SSRF with blacklist-based input filter¶
Description¶
This lab has a vulnerable stock check feature which fetches data from an internal system.
Reproduction and proof of concept¶
Visit a product, click Check stock, intercept the request in Burp Suite, and send it to Burp Repeater.
Change the URL in the
stockApiparameter tohttp://127.0.0.1/and observe that the request is blocked.Bypass the block by changing the URL to:
http://127.1/Change the URL to
http://127.1/adminand observe that the URL is blocked again.Obfuscate the
ainadminby double-URL encoding it to%2561to access the admin interface and delete the target user.

Exploitability¶
An attacker will need to change the stock check URL to access the admin interface at http://localhost/admin and delete the user carlos. The developer has deployed two weak anti-SSRF defences that the attacker will need to bypass.