Server Side Request Forgery (SSRF)
Basic SSRF payloads
Blind SSRF
HTML File Upload To SSRF
Make a html file with the following code
upload this file and see if you get a hit on netcat listener
I got a hit on my netcat listener
Using Burp Collaborator
use the below code in html file
wkhtmltopdf Blind SSRF Exploit
Do not use wkhtmltopdf with any untrusted HTML – be sure to sanitize any user-supplied HTML/JS; otherwise, it can lead to the complete takeover of the server it is running on! Please read the project status for the gory details.
we can execute JavaScript in wkhtmltopdf! Let us leverage this functionality to read a local file by creating the following HTML document.
Last updated