Exploiting SSRF Like a Pro: Real-World Attacks Using Burp Suite
Introduction to SSRF
Server-Side Request Forgery (SSRF) is a vulnerability that allows an attacker to make the server-side application send HTTP requests to an unintended location. This is especially dangerous because it can:
Interact with internal systems not directly accessible externally (e.g., 169.254.169.254 on AWS)
Scan internal networks
Access metadata endpoints
Chain with other vulnerabilities (e.g., RCE, privilege escalation)
Setting Up Burp Suite for SSRF Testing
Configure Target Scope: Limit active scanning to target applications only.
Set Up Intercept Proxy: Ensure Burp is intercepting browser traffic.
Enable Burp Collaborator: Used to detect blind SSRF.
Detecting SSRF Vulnerabilities
1. Basic SSRF Test
Try injecting URLs in parameters:
POST /api/load_image HTTP/1.1
Host: victim.com
Content-Type: application/x-www-form-urlencoded
url=http://127.0.0.1:80/
Check response for:
Time delays
Reflected internal IPs
Connection reset or refused
2. Burp Collaborator Payloads
Inject Collaborator URLs:
url=http://<your-collaborator-id>.burpcollaborator.net
Then monitor DNS and HTTP interactions via Burp Collaborator client.
Real-World SSRF Exploitation Examples
1. AWS Metadata Service
Target URL: http://169.254.169.254/latest/meta-data/
Payload:
url=http://169.254.169.254/latest/meta-data/iam/security-credentials/
Result:
If successful, retrieve AWS temporary credentials.
2. Internal Port Scanning
Payloads:
url=http://127.0.0.1:22/
url=http://10.0.0.1:8080/
Burp Repeater + Intruder can automate IP/port scanning.
3. Blind SSRF with Burp Collaborator
Inject:
url=http://<your-id>.burpcollaborator.net
If no direct response, but the Collaborator logs DNS/HTTP interaction, it confirms SSRF.
4. SSRF to RCE Chain
SSRF -> Redis/Consul/internal service
SSRF leads to manipulation of internal configs (e.g., change webhook endpoints)
Leads to Remote Code Execution (RCE)
Burp's Logger++ extension helps monitor internal traffic behavior.
Automation & Extensions
Authorize: Detect SSRF in AuthZ mechanisms
SSRFMap: Python tool to automate SSRF attacks
Collaborator Everywhere: Automatically adds payloads to all params
Mitigation Tips
From a developer’s perspective:
Whitelist external URLs
Disallow redirects
Validate and sanitize all URL inputs.
Use metadata v2 for cloud services like AWS.
Conclusion
SSRF is a powerful attack vector that can lead to internal reconnaissance, sensitive data exposure, or even full compromise. Using Burp Suite, researchers can craft advanced payloads, monitor responses, and detect blind SSRF using Collaborator.

Comments
Post a Comment