appsec.fyi

A somewhat curated list of links to various topics in application security.

Server-Side Request Forgery (SSRF)

LinkExcerptWord Count
reddelexc/hackerone-reportsTops of HackerOne reports. All reports' raw info stored in data.csv. Scripts to update this file are written in Python 3 and require chromedriver and Chromium executables at PATH. Every script contains some info about how it works. The run order of scripts: Tops 100.341
Top 25 Vulnerability Parameters based on frequencyFor basic researches, top 25 vulnerable parameters based on frequency of use with reference to various articles. These parameters can be used for automation tools or manual recon.138
SSRFIREAn automated SSRF finder. Just give the domain name and your server and chill! ;) It also has options to find XSS and open redirects. If you don't have burpsuite professional, you can use interact sh by the awesome projectdiscovery team as your server.649
Th0h0/autossrfSummary autoSSRF is your best ally for identifying SSRF vulnerabilities at scale.297
SSRFmapSSRF are often used to leverage actions on other services, this framework aims to find and exploit these services easily. SSRFmap takes a Burp request file as input and a parameter to fuzz.913
Server-Side Request Forgery (SSRF) vulnerable LabThis repository contain PHP codes which are vulnerable to Server-Side Request Forgery (SSRF) attack. In programming languages, there are functions which can fetch the contents of locally saved file. These functions may be capable of fetching the content from remote URLs as well local files (e.870
Hunting for SSRF Bugs in PDF Generators If you’ve been on a website and noticed one of the following features, there’s a good chance you’ve stumbled upon a hot spot for server-side request forgery (SSRF) bugs: Print a certificate of completion Generate a report Submit a digital signature Before getting into the nuts ‘n’ bolts of2634
Oh snap! We don't support this version of your browser, and neither should you!You are visiting this page because we detected an unsupported browser. Your browser does not support security features that we require. We highly recommend that you update your browser. If you believe you have arrived here in error, please contact us. Be sure to include your browser version.48
rbndrrbndr is a very simple, non-conforming, name server for testing software against DNS rebinding vulnerabilities. The server responds to queries by randomly selecting one of the addresses specified in the hostname and returning it as the answer with a very low ttl.545
XSSRF : The Matrimony of XSS and SSRF.Hey folks, Nauman Khan back in action! 🚀 Today, we’re diving into the depth of XSSRF — where Server-Side Request Forgery (SSRF) meets Cross-Site Scripting (XSS). Lets Learn How I was able to turn an Informative(P5) SSRF to an High(P2) Severity Vulnerability And Got $$$ for it.407
assetnote/surfsurf allows you to filter a list of hosts, returning a list of viable SSRF candidates. It does this by sending a HTTP request from your machine to each host, collecting all the hosts that did not respond, and then filtering them into a list of externally facing and internally facing hosts.553
SSRF Bypass ListBase-Url: 127.0.0.1 Client-IP: 127.0.0.1 Http-Url: 127.0.0.1 Proxy-Host: 127.0.0.1 Proxy-Url: 127.0.0.1 Real-Ip: 127.0.0.1 Redirect: 127.0.0.1 Referer: 127.0.0.1 Referrer: 127.0.0.1 Refferer: 127.0.0.1 Request-Uri: 127.0.0.1 Uri: 127.0.0.1 Url: 127.0.0.1 X-Client-IP: 127.0.0.44
Server-side request forgery (SSRF) in Web App Penetration Testing | 2023Server-side request forgery is a web security vulnerability that allows an attacker to cause the server-side application to make requests to an unintended location.516
“The future of SSRF attacks” Machine learning and AI-based exploitationAs the world becomes increasingly digital, cybersecurity threats are evolving at an unprecedented pace. One of the vulnerabilities that has been on the rise is Server-Side Request Forgery (SSRF), and its future holds both potential for defenders and challenges for security professionals.528
Exploring the SSRF attack surfaceServer-Side Request Forgery (SSRF) is a critical security vulnerability that often goes unnoticed, leaving web applications and cloud services exposed to potential attacks. Understanding the SSRF attack surface is the first step in mitigating this threat effectively.526
Exploit Server-Side Request Forgery SSRF POC | Find and Exploit Server-Side Request Forgery SSRF#exploitssrf #ssrf #exploit Exploit Server-Side Request Forgery SSRF | Find and Exploit Server-Side Request Forgery SSRF. What is SSRF (Server-side request forgery)? Tutorial ... Learn what server-side request forgery (SSRF) is, how it works, and how to exploit it. Find out the impact of SSRF at0
Find and Exploit Server-Side Request Forgery (SSRF) Using Burp Suite | Bug Bounty Live❗| THIS VIDEO IS ONLY FOR EDUCATIONAL PURPOSE ------------------------------------------------ The Regex to Use: (https?:\/\/(?:www\.|(?!www))[a-zA-Z0-9][a-zA-Z0-9-]+[a-zA-Z0-9]\.[^\s]{2,}|www\.[a-zA-Z0-9][a-zA-Z0-9-]+[a-zA-Z0-9]\.[^\s]{2,}|https?:\/\/(?:www\.|(?!www))[a-zA-Z0-9]+\.[^\s]{2,}|www\0
SSRF EXPLOITATION: FILE DISCLOSURE | 2023 | BUG BOUNTYNote: This video is only for educational purpose. Intigriti: https://go.intigriti.com/bepractical Hi everyone! In this video, you will learn how to exploit server side request forgery to file disclosure vulnerability Website: https://bepractical.tech Telegram: https://telegram.me/bepracticaltech0
Penetration Testing for Server-Side Request Forgery (SSRF) in E-commerce PlatformsE-commerce platforms are highly vulnerable to various security threats, and one of the most critical vulnerabilities is Server-Side Request Forgery (SSRF).898
Breaking Down SSRF on PDF Generation: A Pentesting GuideSo today’s article is about the approach for hunting SSRF, I will be more focused on the PDF generation side. Let’s dive into it! Server side request vulnerability occurs when an attacker can manipulate the input to a web application that triggers a request from the server to a remote resource.1211
