Back to Blog
When a web application SSRF causes the cloud to rain credentials & more
The unofficial PDF version of this blog post can be downloaded from here:
The following blog post was written by me and Daniele Costa:
In this blog post we have demonstrated an SSRF exploitation to steal AWS credentials to access Amazon S3. What made this attack special was the fact that http://169.254.169.254/latest/meta-data/iam/ was not accessible to our users during the exploitation. Therefore, we had to use the ‘userData’ attribute in EC2 describe-instance-attribute operation to extract the sensitive data.
This entry was posted in Security Posts
Creation date: August 24, 2017