Introduction

This lab has a stock check feature which fetches data from an internal system.

To solve the lab, change the stock check URL to access the admin interface at http://localhost/admin and delete the user carlos.

The developer has deployed two weak anti-SSRF defenses that you will need to bypass.

Solution

Like the same previous labs, there is a SSRF vulnerability exists in Check Stock unit and this time through stockApi parameter through an external URL it checks for stocks

But when send a request to http://localhost via stockApi parameter and our request is blocked for a security reason

What’s the other way than, we can actually utilise certain filter bypass like spoofed.<burpcollab>.com resolving this points to 127.0.0.1 as mentioned in burp documentation and let’s analyse the response of it

Analysing the response and it says “Invalid Host” ?? Then I’ve sent a wrong payload here

Even with spoofed.burpcollaborator.com which actually points to 127.0.0.1 results in status code of 500

I’ve added /admin to the specific host but still I’m blocked

With the following shortened localhost address which http://127.1 is allowed and responds with 200 along with hold to an admin panel

Now add /admin to access the admin panel but hey there is an restriction out there but it might be due to the naming of admin or what ?

Then it might be due to the naming restriction where

admin. Blocked
Admin Allowed and not blacklisted.

Changing it from /admin to /Admin it allows the access to admin panel and shows the option to delete the users.. which is awesome

Finally send the following url http://127.1/Admin/delete?username=carlos as a value for stockApi parameter and send the request, carlos user will be deleted and lab is solved