CVE-2026-42864
FireFighter · FireFighter Incident Management
FireFighter incident management application contains an unauthenticated SSRF vulnerability that can lead to the theft of AWS IAM credentials.
Executive summary
An unauthenticated attacker can exploit an SSRF vulnerability in the FireFighter API to exfiltrate sensitive AWS IAM credentials from the underlying infrastructure.
Vulnerability
This is a Server-Side Request Forgery (SSRF) vulnerability in the /api/v2/firefighter/raid/jira_bot endpoint. An unauthenticated attacker can force the application to fetch arbitrary URLs, which, in cloud environments without IMDSv2, leads to the exposure of temporary AWS credentials.
Business impact
The impact of this vulnerability is critical, as it provides an attacker with direct access to cloud resources via stolen IAM credentials. With a CVSS score of 9.9, this vulnerability can lead to full compromise of the cloud environment and any data residing within.
Remediation
Immediate Action: Update FireFighter to version 0.0.54 or later.
Proactive Monitoring: Monitor AWS CloudTrail logs for unauthorized API calls originating from the application's IAM role.
Compensating Controls: Enforce IMDSv2 (Instance Metadata Service Version 2) on all EC2/EKS instances to require session-oriented authentication for metadata requests.
Exploitation status
Public Exploit Available: false
Analyst recommendation
This vulnerability is extremely severe. Immediate patching is required, and administrators must simultaneously verify that IMDSv2 is strictly enforced across their cloud infrastructure to prevent credential exfiltration.