webProeasy
Lab 95 — CloudCrate — SSRF in File Import Feature
hackadvisor
Task: CloudCrate upload page includes an Import from URL feature that performs server-side fetches on attacker-supplied URLs. Solution: exploit SSRF to enumerate localhost services, query the internal metadata API on port 3001, and read the flag from /flag.
$ ls tags/ techniques/
ssrf_reconnaissancelocalhost_enumerationinternal_api_abusealternate_loopback_notation
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]CloudPulse— hackadvisor
- [web][Pro]Lab 104 — CloudOps Copilot — AI SSRF via Infrastructure Tool Abuse— hackadvisor
- [web][Pro]Lab 91 — PingRadar — SSRF Filter Bypass via Open Redirect Chain— hackadvisor
- [web][Pro]Lab 205 — DockForge — SSRF in Webhook Test Endpoint— hackadvisor
- [web][free]Prison Pipeline— hackthebox_business_ctf_2024