Lab: Basic SSRF against a local server
This Lab demonstrates the lack of protection which allows someone to send request to the server's loopback access and receive output as if it was being accessed locally.
I loaded the website and chose a random product to look the request it send for checking stock as that would be communicating as `POST` with the server so this could be used to send commands to the server:
I replace the stockApi URL with `localhost/admin` to access the admin page via the loopback of the server:
This showed me the user list on the server:
Now I naively just pressed delete on 'carlos' while forwarding the requests without looking at them which sent me to this page:
Confused I tried again but this time I looked the request being sent, and to my displeasure it was a GET request to the server's client facing admin page not the one on loopback:
So, I decided to copy the request and redo the `POST` request to server but with the deletion information appended to it:
And finally I just brought up the user list again to verify the deletion:
Comments
Post a Comment