SSRF ATTACK : WALKTHROUGH
Last updated
Last updated
The web application is vulnerable to Server-Side Request Forgery (SSRF) attacks, allowing an attacker to make requests on behalf of the server, potentially leading to unauthorized access to internal resources.
URL: https://0ad6005c04f2986f80802110005600c2.web-security-academy.net/admin
The admin interface is protected and not directly accessible.
Using the stockApi parameter, an attacker can manipulate requests to bypass access restrictions.
• Intercepted a request triggered by clicking ”Check stock.” Sent the intercepted request to Burp Repeater for further analysis
Changed the stockApi parameter to http://localhost/admin.
Successfully accessed the administration interface, demonstrating SSRF vulnerability.
• Discovered the URL for deleting a target user: http://localhost/admin/delete? username=carlos
• Submitted the identified deletion URL via the stockApi parameter to perform the SSRF attack.
After changing the stock api the user carlos is deleted
It is recommended to implement proper input validation and sanitisation for user- supplied input. Additionally, access controls should be strengthened to prevent unauthorized access to internal resources.
1. Validate and sanitise user inputs to prevent manipulation of the stockApi
2. Implement strong access controls to restrict access to sensitive functionalities and resources