webProeasy

Lab 95 — CloudCrate — SSRF in File Import Feature

hackadvisor

Task: CloudCrate upload page includes an Import from URL feature that performs server-side fetches on attacker-supplied URLs. Solution: exploit SSRF to enumerate localhost services, query the internal metadata API on port 3001, and read the flag from /flag.

$ ls tags/ techniques/
ssrf_reconnaissancelocalhost_enumerationinternal_api_abusealternate_loopback_notation

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups