Lab 9: Basic SSRF against the local server

 Here I have to exploit SSRF

The first thing I will do is look at the requests  that the web page makes with Burpsuite

The website has an option to check the stock of an item.

This has to connect to the backend. If i am able to change this request with the loopback address which is often trusted then I can access a page that I don’t have normal access to.



Here is the request and as can be seen it is accessing the backend.


By changing the request to http://localhost/admin i was able to gain access to the admin page and delete a user.


After looking at the request I saw that the path to delete Carlos was to go /admin/delete?username=carlos

I then added this to my original path and sent it, I then followed the request and it worked.


The user Carlos was deleted and the lab was done.

Comments

Popular posts from this blog

Vulnerability Management(Nessus)

Active Directory Home Lab

Practitioner Lab 2: File path traversal, traversal sequences stripped non-recursively

TightVNC and Colasoft Packet Builder Lab