bug-bounty448
google354
xss341
microsoft283
facebook246
apple171
exploit163
rce160
malware102
account-takeover95
cve91
bragging-post84
csrf83
browser77
writeup76
privilege-escalation68
react60
authentication-bypass57
cloudflare54
dos53
node52
ssrf51
docker51
phishing50
aws48
access-control47
oauth45
smart-contract45
supply-chain44
ethereum43
defi42
web342
sql-injection41
lfi37
idor35
smart-contract-vulnerability32
vulnerability-disclosure32
web-application31
burp-suite31
reverse-engineering31
clickjacking31
race-condition31
info-disclosure31
wordpress30
cloud29
input-validation29
information-disclosure29
web-security27
solidity27
cors26
0
8/10
vulnerability
A complete SSRF-to-RCE exploit chain on AWS Elastic Beanstalk that leverages the EC2 metadata service to extract IAM credentials, then uses those credentials to upload a PHP web shell to an accessible S3 bucket for remote code execution. The attack demonstrates how weak IAM policies can enable escalation from SSRF to full system compromise.
ssrf
rce
aws
elastic-beanstalk
metadata-service
ec2
s3
aws-cli
credential-extraction
file-upload
web-shell
privilege-escalation
cloud-security
iam-role-abuse
Youssef A. Mohamed
GeneralEG
CESPPA
Squnity
Synack
AWS Elastic Beanstalk
AWS Systems Manager
AWS CLI
169.254.169.254
aws-elasticbeanstalk-ec2-role
AWSElasticBeanstalkWebTier