webPromedium

Lab 91 — PingRadar — SSRF Filter Bypass via Open Redirect Chain

hackadvisor

Task: PingRadar webhook platform has a Webhook Tester (SSRF vector) and an unauthenticated Click Tracking open redirect; SSRF blocklist blocks private IPs but not the app's own internal hostname. Solution: Chain the open redirect through the internal hostname to bypass SSRF filter — webhook tester fetches app.pingradar.local:8080/api/track which 302-redirects to localhost:3001 cloud metadata service, leaking IAM credentials containing the flag.

$ ls tags/ techniques/
ssrf_via_open_redirectredirect_chain_bypasscloud_metadata_accesshostname_allowlist_bypassunvalidated_redirect_destination

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups