Cybertix
Cybertix
February 1, 2025 at 12:17 PM
*Bug Bounty Tip:* A method you can use it when you have a SSRF Vulnerability *Step to Reproduce:* 1. After analyzing some ".js" Endpoints. 2. Found Endpoint download/?download_location=test with download_location parameter 3. Tested SSRF by adding any Server to see what it returns. 4. It returns the Original IP by checking the USER-AGENT. 5. Do some scans via NMAP to see if there is any Open Ports. 6. Just FUZZ local-host ports to see if any of them are open Command:https://api.example.com/v2/test/test/download/?download_location=http://FUZZ 7. To Download File: https://github.com/a7madn1/Fuzzing
❤️ 👍 2

Comments