ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 51 - PT0-003 discussion

Report
Export

A penetration tester has found a web application that is running on a cloud virtual machine instance. Vulnerability scans show a potential SSRF for the same application URL path with an injectable parameter. Which of the following commands should the tester run to successfully test for secrets exposure exploitability?

<a target='_blank' href='http://169.254.169.254/latest/meta-data/'>A. curl <url>?param=http://169.254.169.254/latest/meta-data/ B. curl '<url>?param=http://127.0.0.1/etc/passwd' C. curl '<url>?param=<script>alert(1)<script>/' D. curl <url>?param=http://127.0.0.1/</a>

A.
Option A
Answers
A.
Option A
B.
Option B
Answers
B.
Option B
C.
Option C
Answers
C.
Option C
D.
Option D
Answers
D.
Option D
Suggested answer: A

Explanation:

In a cloud environment, testing for Server-Side Request Forgery (SSRF) vulnerabilities involves attempting to access metadata services. Here's why the specified command is appropriate:

Accessing Cloud Metadata Service:

URL: http://169.254.169.254/latest/meta-data/ is a well-known endpoint in cloud environments (e.g., AWS) to access instance metadata.

Purpose: By exploiting SSRF to access this URL, an attacker can retrieve sensitive information such as instance credentials and other metadata.

Comparison with Other Commands:

127.0.0.1/etc/passwd: This is more about local file inclusion, not specific to cloud metadata.

<script>alert(1)</script>: This tests for XSS, not SSRF.

127.0.0.1: This is a generic loopback address and does not specifically test for metadata access in a cloud environment.

Using curl <url>?param=http://169.254.169.254/latest/meta-data/ is the correct approach to test for SSRF vulnerabilities in cloud environments to potentially expose secrets.

asked 02/10/2024
Chrysovalantis Oikonomopoulos
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first