webPromedium
Lab 104 — CloudOps Copilot — AI SSRF via Infrastructure Tool Abuse
hackadvisor
Task: AI-powered DevOps dashboard (CloudOps Copilot) with an AI assistant that has a check_endpoint tool making server-side HTTP requests without URL validation. Solution: abuse the AI copilot's check_endpoint tool as an SSRF proxy to port-scan localhost, discover internal cloud metadata service on port 3001, and exfiltrate AWS credentials containing the flag.
$ ls tags/ techniques/
ssrfnodejsllmdecoy_flaginternal_service_discoverycloud_metadataai_copilotawsimdsv1port_scanningtool_abuse
honeypot_flag_detectionssrf_via_ai_toolinternal_port_scanningcloud_metadata_credential_theftlocalhost_ip_blocklist_bypass
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]Lab 205 — DockForge — SSRF in Webhook Test Endpoint— hackadvisor
- [web][Pro]CloudPulse— hackadvisor
- [web][Pro]Lab 103 — DataPilot — AI SQL Injection via Natural Language Query— hackadvisor
- [web][Pro]Lab 384 — DevPulse — RCE via AI Log Assistant Prompt Injection— hackadvisor
- [web][Pro]Lab 105 — WriteFlow — Indirect Prompt Injection via Document Analysis— hackadvisor