Published Sun, Aug 4th, 2019
Platforms
AWS offers a metadata service accessible to most EC2 Instances via a simple GET request to 169.254.169.254. If an instance has an SSRF vulnerability, attackers can access the metadata service & exfiltrate the credentials of an attached IAM role to gain privileged access to the relevant AWS environment.
EC2
Enforce the use of IMDSv2 on the instance. This will require use of a POST request to generate an access token, which mitigates against most SSRF vulnerabilities
No tracked CVEs
Contributed by https://github.com/blakedunson
Entry Status
Finalized
Disclosure Date
Sun, Aug 4th, 2019
Exploitability Period
ongoing
Known ITW Exploitation
-
Detection Methods
None
Piercing Index Rating
-
Discovered by
-