Lab 9: Basic SSRF against the local server

 Here I have to exploit SSRF

The first thing I will do is look at the requests  that the web page makes with Burpsuite

The website has an option to check the stock of an item.

This has to connect to the backend. If i am able to change this request with the loopback address which is often trusted then I can access a page that I don’t have normal access to.



Here is the request and as can be seen it is accessing the backend.


By changing the request to http://localhost/admin i was able to gain access to the admin page and delete a user.


After looking at the request I saw that the path to delete Carlos was to go /admin/delete?username=carlos

I then added this to my original path and sent it, I then followed the request and it worked.


The user Carlos was deleted and the lab was done.

Comments

Popular posts from this blog

Practitioner Lab 1: File path traversal, traversal sequences blocked with absolute path bypass

Practitioner Lab 7: SSRF with filter bypass via open redirection vulnerability

Practitioner Lab 4: File path traversal, validation of start of path

Practitioner Lab 5:File path traversal, validation of file extension with null byte bypass