Skip to content

Commit c051403

Browse files
committed
f
1 parent 5a0e712 commit c051403

1 file changed

Lines changed: 2 additions & 2 deletions

File tree

src/pentesting-web/ssrf-server-side-request-forgery/cloud-ssrf.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -355,7 +355,7 @@ curl http://169.254.169.254/metadata/v1.json | jq
355355
>
356356
> Therefore, to find all the attached MIs you can do:
357357
>
358-
> - Get **attached identities with az cli** (if you have already compromised a principal in the Azure tenant)
358+
> - Get **attached identities with az cli** (if you have already compromised a principal in the Azure tenant with the permission `Microsoft.Compute/virtualMachines/read`)
359359
>
360360
> ```bash
361361
> az vm identity show \
@@ -386,7 +386,7 @@ curl http://169.254.169.254/metadata/v1.json | jq
386386
> "https://management.azure.com/subscriptions/$SUBSCRIPTION_ID/resourceGroups/$RESOURCE_GROUP/providers/Microsoft.Compute/virtualMachines/$VM_NAME?api-version=$API_VERSION" | jq
387387
> ```
388388
>
389-
> - **Get all** the defined managed identities in the tenant and **brute force** to see if any of them is attached to the VM:
389+
> - **Get all** the defined managed identities in the tenant and **brute force** to see if any of them is attached to the VM (the permission `Microsoft.ManagedIdentity/userAssignedIdentities/read` is needed):
390390
>
391391
> ```bash
392392
> az identity list

0 commit comments

Comments
 (0)