Date : 04 Mar, 2025
This lab has a stock check feature which fetches data from an internal system.
To solve the lab, change the stock check URL to access the admin interface at http://localhost/admin and delete the user carlos.
Goal:
Access the internal admin panel by editing the stockApi parameter and manually delete a
user via the admin UI.
### STEPS :
-
Browse to
/adminand observe that you can't directly access the admin page. -
Visit a product, click "Check stock", intercept the request in Burp Suite, and send it to Burp Repeater.
-
Change the URL in the
stockApiparameter tohttp://localhost/admin. This should display the administration interface. -
Read the HTML to identify the URL to delete the target user, which is:
http://localhost/admin/delete?username=carlos -
Submit this URL in the
stockApiparameter, to deliver the SSRF attack.
Summary :
This lab teaches that SSRF vulnerabilities can be used to:
- Bypass frontend restrictions
- Access localhost-only services
- Perform sensitive actions on internal systems