SSRF Basic

Server-Side Request Forgery (SSRF) occurs when an attacker can force an application or server to request data or a resource. Since the request is originating at the server, it might be able to access data that the attacker cannot access directly.

curl -i -X POST -H "Content-Type: application/json" -d '{"url":"http://localhost:8055/"}' http://apigateway:8000/files/import

Subnet scanning with SSRF. --> Check for network gateways.

IP Address Range Subnet Mask CIDR Notation Possible Gateway IP Address
10.0.0.0 - 10.255.255.255 255.0.0.0 10.0.0.0/8 10.0.0.1
172.16.0.0 - 172.31.255.255 255.240.0.0 172.16.0.0/12 172.16.0.1
192.168.0.0 - 192.168.255.255 255.255.0.0 192.168.0.0/16 192.168.0.1

The backend URL and frontend URL, which is exposed by the API gateway, could be different.

Blind SSRF --> Check response, timing, etc