Server-Side Request Forgery (SSRF)

SSRF is a security vulnerability that occurs when an attacker manipulates a server to make HTTP requests to an unintended location. This happens when the server processes user-provided URLs or IP addresses without proper validation.

Common exploitation paths:

  • Accessing Cloud metadata

  • Leaking files on the server

  • Network discovery, port scanning with the SSRF

  • Sending packets to specific services on the network, usually to achieve a Remote Command Execution on another server

Identify Potential SSRF Entry Points

🔍 Look for parameters, headers, and input fields that accept URLs:

  • URL parameters (?url=, ?link=, ?redirect=, ?callback=, ?next=, etc.)

  • JSON / XML body ("image": "http://example.com/img.jpg")

  • Headers (Referer, X-Forwarded-For, Host, etc.)

  • Hidden form fields (<input type="hidden" name="webhook_url" value="http://example.com/webhook">)

  • Redirect behavior on function, parameter, field.

  • OAuth / API integrations that retrieve external resources

Common SSRF Payloads

Enumerate internal network via SSRF

Bypass Localhost with on SSRF

Blind SSRF with Shellshock exploitation

Burp suite Detection via collaborator-everywhere pro

Manual Testing every request you visit:

Exploit:

Last updated