IntroductionIntroduction What is Server Side Request Forgery (SSRF)? Server Side Request Forgery occurs when you can coerce a server to make arbitrary requests on your behalf.3227
How Orca Found Server-Side Request Forgery (SSRF) Vulnerabilities in Four Different Azure ServicesAs part of the Orca Research Pod efforts, we regularly research various cloud provider services and capabilities to help our customers keep their assets safe and secure in the cloud.1423
Security Bugs in Practice: SSRF via Request SplittingOne of the most interesting (and sometimes scary!) parts of my job at Mozilla is dealing with security bugs.2585
SSRF Cross Protocol Redirect Bypass · Doyensec's BlogServer Side Request Forgery (SSRF) is a fairly known vulnerability with established prevention methods. So imagine my surprise when I bypassed an SSRF mitigation during a routine retest.928
Securing PDF Generators Against SSRF VulnerabilitiesA couple of months ago, I was trying to figure out how I could secure a PDF generator running in AWS Lambda against SSRF attacks. SSRF attacks are a type of attack where an attacker can trick a service into making requests to arbitrary external resources.558
Mitigating SSRF in 2023Server-Side Request Forgery (SSRF) is a vulnerability that allows an attacker to trick a server-side application to make a request to an unintended location. SSRF, unlike most other specific vulnerabilities, has gained its own spot on the OWASP Top 10 2021.2879
Azure SSRF MetadataAzure provides a metadata service that allows applications on a Virtual Machine (VM) to access information about the machine’s configuration, including any associated service account credentials. The sensitivity of this information makes it a common target for adversaries.2736
JavaScript is not available.We’ve detected that JavaScript is disabled in this browser. Please enable JavaScript or switch to a supported browser to continue using twitter.com. You can see a list of supported browsers in our Help Center.49
Blind SSRF - The TrayHi fellow hunters, in this write-up, I will explain how I found a Blind SSRF and got a red bull tray as a reward. The Redbull Bug Bounty program is on Intigriti’s Platform. Blind SSRF is a type of SSRF attack where the attacker cannot see the response from the server.383
Attacking APIs with SSRF and how to prevent itBased on the 2023 OWASP API Security Top 10 this is one of the common attack types. The exploitability and detectability are easy making it quite dangerous. Server-Side Request Forgery (SSRF) flaws occur when an API is fetching a remote resource without validating the user-supplied URL.378
AppSec Tales XVII | SSRFApplication Security Testing for the Server Side Request Forgery. The article describes how to test the application to find Server Side Request Forgery vulnerabilities. The advice in this article is based on the following:220
11.2 Lab: Exploiting XXE to perform SSRF attacks | 2023This lab has a “Check stock” feature that parses XML input and returns any unexpected values in the response. The lab server is running a (simulated) EC2 metadata endpoint at the default URL, which is http://169.254.169.254/.311
“SSRF to RCE” A case study in exploiting chained vulnerabilitiesServer-Side Request Forgery (SSRF) vulnerabilities are known to be serious, allowing attackers to manipulate requests from a web application.514
“Bypassing SSRF protection measures” Techniques for evading WAFs and input validationServer-Side Request Forgery (SSRF) vulnerabilities are a persistent threat to web applications and cloud services. To exploit SSRF, attackers often need to bypass security measures such as Web Application Firewalls (WAFs) and input validation checks.550
“SSRF hunting in the cloud” Exploiting misconfigured services in cloud environmentsServer-Side Request Forgery (SSRF) vulnerabilities have become increasingly prevalent in cloud environments due to the growing adoption of cloud services and the complexities they introduce. These vulnerabilities often stem from misconfigured services and can have devastating consequences.512
What is SSRF? (Portswigger – Lab: Basic SSRF against the local server)Hello Cyberman! This article subject SSRF attacks. This series of articles will be with Portswigger solutions.622
Testing for SSRF with Burp SuiteServer-side request forgery (SSRF) is a web security vulnerability that allows an attacker to induce the server-side application to make requests to an unintended location.361
SSRF vulnerabilities and where to find themIt’s no secret that cloud architectures have several characteristics that make SSRF attacks challenging to defend against. While SSRFs are not a new threat vector, they are often misunderstood and confused with CSRFs.1192
SSRF SheriffThis is an SSRF testing sheriff written in Go. It was originally created for the Uber H1-4420 2019 London Live Hacking Event, but it is now being open-sourced for other organizations to implement and contribute back to. Released under the MIT License.222
SSRF ProxySSRF Proxy SSRF Proxy is a multi-threaded HTTP proxy server designed to tunnel client HTTP traffic through HTTP servers vulnerable to Server-Side Request Forgery (SSRF). Once configured, SSRF Proxy attempts to format client HTTP requests appropriately for the vulnerable server.750
NucleiFuzzer - Powerful Automation Tool For Detecting XSS, SQLi, SSRF, Open-Redirect, Etc.. Vulnerabilities In Web ApplicationsNucleiFuzzer is an automation tool that combines ParamSpider and Nuclei to enhance web application security testing. It uses ParamSpider to identify potential entry points and Nuclei's templates to scan for vulnerabilities.227
My First Case of SSRF Using DirsearchHello, I am a 16-year-old bug bounty hunter. I would like to appreciate God Almighty for helping me to find this bug.380
