👑Find SSRF (CWE-918)
___Detection:___
Check out Parameters in the path of a URL or in the body of a request such as /file=, /path=, /src= /url= to see if the application can send requests only to whitelisted applications
Check out if there is PDF or any other file export tool in place which may be vulnerable to SSRF
Once you have an indicator that an application might be vulnerable to SSRF, you have to weaponize your payloads
In a first attempt, we could try to reach internal network addresses. Try inserting private IP addresses and see if you get a response (e.g. 192.168.0.137,http://127.00.1,http://localhost http://169.254.169.254/ and http://Burp-Collaborator, If you try out every possible IP address in an automated fashion, you can run a full fledged port scan of the target network like:
What you can do for all of the above is to try various URL schemes such as file://, ftp://, dict://, sftp://, ldap://, tftp://, gopher://. Like:
file://, ftp://, dict://, sftp://, ldap://, tftp://, gopher://. Like:Next up, you could try to query a metadata API of a cloud provider (e.g. http://169.254.169.254/latest/user-data/iam/security-credentials/ with Differnt Endpoints
http://169.254.169.254/latest/user-data/iam/security-credentials/ with Differnt EndpointsCommon Bypasses:
URL encoding (1x,2x,3x)
Protocol Validation Bypasses:
Host Validation Bypasses:
Parameter Scan for SSRF
___Basic localhost Payloads:___
___File path:___
___File path Bypass:___
___With other protocols:___
___From XSS:___
With iframe injection:
___AWS:___
___Google Cloud:___
___Azure:___
Last updated