Lab: SSRF with blacklist-based input filter
This lab has a stock check feature which fetches data from an internal system.
To solve the lab, change the stock check URL to access the admin interface at
http://localhost/admin and delete the user
The developer has deployed two weak anti-SSRF defenses that you will need to bypass.
- Visit a product, click "Check stock", intercept the request in Burp Suite, and send it to Burp Repeater.
Change the URL in the
http://127.0.0.1/and observe that the request is blocked.
Bypass the block by changing the URL to:
Change the URL to
http://127.1/adminand observe that the URL is blocked again.
- Obfuscate the "a" by double-URL encoding it to %2561 to access the admin interface and delete the target user.