook Blind SSRF
- Blind Injection
- Course Takeaways
- Next Steps
- Error Log
- Additional Resources
- Knowledge Dependency Tree
- Who is this episode for?
- Developers who have novice injection/security knowledge
- Prerequisites: sts.tools/if2k
- At the end of this episode, you'll be able to
- See how Server Side Request Forgery (SSRF) works through a live example
- Understand how your code (coupled with the deployment environment) can create Semantic Injection risks
- Review Blind Injection through a real vulnerability within New Relic
- Through Blind Injection, we learn why we focus on input validation (as opposed to output validation)
- Start reviewing mitigation strategies (whitelisting) that we'll focus on during upcoming tutorials
- Ready? Come join me in the next lecture!
- A host with 2 processes
- File server
- Houses internal-only documents
- Accepts traffic from the corporate network on port
8081
- Is accessible over
http://localhost:8081
on the main host - DevOps created this server without your knowledge
- Aside: DevOps believes this file server is secure
because
- It's restricted to the corporate network
localhost
is restricted to local processes- Anything wrong with this thinking?
- The unknown unknowns are always the most dangerous
- Always assume there are items that you dont know
- Aside: DevOps believes this file server is secure
because
- Node server
- Is publicly accessible over port 80
- Houses your code
- File server
// Assignment: Access the file server (port 8081) by injecting `userDefinedUrl`
// Please leverage the curl execution context
// Bonus: View the contents of `sensitive-file.txt` within the file server's
// current working directory
var userDefinedUrl = 'example.com/route';
// Allow shell access
var exec = require('child_process').exec;
var curl = exec('curl ' + userDefinedUrl);
curl.stdout.on('data', function(data) {
// Mock response
console.log(data);
});
// Run: "EX_NUM=1 docker-compose up"
// File: "ep10-injection-fundamentals-part-2/src/1/app.js"
- Hints
- What network interface is used for "local access"
// Make a PR and contribute your answers here!
// var userDefinedUrl = "localhost:8081/sensitive-file.txt";
var userDefinedUrl = 'example.com/route';
// Allow shell access
var exec = require('child_process').exec;
var curl = exec('curl ' + userDefinedUrl);
curl.stdout.on('data', function(data) {
// Mock response
console.log(data);
});
// Run: "EX_NUM=2 docker-compose up"
// File: "ep10-injection-fundamentals-part-2/src/2/app.js"
- This is an example of Server Side Request Forgery (SSRF)
-
The attacker makes the server initiate a request
-
It's often to a domain that the developer isn't expecting
var userDefinedUrl = "localhost:8081/sensitive-file.txt";
-
Doesn't have to be invoked with
curl
-
-
Categorizing SSRF
- Is the attacker exploiting
curl
's syntax?- Is this syntactic injection?
- No, this is semantic injection
- Is the attacker exploiting
- Injection that exploits a unique meaning (or situation) in the
environment
- Semantics == Meaning
- What constitutes an environment?
- Your code, the server and the environment that surrounds
the server (AWS, DBs, etc.)
- Your code is the door to these contexts
- Can you think of a cloud service that exposes an
introspection API on every server?
- AWS EC2 Metadata
- Your code, the server and the environment that surrounds
the server (AWS, DBs, etc.)
- AWS IAM (Identity Access Management) Background
- Permissions functionality
- We attach permissions to IAM roles
- Roles are then attached to an EC2 server
- SSRF Risk
-
On the server, IAM roles can be queried through the EC2 Metadata Service
var userDefinedUrl = "http://169.254.169.254/latest/meta-data/iam/security-credentials/ROLE_NAME";
-
Truncated Output
{ "AccessKeyId" : "ASIAIOSFODNN7EXAMPLE", "SecretAccessKey" : "wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY", }
-
- SSRF can be leveraged to extract sensitive information
- APIs in our surrounding environment pose injection risks
- Don't be overwhelmed by the items that you must know :)
- By knowing that there are things you don't know, we can
create granular whitelisting strategies
- Whitelist: A list of items that we'll allow, and reject everything else
- By knowing that there are things you don't know, we can
create granular whitelisting strategies
- For additional EC2 Metadata information, reference the
Additional Resources
section in the notes - Potential Takeaway
- In each of our SSRF examples, the output is clearly different
from our expectations
- "Since we know what the output should be, we could easily create a whitelist for our responses"
- Would we be safe?
- In each of our SSRF examples, the output is clearly different
from our expectations
-
Reported by Tung Pun
- See link in
Additional Resources
- See link in
-
Form
POST
that Tung leveragedPOST /accounts/1723471/notification_channels?type=WebhookIntegration HTTP/1.1 utf8=%E2%9C%93& authenticity_token=i%2FxIU01NWUoCx92w1%2FmilEwulU1SjUGSKsJR8ARB4CQ%3D& webhook_integration%5Bname%5D=%22%3E%3Csvg%2Fonload%3Dalert(3)%3B%3E& webhook_integration%5Bwebhook_url%5D=http://127.0.0.1:4352/& webhook_integration%5Bdescription%5D=%22%3E%3Csvg%2Fonload%3Dalert(3)%3B%3E& webhook_integration%5Bverbosity%5D=default& webhook_integration%5Benabled%5D=true
-
Response
200
if the port was open,422
if closed
- Don't have the full response available
- Error messages are also turned off
- Submit "true/false" queries to the application and observe how the
application reacts
- Ex: Is this port open?
200
if yes,422
if no - Items to observe
- Response codes, computation times, etc.
- Ex: Is this port open?
- Whitelisting output would be incredibly difficult
- Focus energy on whitelisting input
- Given limited time, whitelisting input is more valuable than whitelisting output
- Recap: Execution contexts of
userDefinedUrl
- shell context
- Ex: Syntactic injection risk
- curl context
- Ex: Semantic injection risk
- SSRF
- Ex: Semantic injection risk
- javascript context
- Coming soon :)
- shell context
- For every unique execution context, we must
- Evaluate syntactic and semantic injection risks
- Evaluate injection risks within the overarching environment
- Additional assignments:
- Look for SSRF within a codebase's
- Webhook functionality
- File upload functionality
- Does the API accept a URL instead of a file?
- View
Additional Resources
for hackerone vulnerability- Make sure to review photo attachments for context
- Look for SSRF within a codebase's
- Review links below video
- Additional resources
- Specific to other languages
- Ability to explore more in-depth
- Additional resources
- None so far :)
- Please submit a PR with any additional resources
- https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html
- https://hackerone.com/reports/263169
- New Relic Webhook Blind SSRF
- https://hackerone.com/reports/713
- Image upload SSRF
- SSRF Bible. Cheatsheet
- https://github.com/cujanovic/SSRF-Testing
- https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/SSRF%20injection
- https://www.hackerone.com/blog-How-To-Server-Side-Request-Forgery-SSRF
- Shopify SSRF Example
- https://www.blackhat.com/docs/us-17/thursday/us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-Languages.pdf
- Slides 39 - 47