
Cybertix
February 1, 2025 at 12:17 PM
*Bug Bounty Tip:*
A method you can use it when you have a SSRF Vulnerability
*Step to Reproduce:*
1. After analyzing some ".js" Endpoints.
2. Found Endpoint download/?download_location=test with download_location parameter
3. Tested SSRF by adding any Server to see what it returns.
4. It returns the Original IP by checking the USER-AGENT.
5. Do some scans via NMAP to see if there is any Open Ports.
6. Just FUZZ local-host ports to see if any of them are open
Command:https://api.example.com/v2/test/test/download/?download_location=http://FUZZ
7. To Download File: https://github.com/a7madn1/Fuzzing
❤️
👍
2