Exploiting Non-Cloud SSRF for More Fun & ProfitLet's jump in directly, while hunting on some random target in my spare time, I came across one subdomain where we can see the reports related to the company and marketing, I found one functionality where we can see the report in pdf format.563
SSRF attacks explained and how to defend against themHowever, files and assets that are directly accessible to the general audience surfing the web might be accessible by the server itself. For example, as a visitor, you can easily request a public URL like https://www.csoonline.368
What are SSRF Attacks and How They Work to Disrupting Email SecuritySSRF attacks have gained momentum in recent years. They have been used as a break-in technique in significant attacks on organizations like Capital One and Microsoft.1259
0xdf hacks stuffMuch like CrossFit, CrossFitTwo was just a monster of a box. The centerpiece is a crazy cross-site scripting attack through a password reset interface using DNS to redirect the admin to a site I control to then have them register an account for me. I’ll then hijack some socket.37499
JavaScript is not available.We’ve detected that JavaScript is disabled in this browser. Please enable JavaScript or switch to a supported browser to continue using twitter.com. You can see a list of supported browsers in our Help Center.49
ssrfServer-side request forgery (also known as SSRF) is a web security vulnerability that allows an attacker to induce the server-side application to make HTTP requests to an arbitrary domain of the attacker’s choosing.782
Server-Side Request Forgery Attack Explained: Definition, Types, ProtectionA Server-Side Request Forgery attack (SSRF) is a security vulnerability in which a hacker tricks a server into accessing unintended resources on his behalf. An SSRF attack can lead to sensitive information being leaked or the attacker gaining control of other systems.978
Oh snap! We don't support this version of your browser, and neither should you!You are visiting this page because we detected an unsupported browser. Your browser does not support security features that we require. We highly recommend that you update your browser. If you believe you have arrived here in error, please contact us. Be sure to include your browser version.48
Exfiltrated, Signed, Delivered – What Can Go Wrong When an Amazon Elastic Compute Cloud (EC2) Instance is Exposed to SSRF TL; DR: Using CNAPPgoat, you can now experiment with a technique that leverages exposure to SSRF to trigger calls to AWS services from within an Amazon EC2 instance. Check it out!  CNAPPgoat is Ermetic’s open-source contribution to the multicloud environment landscape.1687
Cloud SSRFHackTricks HackTricks CloudTwitchYoutubeTwitter Search ⌃K Links 👾 Welcome! HackTricks About the author Getting Started in Hacking 🤩 Generic Methodologies & Resources Pentesting Methodology External Recon Methodology Pentesting Network Pentesting Wifi Phishing Methodology Basic Forensic Met3281
NucleiFuzzer - Powerful Automation Tool For Detecting XSS, SQLi, SSRF, Open-Redirect, Etc.. Vulnerabilities In Web ApplicationsNucleiFuzzer is an automation tool that combines ParamSpider and Nuclei to enhance web application security testing. It uses ParamSpider to identify potential entry points and Nuclei's templates to scan for vulnerabilities.227
SSRF (Server Side Request Forgery)HackTricks Search… ⌃K HackTricks Search… ⌃K 👾 Welcome! HackTricks About the author Getting Started in Hacking 🤩 Generic Methodologies & Resources Pentesting Methodology External Recon Methodology Pentesting Network Pentesting Wifi Phishing Methodology Basic Forensic Methodology Brute2136
On SSRF (Server Side Request Forgery) or Simple Stuff Rodolfo FoundI think the most we have to test against an application the better. But as you can see by yourself (correct me if I’m wrong please) the following set of scenarios and payloads are not addressed in most of the lists you can find out there for SSRF (Server Side Request Forgery).665
Awesome Bug Bounty ToolsAwesome Bug Bounty Tools A curated list of various bug bounty tools Contents Recon Subdomain Enumeration Port Scanning Screenshots Technologies Content Discovery Links Parameters Fuzzing Exploitation Command Injection CORS Misconfiguration CRLF Injection CSRF Injection Directory Traversal File Inc3853
SSRF vulnerabilities and where to find themServer-Side Request Forgery (SSRF) occurs when an application accepts a URL (or partial URL) from the user, then accesses that URL from the server. It’s important to note that SSRF is only a vulnerability if there is some security impact.1151
devanshbatham/Vulnerabilities-UnmaskedThis repo tries to explain complex security vulnerabilities in simple terms that even a five-year-old can understand! Imagine you have a toy box where you and your friends can put your favorite toys in and take them out whenever you want. Each of you can only take out your own toys.3169
SSRF vulnerabilities and where to find themServer-Side Request Forgery (SSRF) occurs when an application accepts a URL (or partial URL) from the user, then accesses that URL from the server. It’s important to note that SSRF is only a vulnerability if there is some security impact.1151
SSRF Cheat Sheet & Bypass Techniques ∞What is SSRF? Server Side Request Forgery (SSRF) is a web vulnerability that allows an attacker to exploit vulnerable functionality to access server side or local network services / functionality by affectively traversing the external firewall using vulnerable web functionality.625
Defender's Notes0
Server Side Request Forgery PreventionThe objective of the cheat sheet is to provide advices regarding the protection against Server Side Request Forgery (SSRF) attack. This cheat sheet will focus on the defensive point of view and will not explain how to perform this attack.3544
Server Side Request ForgeryServer-side request forgery (or SSRF) is a web security vulnerability that allows an attacker to induce the server-side application to make HTTP requests to an arbitrary domain of the attacker's choosing.610
