SERVER SIDE REQUEST FORGERY (SSRF)
It is possible to prove the vulnerability by reading local files
Using the file protocol
Then you can enumerate local services that are listening
Depending on the response
It is also possible to use others protocols like gopher and dict
They don't send HTTP headers and can avoid misinterpretation
Filter bypass
Redis is a database system that stores everything in RAM
Getting a webshell
Getting a reverse shell
Priv. Esc. using SSH key
You can use dict protocol and crontab
- You set the working directory
- Update the redis database location
- Listening
- Write a reverse shell payload
- Save it
You can also use the gopher protocol (replace IP and port)
Last updated
