Lab 1: Basic SSRF against the local server
Lab 1 regarding the Server-Side Request Forgery (SSRF) vulnerability from PortSwigger.
Last updated
Lab 1 regarding the Server-Side Request Forgery (SSRF) vulnerability from PortSwigger.
Last updated
Basically, we have an application with multiple products. By clicking on "View details" and then clicking on "Check stock," the product's inventory will be verified.
When testing the /admin endpoint, the application returned the administrative panel. Upon observing the response, we can identify the presence of two users, "carlos" and "wiener," followed by an href referencing the path to delete one of the users.
After finding the required endpoint to delete the account, we can easily do it using the "stockApi" parameter, and the lab will be successfully completed!
However, upon analyzing the request with Burp Suite and testing the "stockApi" parameter, when we input "," the internal application is exactly returned. Therefore, we are able to interact with the internal environment. To solve the lab, we need to delete the user "carlos."