Server-Side Request ForgeryServer Side Request Forgery or SSRF is a vulnerability in which an attacker forces a server to perform requests on their behalf. The service nip.io is awesome for that, it will convert any ip address as a dns.2640
Fun with SSRF - Turning the Kubernetes API Server into a port scannerI thought I’d start the new year with something a little fun that I’ve been looking at over the break (well for a certain definition of the word ‘fun’ :) ).752
raesene/k8s_ssrf_portscannerThis is a Proof of concept idea for using the Kubernetes API server as a port scanner via SSRF. This is a very simple PoC and is not intended to be used in production!759
SSRF SeriesSSRF (Server-Side Request Forgery: server-side request forgery) is a fake exploit server-initiated requests. Generally, SSRF attacks target internal systems that are not accessible from the external network. 1. Show response to attacker (basic) 2. Do now show response (blind)2008
Server Side Request Forgery (SSRF)0
AllThingsSSRFThis is currently work in progress I will add more resources as I find them. Detectfy - What is server side request forgery (SSRF)?1111
Escalating SSRF to Accessing all user PII information by aws metadataMy name is Santosh Kumar Sha, I’m a security researcher from India(Assam). In this article, I will be describing how I was able to leaked all user PII information by SSRF aws metadata exploitation. Don’t go outside without any reason . Stay home be safe and also safe other.1255
CodeNinjaPosted on June 27, 20213
Useful Mind MapsUseful Mind Maps Collection 1. IDOR Techniques 2. Testing 2FA 3. 2FA Bypass Techniques 4. Bugs in Register/ Signup Feature 5. Cookie_Based_Authentication_Vulnerabilities 6. SSRF 7. Tesing JIRA for CVE’s 8. OAUTH2 Pentesting Checklist 9. Testing OAUTH 10.34
The story of how I was able to chain SSRF with Command Injection VulnerabilityHope you’re doing well, I am Raj Qureshi and I am a penetration tester. today I am doing another write-up about one of my best findings ever. In this write-up, I will be describing how I was able to chain SSRF attack with command injection Vulnerability.430
SSRF’s up! Real World Server-Side Request Forgery (SSRF)In this blog post we’re going to explain what an SSRF attack is, how to test for it, and some basic guidelines on how to fix it. We will be using a real-world example, exploiting a vulnerability we discovered in a commercial Business Intelligence product called Dundas BI.1803
A Pentester’s Guide to Server Side Request Forgery (SSRF)What is SSRF? In a Server-Side Request Forgery (SSRF) attack, the attacker can abuse functionality on the server to read or update internal resources. The attacker can supply or modify a URL, which the code running on the server will read or submit data.703
Top 25 Vulnerability Parameters based on frequencyFor basic researches, top 25 vulnerable parameters based on frequency of use with reference to various articles. These parameters can be used for automation tools or manual recon.138
Server Side Request Forgery (SSRF) and AWS EC2 instances after Instance Meta Data Service version…Having blogged about exploiting SSRF on AWS EC2 instances in the past, we wanted to give you an update on where things stand now. Server Side Request Forgery can be an extremely lucrative finding to an attacker because of the ability to make requests from the target machine.1073
Block or report hackerscrollsContact GitHub support about this user’s behavior. Learn more about reporting abuse.82
SSRF0
/home/six2dez/.pentest-book/home/six2dez/.262
Web ApplicationApril 7, 2022Server-Side Request Forgery (SSRF)SSRF vulnerabilities allow an attacker to send crafted malicious requests from the back-end server of a vulnerable application. Criminals usually operate SSRF attacks to target internal systems that are behind firewalls and are not unrestricted from the external network.1333
Understanding and Testing for SSRFClint Kehr Ethical Hacker Senior Instructor6
Server-Side Request Forgery (SSRF) Attacks: The Ultimate GuideSeveral significant cybersecurity breaches in recent years, including Capital One and Microsoft Exchange, involved server-side request forgery (SSRF) as a penetration method. These exploits can give attackers access to your organization’s most sensitive data.1983
How To: Server-Side Request Forgery (SSRF)Server-Side Request Forgery, SSRF for short, is a vulnerability class that describes the behavior of a server making a request that’s under the attacker’s control. This post will go over the impact, how to test for it, the potential pivots, defeating mitigations, and caveats.2002
Beginner Guide To Exploit Server Side Request Forgery (SSRF) VulnerabilityServer Side Request Forgery (SSRF) is simply an attack where the server will make a request (act like a proxy) for the attacker either to a local or to a remote source and then return a response containing the data resulting from the request.1080
WSTG - v4.2Web applications often interact with internal or external resources. While you may expect that only the intended resource will be handling the data you send, improperly handled data may create a situation where injection attacks are possible.582
Burp Suite For Pentester: HackBarIsn’t it a bit time consuming and a boring task to insert a new payload manually every time for a specific vulnerability and check for its response?2021
SSRF (Server Side Request Forgery) testing resourcesStatus codes: 300, 301, 302, 303, 305, 307, 3081000
MindMaps 🗺️This repository stores and houses various Mindmaps for bug bounty Hunters🧑‍🦰, pentesters🧑‍🦰 and offensive(🔴)/defensive(🔵) security Professionals🫂 provided by me as well as contributed by the community🧑🏻‍🤝‍🧑🏽.472
Carrying Out Your First SSRF AttackHi, within this lecture we're going to do our first SSRF attack so that you can understand this in a much better way while implementing it or executing it yourself. So, let's see the example over here. So, it says that consider like an e-commerce application or e-commerce website.2131
Name already in useUse Trickest to easily build and automate workflows powered by the world's most advanced community tools. Get Access Today:2646
Server-Side Request Forgery (SSRF)In this chapter, we are going to learn about server-side request forgery (or also called SSRF). In a Server-Side Request Forgery (SSRF) attack, the attacker can abuse functionality on the server to read or update internal resources.1248
Server Side Request Forgery (SSRF) Attacks & How to Prevent ThemServer-Side Request Forgery (SSRF) attacks allow an attacker to make requests to any domains through a vulnerable server. Attackers achieve this by making the server connect back to itself, to an internal service or resource, or to its own cloud provider.2353
URL Format Bypass0
SSRF and Open Redirect CheatSheetSSRF Basic ?url=http://localhost/server-status ?url=http://127.0.0.1/server-status ?url=http://internal_domain/page ?url=http://internal_ip(192.138.0.14)/page Bypass SSRF with Special chars ?url=http://allow_domain.205
My First Bounty From SSRF: From Finding a Vulnerability to Cashing InHello peoples, I’m Muhammad Julfikar Hyder from Bangladesh back again with my first bounty story today. You can also read my previous blog here How I hacked LINE’s bucket.319
Server-Side Request Forgery(SSRF) CYBERTALENTSServer Side Request Forgery is a web security vulnerability that allows the attacker to interact with the internal infrastructure of the target which is not accessible from outside the target network.525
1. The Accidental SSRFOWASP top 10 includes SSRF in the categories, still finding SSRF can usually be tricky. These attacks occur when an application is fetching data from a user-supplied URL, without any validations.358
Server-Side Request Forgery (SSRF) involves an attacker tricking a server into making unauthorized…Server-Side Request Forgery (SSRF) involves an attacker tricking a server into making unauthorized requests on behalf of the attacker. This type of attack can be hazardous, as it can allow the attacker to gain access to sensitive information, such as user data or internal network details.1085
yeswehack/vulnerable-code-snippetsYesWeHack present code snippets containing several different vulnerabilities to practice your code analysis. The code snippets are beginner friendly but suitable for all levels!323
A Glossary of Blind SSRF ChainsWhat is Server Side Request Forgery (SSRF)? Server Side Request Forgery occurs when you can coerce a server to make arbitrary requests on your behalf. As the requests are being made by the server, it may be possible to access internal resources due to where the server is positioned in the network.3448
Hey man if I talk about the impact it is comparatively low than that of normal ssrf because of its…Hey man if I talk about the impact it is comparatively low than that of normal ssrf because of its one way nature. The only impact it has is you can steal the internal IPs and in rare case it can lead you to RCE.45
Server-Side Request Forgery (SSRF)- PortSwigger LabsThis lab has a stock check feature that fetches data from an internal system. To solve the lab, use the stock check functionality to scan the internal 192.168.0.X range for an admin interface on port 8080, then use it to delete the user carlos.253
SSRF Vulnerability From a Developer’s PerspectiveOWASP Top 10 provides users a list of vulnerabilities in the field of application security. This list is prepared based on the severity of the occurrence of an attack, SSRF is one of them.1037
Let’s Understand SSRF vulnerabilityIn most cases, the OWASP Top 10 will publish a list of vulnerabilities. These are the broad categories that encompass the various types of vulnerabilities.1157
👩‍💻Roadmap to Cybersecurity in 2022, Full-Read SSRF, IDOR in GraphQL, GCP Pentesting, and much…Watch this talk about $25 billion+ of value, locked in the practical attacks against bridges. Welcome to the #IWWeekly28 — the Monday newsletter that brings the best in Infosec straight to your inbox.737
👩‍💻 $600k Bounty, Jetty Features, Response Queue Poisoning, Bypass SSRF Protections, XSS…This simple business logic flaw in smart contracts resulted in a $600K bounty. Welcome to the #IWWeekly26 — the Monday newsletter that brings the best in Infosec straight to your inbox.653
Exploiting XXE for SSRFServer-Side Request Forgery (SSRF):- SSRF is an attack in which an attacker can force a vulnerable server to trigger malicious requests to third-party servers and or to internal resources.636
The Tale Of SSRF To RCE on .GOV DomainWelcome back, I hope everyone is well. Without further hesitation let’s dive into it! What is SSRF? SSRF is Server Side Request Forgery. This is a high/critical vulnerability when demonstrated with impact.423
Top 25 Server-Side Request Forgery (SSRF) Bug Bounty ReportsIn this article, we will discuss the Server-Side Request Forgery (SSRF) vulnerability, and present 25 disclosed reports based on this flaw. SSRF is when you, as an attacker, successfully make the application triggering arbitrary requests.885
Dark Side 108: Intro to SSRFToday’s challenge demonstrated a Server-Side Request Forgery attack. As it sounds, this attack tricks a website into letting a user into the backend server supporting a public facing web application. These vulnerabilities usually exist as a result of improper error handling…51
A Pentester’s Guide to Server Side Request Forgery (SSRF)This blog will be one of many created alongside our Hacking How-To series, an educational video series around everyday pentest findings. The first installment will explore Server Side Request Forgery (SSRF).760
AWS internal metadata accessed through SSRF by Chaining an Open Redirect bugMy name is Santosh Kumar Sha, I’m a security researcher from India(Assam). In this article, I will be describing how I was able to get AWS metadata accessed through SSRF by chaining it with a open direct vulnerability This is the write of my Recent bug that i found .941
SSRF payloadsThe service nip.io is awesome for that, it will convert any ip address as a dns. Allows an attacker to fetch any content from the web, it can also be used to scan ports.1537
How i converted SSRF TO XSS in jira.Before i start Acunetix does Subdomain scans so just set the time out to 20 and you will get a really big list with banners and response headers. (it does the half of the work for you.) Now, i een through lots of subdomains and i was specifically looking for any jira environment , and i found one.313
Finding SSRF via HTML Injection inside a PDF file on AWS EC2During a recent application vulnerability assessment we found a Stored HTML Injection vulnerability that was quickly escalated to a full Server Side Request forgery (SSRF) on a AWS EC2. We test a lot of applications hosted in AWS, especially on EC2.1191
Escalating SSRF to Accessing all user PII information by aws metadataMy name is Santosh Kumar Sha, I’m a security researcher from India(Assam). In this article, I will be describing how I was able to leaked all user PII information by SSRF aws metadata exploitation. Don’t go outside without any reason . Stay home be safe and also safe other.1255
Blind SSRF - The Hide & Seek GameHello everyone I wanted to share one of my finding related to Blind SSRF on a private program on HackerOne for which they paid me $400. Blind SSRF vulnerabilities occur when an application is making a request to a back-end server due to some reasons but the response is not shown on the front-end.577
Exploiting: SSRF For Admin AccessServer-Side Request Forgery (SSRF):- SSRF is an attack in which an attacker can force a vulnerable server to trigger malicious requests to third-party servers and or to internal resources.568
Server-Side Request ForgeryServer-side request forgery, or SSRF, is a vulnerability that allows an attacker to use a vulnerable server to make HTTP requests on the attacker’s behalf. This is similar to CSRF as both the vulnerabilities perform HTTP requests without the victim acknowledging it.834
From SSRF To RCE in PDFReacterWhat is PDFReacter? - PDFReacter is a parser which parses HTML content from HTML to PDF. While testing an application I have identified that an application is using the PDFReacter parser.331
Server Side Request Forgery (SSRF) TestingWell this story is just for fun testing SSRF not a bounty write up. I found a random web that vulnerable to SSRF but in order to exploit it i should convert my input to base64. Here is the site . If i decode the base64 then i got this pacman game site http://www.top80sgames.com/site/content/pacman.201
Exploiting an SSRF: Trials and TribulationsI mostly wanted to share this post not because it’s a novel and unique attack, but to show the thought process of attacking this particular functionality, and understanding how the system works to identify what would and would not work.1614
Chaining an Blind SSRF bug to Get an RCEMy name is Santosh Kumar Sha, I’m a security researcher from India(Assam). In this article, I will be Discussing how I was able to get RCE by using Blind SSRF. But still there is a chance that will will missing some url.603
SSRFNot all SSRF vulnerabilities return the response to the attacker. This type of SSRF is known as blind SSRF To demonstrate we will use test.smtp.org testing server.1078
Story of a 2.5k Bounty — SSRF on Zimbra Led to Dump All Credentials in Clear TextThis post is about how I and my friend got roughly 2500$ from Cafebazaar bug bounty program. During the recon phase, I enumerated the mailx.hezardastan.net host, the Cafebazaar’s webmail access. I conducted a port scanner:704
My First Bug: Blind SSRF Through Profile Picture UploadHello all! This is a writeup for my first bug, an SSRF! My next writeup will most likely be about my specific approach to learning in bugbounty hunting which I hope will be massively helpful for newcomers. Feel free to follow me right here on medium, or on twitter for updates.940
Story Behind Sweet SSRF.Hey everyone! I hope you all are doing well! Rohit soni is back with another write-up and this time it’s about critical SSRF which leads to AWS credentials disclosure. Let’s dive into it without wasting time.947
PHP SSRF TechniquesIn this article, I want to go deep on a few SSRF techniques that you can use against a PHP script that use filters like filter_var() or preg_match() and get HTTP contents using curl or file or file_get_contents().1444
Story of a really cool SSRF bug.Hello all! My name is Vedant, also known as Vegeta(on twitter). I’m a cybersecurity enthusiast and a bug bounty hunter. This is my first write-up of 2021. This write-up is about a SSRF vulnerability that allowed me to access the AWS metadata of the target company. So let’s get started,511
How Github recon help me to find NINE FULL SSRF Vulnerability with AWS metadata accessMy name is Santosh Kumar Sha, I’m a security researcher from India(Assam). In this article, I will be describing how I was able to to find 9 full SSRF vulnerability with AWS metadata access BY doing some GITHUB recon. Don’t go outside without any reason . Stay home be safe and also safe other.904
Finding SSRF BY Full AutomationMy name is Santosh Kumar Sha, I’m a security researcher from India(Assam). In this article, I will be describing how I was able to Find ssrf vulnerability by bu automating it and leak private information amazon metadata, ec2 and cloud services.439
Reading Internal Files using SSRF vulnerabilityNeeraj SonaniyaOct 16, 20172 min read·I am hunting on one private program since last 8 months, since it doesn’t allow disclosure i will keep organization REDACT, in requests i will use ‘example.com’ as its name.263
Intro to SSRFSuccessful cyberattacks often start at the “network perimeter”. As a company grows, it becomes increasingly difficult to secure the hundreds and thousands of machines on the network.1060
The journey of Web Cache + Firewall Bypass to SSRF to AWS credentials compromise!Hi Guys, Back with an interesting hack that I was eagerly waiting to get the writeup to publish. This hack is about a chain of vulnerabilities which includes multiple bypasses in a various different layer which finally lead to access of AWS credentials in India’s biggest stock broker company.867
$10000 Facebook SSRF — Bug BountyThis is a write-up about a SSRF vulnerability I found on Facebook. The vulnerability could have allowed a malicious user to send internal requests to the Facebook corporate network.266
Vimeo upload function SSRFAs you can see, It sends the file URL with google authorization to let the backend server fetch the file from the url and pass the authorization on the header to access the file from google drive.590
Just Gopher It: Escalating a Blind SSRF to RCE for $15kThe bug bounty program which this vulnerability was discovered on has not allowed for public disclosure, therefore I will not be directly naming the program involved. What I can say — this was discovered on the main scope of one of Hackerone’s longest-running, largest bug bounty programs.1685
Bypassing SSRF ProtectionOk. So you’ve found a feature on a web application that fetches external resources. You’re able to pull content from all sorts of external sites and there doesn’t seem to be any restrictions on the file type that you can request… The application displays everything right back at you.71
SSRF - Server Side Request Forgery (Types and ways to exploit it) Part-1What is SSRF? Server Side Request Forgery (SSRF) refers to an attack where in an attacker is able to send a crafted request from a vulnerable web application.932
How i found an SSRF in Yahoo! Guesthouse (Recon Wins)As i said before sharing is caring, here i am describing one of my findings that was closed 2 weeks ago in yahoo Guesthouse https://gh.bouncer.login.yahoo.com/ and i am describing in details, how recon helped me finding a vulnerable endpoint where i achieved the SSRF.1303
SSRF in the WildThis is an analysis of publicly disclosed SSRF vulnerabilities. I will go into where these vulnerabilities were found, the criticality of these bugs, and the fixes implemented by the vendor after the report.1425
Vimeo SSRF with code execution potential.Recently I discovered a semi responded SSRF on Vimeo with code execution possibility. This blog post explains how I found & exploited it. So let's get started. Vimeo provides an API console for their API called API Playground, The requests made using this web app is done from server-side.934
Multiple HTTP Redirects to Bypass SSRF ProtectionsI needed to utilize many known SSRF techniques at once to successfully exploit many endpoints in the same company. After discovering away, I applied it to all functionalities that use attacker-controlled URLs and found 2 blind and 1 full read SSRFs.838
lorsrflorsrf Bruteforcing on Hidden parameters to find SSRF vulnerability using GET and POST Methods NOTE Lorsrf has been added to scant3r with useful additions (multi http method , multi content-type (json , query , xml , speed , large worlist and more)) https://github.288
What is Server-Side Request Forgery (SSRF)?Server-side request forgery (SSRF) vulnerabilities let an attacker send crafted requests from the back-end server of a vulnerable web application. Criminals usually use SSRF attacks to target internal systems that are behind firewalls and are not accessible from the external network.897
An overlooked parameter leads to a critical SSRF in Dropbox bug bounty programCheck out Intigriti: https://www.intigriti.com/ 📧 Subscribe to BBRE Premium: https://bbre.dev/premium ($20 OFF with code BIRTHDAY) ✉️ Sign up for the mailing list: https://bbre.dev/nl 📣 Follow me on Twitter: https://bbre.dev/tw This video is an explanation of an SSRF found by Harsh Jaisw0
This one trick will exploit URL parsers to perform SSRFIn this write up, I will be detailing my thought process and solution to the Hack the Box (HTB) web challenge: Weather App. I learned main pieces of how to do such an exploit from the presentation: A New Era of SSRF — Exploiting URL Parser in Trending Programming Languages! by Orange Tsai.1288
SVG SSRF CheatsheetHosts that process SVG can potentially be vulnerable to SSRF, LFI, XSS, RCE because of the rich feature set of SVG. All of these methods specify a URI, which can be absolute or relative.1445
Capital One SSRF | Kontra0
Awesome SSRF writeupsThis is currently work in progress I will add more resources as I find them.30
SSRFmapSSRF are often used to leverage actions on other services, this framework aims to find and exploit these services easily. SSRFmap takes a Burp request file as input and a parameter to fuzz.913
10 Types of Web Vulnerabilities that are Often MissedDetectify Crowdsource is not your average bug bounty platform. It’s an invite-only community for ethical hackers passionate about securing modern technologies and end users.3850
SSRF In The WildThis is an analysis of publicly disclosed SSRF vulnerabilities. I will go into where these vulnerabilities were found, the criticality of these bugs, and the fixes implemented by the vendor after the report.1416
Story of a really cool SSRF bug.Hello all! My name is Vedant, also known as Vegeta(on twitter). I’m a cybersecurity enthusiast and a bug bounty hunter. This is my first write-up of 2021. This write-up is about a SSRF vulnerability that allowed me to access the AWS metadata of the target company. So let’s get started,511
$10000 Facebook SSRF — Bug BountyThis is a write-up about a SSRF vulnerability I found on Facebook. The vulnerability could have allowed a malicious user to send internal requests to the Facebook corporate network.266
Top 25 Vulnerability Parameters based on frequencyFor basic researches, top 25 vulnerable parameters based on frequency of use with reference to various articles. These parameters can be used for automation tools or manual recon.138
🔥 ssrf-king 🔥🔥 ssrf-king 🔥 v1.303
How i found 3 SSRF in one day on different bug bounty targets.My name is damanpreet singh. This is my first write-up, so please forgive me for my mistakes. So, lets start: I started bug bounties after about a year. I was only learning, still i am learning. So, some days ago i thought , now i should start to looking for bugs.487
