SSRF (Server-Side Request Forgery)

In a Server-Side Request Forgery (SSRF) attack, the attacker can abuse functionality on the server to read or update internal resources. The attacker can supply or modify a URL which the code running on the server will read or submit data to, and by carefully selecting the URLs, the attacker may be able to read server configuration such as AWS metadata, connect to internal services like http enabled databases or perform post requests towards internal services which are not intended to be exposed.

https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Server%20Side%20Request%20Forgery#ssrf-exploitation-via-url-scheme

localhost bypass through IPv6, decimal and hex versions:

http://[::]:3306, http://:::3306, http://2130706433:3306, http://0x7f000001:3306

Local File Include through SSRF

file:///etc/passwd

SSRF URL Schemes

file://, http://, dict://, sftp://, tftp://, ldap://, gopher://, netdoc://

Last updated