“Day 25: The Cloud Heist — How a Forgotten Webhook Tester Gave Me the Keys to AWS”
一个基于AWS的SaaS公司因忽视子域名devtools.coolstartup.com上的内部工具而遭殃。该工具存在盲SSRF漏洞,导致云基础设施被攻破并支付了1000美元赏金。内部工具常因缺乏安全措施成为攻击目标。 2025-9-13 08:0:48 Author: infosecwriteups.com(查看原文) 阅读量:3 收藏

Turning a Blind SSRF into a $1000 Cloud Compromise

Aman Sharma

The target was a SaaS company built entirely on AWS. Their main application was a fortress. But during recon, I stumbled upon a forgotten subdomain: devtools.coolstartup.com. It hosted an internal tool for developers to test webhooks. This tool had a critical flaw: it would make HTTP requests to any URL provided. This seemingly minor oversight—a blind Server-Side Request Forgery (SSRF)—became the initial thread I pulled to unravel their entire cloud infrastructure, leading to a $1000 bounty. This is the story of how internal tools become external threats.

free link

Press enter or click to view image in full size

Why Internal Tools Are a Goldmine

Internal tools are often built without the same security rigor as customer-facing applications. They assume a trusted user base and a protected network. This makes them prime targets for attackers who can reach them. Common pitfalls include:

  • Lax authentication or default credentials.
  • Powerful functionality meant for debugging.
  • No logging or monitoring for malicious use.

文章来源: https://infosecwriteups.com/day-25-the-cloud-heist-how-a-forgotten-webhook-tester-gave-me-the-keys-to-aws-0e2876b515a8?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh