The endpoint appears to be vulnerable to Server Side Request Forgery attack. The original request was replayed by replacing the URI parameter with popular sensitive file paths. The application responded with 2XX success code and also gave out details of these files.
Server Side Request Forgery (SSRF)
How this template works
APIs Selection
The API selection filters in this template are used to identify potential SSRF vulnerabilities by checking if the request payload or query parameters contain URLs. It uses the "contains_either" keyword to match URLs that contain "http" in either the request payload or query parameters.
Execute request
The execute section of the template specifies the actions to be performed on the identified URLs. In this case, it modifies the query and body parameters by replacing them with the file paths specified in the "filePaths" word list.
Validation
The validation section defines the criteria for determining if the SSRF vulnerability has been successfully exploited. It checks if the response code is between 200 and 300 (indicating a successful request) and if the response payload contains any of the specified keywords such as "daemon", "Linux", "Ubuntu", or "/proc/self/cmdline". If these conditions are met, it suggests that sensitive files have been exposed due to SSRF.
Frequently asked questions
Explore other tests
Port scanning with SSRF
Sensitive AWS details exposed via replacing url param with encoded url due to SSRF
Sensitive AWS details exposed due to SSRF
Sensitive AWS details exposed via replacing CSV param due to SSRF
Sensitive AWS details exposed via replacing file param due to SSRF
Sensitive AWS details exposed via replacing image param due to SSRF
Sensitive localhost details exposed via replacing URI param with localhost/admin due to SSRF
Sensitive localhost details exposed via replacing URI param redirecting to localhost/admin due to SSRF
Sensitive localhost details exposed via replacing URI param to encoded localhost/admin due to SSRF
Sensitive AWS details exposed via replace PDF param due to SSRF
Sensitive AWS details exposed via replacing XML param due to SSRF