Server Side Request ForgeryServer side request forgery is one of the web vulnerabilities which allows an attacker to use the backend server to make unintended requests to the internal systems.796
Finding SSRF via HTML Injection inside a PDF file on AWS EC2During a recent application vulnerability assessment we found a Stored HTML Injection vulnerability that was quickly escalated to a full Server Side Request forgery (SSRF) on a AWS EC2. We test a lot of applications hosted in AWS, especially on EC2.1191
The journey of Web Cache + Firewall Bypass to SSRF to AWS credentials compromise!Hi Guys,Back with an interesting hack that I was eagerly waiting to get the writeup to publish. This hack is about a chain of vulnerabilities which includes multiple bypasses in a various different layer which finally lead to access of AWS credentials in India’s biggest stock broker company.830
Vimeo SSRF with code execution potential.Recently i discovered a semi responded SSRF on Vimeo with code execution possibility. This blog post explains how i found & exploited it. So lets get started. Vimeo provides an API console for their API called API Playground, The requests made using this web app is done from server side.930
[bugbounty] A Simple SSRF0
Server Side Request Forgery (SSRF) and AWS EC2 instances after Instance Meta Data Service version…Having blogged about exploiting SSRF on AWS EC2 instances in the past, we wanted to give you an update on where things stand now. Server Side Request Forgery can be an extremely lucrative finding to an attacker because of the ability to make requests from the target machine.1073
Intro to SSRFSuccessful cyberattacks often start at the “network perimeter”. As a company grows, it becomes increasingly difficult to secure the hundreds and thousands of machines on the network.1060
B-XSSRF - Toolkit To Detect And Keep Track On Blind XSS, XXE And SSRFToolkit to detect and keep track on Blind XSS, XXE & SSRF.90
SSRF bible. Cheatsheet - Google Docs0
SSRF in the WildThis is an analysis of publicly disclosed SSRF vulnerabilities. I will go into where these vulnerabilities were found, the criticality of these bugs, and the fixes implemented by the vendor after the report.1425
Bypassing SSRF ProtectionOk. So you’ve found a feature on a web application that fetches external resources. You’re able to pull content from all sorts of external sites and there doesn’t seem to be any restrictions on the file type that you can request… The application displays everything right back at you.71
B-XSSRFB-XSSRF Toolkit to detect and keep track on Blind XSS, XXE & SSRF SETUP Upload the files to your server. Create a Database and upload database.sql file to it. Change the DB Credentials in db.php file. Ready. USAGE BLIND XSS <embed src="http://mysite.com/bxssrf/request.92
SSRF in the WildThis is an analysis of publicly disclosed SSRF vulnerabilities. I will go into where these vulnerabilities were found, the criticality of these bugs, and the fixes implemented by the vendor after the report.1425
Bypassing SSRF ProtectionOk. So you’ve found a feature on a web application that fetches external resources. You’re able to pull content from all sorts of external sites and there doesn’t seem to be any restrictions on the file type that you can request… The application displays everything right back at you.71
SSRF Vulnerability due to Sentry misconfigurationThat story happened when I saw that disclosed report. And funny thing is that I remembered that saw some Sentry requests in my BuprSuit Proxy in my current project. From that point of view, I highly recommend to not filtering Proxy history.251
SVG XLink SSRF fingerprinting libraries versionSince parser is blocking SYSTEM based entities our attack surface has been limited, Now it’s time to test Billion Laughs attack since application allowed static entities.565
The journey of Web Cache + Firewall Bypass to SSRF to AWS credentials compromise!Hi Guys,Back with an interesting hack that I was eagerly waiting to get the writeup to publish. This hack is about a chain of vulnerabilities which includes multiple bypasses in a various different layer which finally lead to access of AWS credentials in India’s biggest stock broker company.830
From SSRF To RCE in PDFReacterWhat is PDFReacter? - PDFReacter is a parser which parses HTML content from HTML to PDF. While testing an application I have identified that an application is using the PDFReacter parser.331
AWS takeover through SSRF in JavaScriptHere is the story of a bug I found in a private bug bounty program on Hackerone. It took me exactly 12h30 -no break- to find it, exploit and report.1718
Into the Borg – SSRF inside Google production networkIn March 2018, I reported an XSS in Google Caja, a tool to securely embed arbitrary html/javascript in a webpage. In May 2018, after the XSS was fixed, I realised that Google Sites was using an unpatched version of Google Caja, so I looked if it was vulnerable to the XSS.1518
Server Side Request Forgery (SSRF) TestingWell this story is just for fun testing SSRF not a bounty write up. I found a random web that vulnerable to SSRF but in order to exploit it i should convert my input to base64. Here is the site http://playfreedownloadgames.com:2483/proxy.224
How i converted SSRF TO XSS in jira.Before i start Acunetix does Subdomain scans so just set the time out to 20 and you will get a really big list with banners and response headers. (it does the half of the work for you.) Now, i een through lots of subdomains and i was specifically looking for any jira environment , and i found one.313
How I Chained 4 vulnerabilities on GitHub Enterprise, From SSRF Execution Chain to RCE!Hi, it’s been a long time since my last blog post. In the past few months, I spent lots of time preparing for the talk of Black Hat USA 2017 and DEF CON 25. Being a Black Hat and DEFCON speaker is part of my life goal ever. This is also my first English talk in such formal conferences.1228