Member-only story

Day 12 of 30 Days — 30 Vulnerabilities | Server Side Request Forgery (SSRF)

It4chis3c
3 min readAug 14, 2024

--

Day 12: Mastering Server Side Request Forgery Vulnerability — Essential Tricks & Techniques Based on Personal Experience and Valuable POCs

[ In collaboration with Abhijeet Kumawat ( his LinkedIn | Twitter)]

Hey geeks, it4chis3c (Twitter) here with one more write-up on tricks & tips to detect SSRF Vulnerability.

1. Brief Description

  • Definition: SSRF is a vulnerability that allows an attacker to force a server to make unauthorized requests to external or internal resources.
  • Impact: Can lead to unauthorized access to internal systems, data leakage, or even full control over the server.

2. Where to Detect

Input Fields:

  • URLs or IP addresses provided by users.
  • Form fields that accept URLs, such as image upload or fetch URLs.

API Endpoints:

  • APIs that fetch data from external servers.
  • Webhooks that interact with third-party services.

Third-Party Integrations:

  • Services relying on external API calls.
  • Redirects or URL shorteners.

3. How to Detect

Manual Testing:

--

--

It4chis3c
It4chis3c

Written by It4chis3c

Security Researcher | Bug Bounties | Tips & Tricks

No responses yet