Lab: Basic SSRF against a local server

This Lab demonstrates the lack of protection which allows someone to send request to the server's loopback access and receive output as if it was being accessed locally.

I loaded the website and chose a random product to look the request it send for checking stock as that would be communicating as `POST` with the server so this could be used to send commands to the server:

I replace the stockApi URL with `localhost/admin` to access the admin page via the loopback of the server:

This showed me the user list on the server:

Now I naively just pressed delete on 'carlos' while forwarding the requests without looking at them which sent me to this page:

Confused I tried again but this time I looked the request being sent, and to my displeasure it was a GET request to the server's client facing admin page not the one on loopback:

So, I decided to copy the request and redo the `POST` request to server but with the deletion information appended to it:

And finally I just brought up the user list again to verify the deletion:


Comments

Popular posts from this blog

Malware Analysis Report: Sample SmokeScreen

[TryHackMe] BrainPan 1