SSRF
Server Side Request Reforgery
Methodology
Methodology
Watch for any unexpected redirects, especially to internal or private
IP
. These can often indicate a vulnerableSSRF
endpoint.Use a listener to see if the server is initiating outbound connections. This helps confirm if the server is making requests to external resources.
Pay special attention to which ports are open on the
localhost
, as they might indicate internal services that can be targeted.If you discover that there are open ports on internal services, try querying them via the vulnerable parameter. This could reveal sensitive information, such as metadata, headers, or responses that were not intended to be exposed.
If the
SSRF
vulnerability exposes endpoints, like internalAPI
, try querying those endpoints from the vulnerable parameter.
Last updated