Skip to content

Server Side Request Forgery (SSRF)

Info

This note is still in development.

Overview


Server Side Request Forgery or SSRF is a vulnerability in which an attacker forces a server to perform requests on their behalf.

Reference(s):
- https://swisskyrepo.github.io/PayloadsAllTheThings/Server%20Side%20Request%20Forgery/
- https://portal.offsec.com/courses/web-200/books-and-videos/modal/modules/server-side-request-forgery/server-side-request-forgery

Tools


  • SSRFmap

    # Installation
    git clone https://github.com/swisskyrepo/SSRFmap
    cd SSRFmap
    pip3 install -r requirements.txt
    
    # Usage
    python ./ssrfmap.py
    

  • See-SURF

    # Installation
    git clone https://github.com/In3tinct/See-SURF.git
    cd See-SURF/
    pip3 install BeautifulSoup4
    pip3 install requests
    
    # Usage
    python ./see-sruf.py -H <url>
    

  • Once SSRF is validated, search for potential backend services normally only available on localhost

Service Port URI Path
MySQL 3306 mysql://127.0.0.1:3306
PostgreSQL 5432 postgresql://localhost:5432
FastCGI 9000
Redis 6379
Zabbix 10050
SMTP 25