Server-Side Request Forgery (SSRF)- PortSwigger Labs

Lab: SSRF with filter bypass via open redirection vulnerability

Michael Koczwara
3 min readApr 20, 2022
SSRF Attack Lifecycle

Lab: SSRF with filter bypass via open redirection vulnerability

Objectives:

This lab has a stock check feature that fetches data from an internal system.

To solve the lab, change the stock check URL to access the admin interface at http://192.168.0.12:8080/admin and delete the user carlos.

The stock checker has been restricted to only access the local application, so you will need to find an open redirect affecting the application first.

Lab: SSRF with filter bypass via open redirection vulnerability

Lab walkthrough

In this lab we can access two features -Check stock and the Next product

--

--