Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 187

Cloud Metadata SSRF

What is Cloud Metadata SSRF?

Cloud Metadata SSRFA server-side request forgery attack that abuses a vulnerable application to query a cloud provider's instance metadata service and steal temporary credentials.


Cloud metadata SSRF abuses an application that fetches URLs on behalf of the user to make the underlying virtual machine query its instance metadata service (IMDS), typically at 169.254.169.254. The response contains environment data and, crucially, short-lived IAM credentials bound to the instance role. The Capital One breach of 2019, attributed to Paige Thompson, used this technique against a misconfigured AWS WAF to obtain credentials and download over one hundred million customer records from S3. Mitigations include enforcing IMDSv2 with session tokens, network-level egress filtering to 169.254.169.254, minimal instance role permissions, and rigorous SSRF input validation in proxies and image fetchers.

Examples

  1. 01

    An image-resizing endpoint that retrieves http://169.254.169.254/latest/meta-data/iam/security-credentials/ to steal role credentials.

  2. 02

    Capital One 2019: SSRF against a vulnerable WAF returns AWS keys later used to read S3 buckets.

Frequently asked questions

What is Cloud Metadata SSRF?

A server-side request forgery attack that abuses a vulnerable application to query a cloud provider's instance metadata service and steal temporary credentials. It belongs to the Cloud Security category of cybersecurity.

What does Cloud Metadata SSRF mean?

A server-side request forgery attack that abuses a vulnerable application to query a cloud provider's instance metadata service and steal temporary credentials.

How does Cloud Metadata SSRF work?

Cloud metadata SSRF abuses an application that fetches URLs on behalf of the user to make the underlying virtual machine query its instance metadata service (IMDS), typically at 169.254.169.254. The response contains environment data and, crucially, short-lived IAM credentials bound to the instance role. The Capital One breach of 2019, attributed to Paige Thompson, used this technique against a misconfigured AWS WAF to obtain credentials and download over one hundred million customer records from S3. Mitigations include enforcing IMDSv2 with session tokens, network-level egress filtering to 169.254.169.254, minimal instance role permissions, and rigorous SSRF input validation in proxies and image fetchers.

How do you defend against Cloud Metadata SSRF?

Defences for Cloud Metadata SSRF typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Cloud Metadata SSRF?

Common alternative names include: Instance metadata SSRF, IMDS SSRF.

Related terms

See also