<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Firefighter-Incident (&lt; 0.0.54) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/firefighter-incident--0.0.54/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/firefighter-incident--0.0.54/feed.xml" rel="self" type="application/rss+xml"/><item><title>FireFighter Unauthenticated SSRF Leads to Potential IAM Credential Theft</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-firefighter-ssrf/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-firefighter-ssrf/</guid><description>FireFighter versions before 0.0.54 are vulnerable to an unauthenticated server-side request forgery (SSRF) vulnerability in the `/api/v2/firefighter/raid/jira_bot` endpoint, allowing attackers to potentially steal IAM credentials in cloud environments.</description><content:encoded><![CDATA[<p>FireFighter, a tool for incident management, contains a critical SSRF vulnerability affecting versions prior to 0.0.54. The vulnerability resides in the <code>CreateJiraBotView</code> endpoint (<code>/api/v2/firefighter/raid/jira_bot</code>), which lacks authentication and proper URL validation. An attacker can exploit this flaw to send arbitrary HTTP requests from the FireFighter server, including requests to internal cloud metadata endpoints. Specifically, in EC2/EKS environments without IMDSv2, this SSRF can be leveraged to steal temporary AWS credentials associated with the pod&rsquo;s IAM role. Successful exploitation allows an attacker to gain unauthorized access to cloud resources. The vulnerable code is located in <code>src/firefighter/raid/views/__init__.py</code>, <code>src/firefighter/raid/serializers.py</code>, and <code>src/firefighter/raid/client.py</code>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a POST request to the <code>/api/v2/firefighter/raid/jira_bot</code> endpoint.</li>
<li>The attacker crafts a malicious request including an <code>attachments</code> parameter containing a URL pointing to a sensitive internal resource, such as the cloud metadata endpoint (<code>http://169.254.169.254/</code>).</li>
<li>The <code>LandbotIssueRequestSerializer.attachments</code> component processes the request without proper URL validation.</li>
<li>The <code>httpx.get()</code> function fetches the content from the attacker-specified URL.</li>
<li>The response from the metadata endpoint (containing AWS credentials) is retrieved by the FireFighter server.</li>
<li>The <code>RaidJiraClient.add_attachments_to_issue</code> function attaches the metadata response to a new Jira ticket.</li>
<li>The attacker retrieves the Jira ticket, extracting the attached file containing the stolen AWS credentials.</li>
<li>The attacker uses the stolen AWS credentials to gain unauthorized access to the compromised cloud environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability can lead to the theft of AWS IAM credentials in environments that do not enforce IMDSv2. This allows an attacker to gain unauthorized access to cloud resources, potentially leading to data breaches, service disruption, or other malicious activities. The number of affected deployments is currently unknown, but any FireFighter instance prior to version 0.0.54 is susceptible. Organizations using FireFighter for incident management are urged to upgrade immediately.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade FireFighter to version 0.0.54 or later to patch the SSRF vulnerability.</li>
<li>Block access to the <code>/api/v2/firefighter/raid/jira_bot</code> endpoint from untrusted networks as a temporary workaround, as mentioned in the advisory.</li>
<li>Implement IMDSv2 with <code>HttpPutResponseHopLimit=1</code> on EC2/EKS nodes to mitigate the risk of IAM credential theft, as suggested in the advisory.</li>
<li>Monitor network connections originating from the FireFighter server, specifically looking for outbound connections to the cloud metadata endpoint (169.254.169.254) using network connection logs.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>ssrf</category><category>cloud</category><category>iam</category><category>credential-theft</category></item></channel></rss>