Lucene search

K
hackeroneAdrian_tH1:1369312
HistoryOct 13, 2021 - 1:27 p.m.

Concrete CMS: SSRF mitigation bypass using DNS Rebind attack

2021-10-1313:27:58
adrian_t
hackerone.com
14

0.001 Low

EPSS

Percentile

32.2%

We noticed that the upload functionality contains the ability to upload files from remote server, however there are some mitigations against accessing the AWS Instance Metadata service.

We’ve managed to bypass these mitigations using DNS rebinding and we’ve managed to fetch the AWS IAM keys when Concrete CMS is running in the cloud.

We’ve used http://1u.ms/ service for DNS rebinding, please see screenshots with evidence.

Impact

An attacker can bypass the SSRF protections and he can fetch the AWS IAM keys under which the application is running. From here on he can do enumeration and mount other attacks.

0.001 Low

EPSS

Percentile

32.2%