Reference:
執行 gpedit.msc
電腦設定 / 系統管理範本 / Windows元件 / 遠端桌面服務 / 遠端桌面工作階段主機 / 工作階段連線時間限制
第2, 3項不會把帳號登出(待測試),其它會把帳號登出。
High | Cloud Metadata Potentially Exposed |
Description | The Cloud Metadata Attack attempts to abuse a misconfigured NGINX server in order to access the instance metadata maintained by cloud service providers such as AWS, GCP and Azure. |
All of these providers provide metadata via an internal unroutable IP address '169.254.169.254' - this can be exposed by incorrectly configured NGINX servers and accessed by using this IP address in the Host header field. | |
URL | https://xxx.com.tw/latest/meta-data/ |
Method | GET |
Parameter | |
Attack | 169.254.169.254 |
Evidence | |
Instances | 1 |
Solution | Do not trust any user data in NGINX configs. In this case it is probably the use of the $host variable which is set from the 'Host' header and can be controlled by an attacker. |
Reference | https://www.nginx.com/blog/trust-no-one-perils-of-trusting-user-input/ |
CWE Id | |
WASC Id | |
Plugin Id | 90034 |