Blind SSRF via HTML Injection
Discovery
This was found during the re-testing of the LFI issue I reported for PDF generation on a Dutch Government website. That particular site took HTML input from the client-side, and used it to generate a PDF via wkhtmltopdf
:

After their fix, I noticed that I was still able to do HTML injection using this payload:
<pre style='color:red;'>This is HTML Injection!</pre>
This was the PDF generated:

<script>
tags were no longer allowed after the fix, but I noted that using <img src>
still worked. Using this payload allowed for callbacks on my BurpSuite Collaborator client, with wkhtmltopdf-amd64-debian
in the User-Agent
header.
<img src='http://attacker.url.com/this_is_an_ssrf'>\n

The IP address was Dutch as well.
Exploitation
Using this, I knew that blind SSRF itself was not a valid issue. As such, it had to be combined with something else to become more severe and worth reporting. I noticed that using various URLs caused different issues.
For this instance, using http://127.0.0.1:22
in the <img>
header caused a PDF to be generated.

Using http://127.0.0.1:80
did not, and actually returned a 500.

This was a blind SSRF that allowed for port enumeration. I tested further with https://example.com
and https://thisdoesnotexist.xyz
, and noted that example.com
returned a valid PDF while the other URL did not.
Cause
wkhtmltopdf
actually has --disable-external-links --disable-internal-links
flags that can be used to prevent retrieving information from any links. I suspect that this was not included in their current settings.
I was however, unable to exploit this further and it was rated a P3, which was not processed.
Last updated