SSRF
Detection - Vulnerable Parameters
Basic payload
Paylod List
Finding SSRF with Burp
Match: https?:\/\/(www\.)?[-a-zA-Z0–9@:%._\+~#=]{1,256}\.[a-zA-Z0–9()]{1,6}\b([-a-zA-Z0–9()@:%_\+.~#?&//=]*)
Replace: https://{YOUR_SERVER}/ (Burp Collaborator)
Source: https://x.com/intigriti/status/1848288871735320916?t=bTTpk3N1LoqLpO1768DhQw&s=03
Port scan
Filter Bypass
Decimal notation
Other notation
More payload: https://book.hacktricks.xyz/pentesting-web/ssrf-server-side-request-forgery/url-format-bypass
Use your own server to redirect on localhost
redirector.py
:
Run redirector server:
Vicitim payload: http://[YOUR_IP]
DNS Rebinding
Also try 127.0.0.1
and 169.254.169.254
More payloads
Also check Paylaod List
Cloud Metadata IP
URL / Host Validation Bypass
Replace "{CANARY_TOKEN}" with your controlled hostname and replace "example.com" with a whitelisted target host.
Bypassing protocol whitelists
Gopher
Blind SSRF with OOB
See Use your own server to redirect on localhost
Platform to receive HTTP & DNS callbacks for SSRF (Blind) - interactsh
SSRF (XSS) in PDF Generator
Some PDF generators rely on the Chromium web browser without sandbox security enabled and with root privileges. This can often be further escalated to remote code execution!
NextJS apps
CVE-2024-34351 - fixed in v14.1.1.
Tools
SSRFmap
Autossrf
0dSSRF
SSRFPwned
Resources
Last updated