Cloud Metadata Potentially Exposed

Type: Active Scan

Risk: High


The Cloud Metadata Attack attempts to abuse a misconfigured NGINX server in order to access the instance metadata maintained by cloud service providers such as AWS, GCP and Azure. All of these providers provide metadata via an internal unroutable IP address ‘’ - this can be exposed by incorrectly configured NGINX servers and accessed by using this IP address in the Host header field.


Do not trust any user data in NGINX configs. In this case it is probably the use of the $host variable which is set from the ‘Host’ header and can be controlled by an attacker.



Last updated: 2020-04-30 16:12:39.623Z