Cloudflare Transform via URL Injection (Potential SSRF Vulnerability)
Report #ad5e8ea0-78b1-4b6c-a3be-9132a7308e33 in Hackrate Responsible Disclosure Program
Disclosed Report
StatusClosed
TargetTier 1
Severity
Details
- Program
- Hackrate Responsible Disclosure Program
- Target
- bugbounty.hr443.com
- Creation Date
- 6/8/2025 4:00:48 PM
- Severity
- Medium
- CVSS Score
-
None
- CVE Number
- None
- Visibility
- Disclosed
- Disclosed at
- 12/29/2025 5:38:00 PM
- Author
- @MRKNIGHTNIDU
- Status
- Resolved (Closed)
- Vulnerability Type
- Server Side Include (SSI) Injection
Summary
A potential Server-Side Request Forgery (SSRF) vulnerability was identified in the Cloudflare image transformation feature via URL injection on the domain https://www.hckrt.com. The service allows arbitrary URLs to be processed through the /cdn-cgi/image/ endpoint, which may permit unauthorized internal or external requests.
Description
Type: Server-Side Request Forgery (SSRF) Component: Cloudflare Image Transformation (/cdn-cgi/image/) Protocol: HTTP Affected URL: Primary: https://www.hckrt.com/cdn-cgi/image/width=1000,format=auto/https://i.top4top.io/p_3418i5bta1.jpg SSRF Test: https://www.hckrt.com/cdn-cgi/image/width=1000,format=auto/http://d12qt211ps90bq4pce4gqfjqkxwihmihj.oast.site
Description
The Cloudflare image transformation endpoint (/cdn-cgi/image/) appears to accept arbitrary URLs as part of the image source parameter. By appending a malicious or test URL (e.g., https://d12qnah1ps9c7f4hbhb0gyt4tady6ng11.oast.live), an attacker may be able to trigger unauthorized server-side requests. This could potentially allow access to internal network resources, external services, or sensitive metadata, depending on the server’s configuration and restrictions.
Impact
Access the following URL: https://www.hckrt.com/cdn-cgi/image/width=1000,format=auto/https://i.top4top.io/p_3418i5bta1.jpg This demonstrates the image transformation functionality with a legitimate external image source.
Modify the URL to include a test payload for SSRF: https://www.hckrt.com/cdn-cgi/image/width=1000,format=auto/http://d12qt211ps90bq4pce4gqfjqkxwihmihj.oast.site
Monitor the OAST (Out-of-Band Application Security Testing) service (e.g., Interactsh or similar) for any incoming requests. If a request is received, it confirms that the server processed the injected URL, indicating a potential SSRF vulnerability.
Impact
Potential Risks: Unauthorized access to internal network resources (if the server can make internal requests). Interaction with external services on behalf of the server, potentially bypassing IP-based restrictions. Exposure of sensitive metadata or credentials in certain configurations. Severity: Unknown without further details on the server’s network access and response behavior. Likely medium to high if internal resources are accessible.
Proof of Concept (PoC)
URL 1: https://www.hckrt.com/cdn-cgi/image/width=1000,format=auto/https://i.top4top.io/p_3418i5bta1.jpg Result: Successfully processes and transforms the image from the external source. URL 2 (SSRF Test): https://www.hckrt.com/cdn-cgi/image/width=1000,format=auto/http://d12qt211ps90bq4pce4gqfjqkxwihmihj.oast.site Result: Monitor the OAST service for HTTP/DNS interactions. A hit on the OAST domain confirms SSRF.
Mitigation Recommendations
Input Validation: Restrict the /cdn-cgi/image/ endpoint to only process whitelisted domains or internal resources. URL Filtering: Implement strict URL validation to prevent arbitrary external or internal URLs from being processed. Network Restrictions: Ensure the server cannot make requests to internal network resources or untrusted external services. Monitoring: Log and monitor all requests made by the image transformation service to detect anomalous behavior.
Timeline
Hackrate
Our platform helps companies to identify software vulnerabilities in a cost-efficient way. It provides a secure and centralized view of ethical hacking projects for your company.
US Patent Applied for HackGATE #63/645,845
Products
From the Blog
-
Ministry of Regional Development of the Czech Republic Launches Public Bug Bounty Program with Hackrate
Jul 16 • 2 min read ★
-
Measuring the Success of Bug Bounty Programs: Outdated vs. Modern Approaches
Mar 25 • 4 min read
-
Why choose managed Vulnerability Disclosure Programs (mVDP)?
Aug 30 • 10 min read
Hackrate Ethical Hacking Platform |
2025 ©