“Day 25: The Cloud Heist — How a Forgotten Webhook Tester Gave Me the Keys to AWS”
研究人员通过发现一家SaaS公司的内部工具中的盲SSRF漏洞,成功入侵其AWS云基础设施,并获得1000美元赏金。该工具允许向任意URL发起HTTP请求,成为攻击入口。 2025-9-13 08:0:48 Author: infosecwriteups.com(查看原文) 阅读量:2 收藏

Turning a Blind SSRF into a $1000 Cloud Compromise

Aman Sharma

The target was a SaaS company built entirely on AWS. Their main application was a fortress. But during recon, I stumbled upon a forgotten subdomain: devtools.coolstartup.com. It hosted an internal tool for developers to test webhooks. This tool had a critical flaw: it would make HTTP requests to any URL provided. This seemingly minor oversight—a blind Server-Side Request Forgery (SSRF)—became the initial thread I pulled to unravel their entire cloud infrastructure, leading to a $1000 bounty. This is the story of how internal tools become external threats.

free link

Press enter or click to view image in full size

Why Internal Tools Are a Goldmine

Internal tools are often built without the same security rigor as customer-facing applications. They assume a trusted user base and a protected network. This makes them prime targets for attackers who can reach them. Common pitfalls include:

  • Lax authentication or default credentials.
  • Powerful functionality meant for debugging.
  • No logging or monitoring for malicious use.

文章来源: https://infosecwriteups.com/day-25-the-cloud-heist-how-a-forgotten-webhook-tester-gave-me-the-keys-to-aws-0e2876b515a8?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh