webPromedium
Lab 91 — PingRadar — SSRF Filter Bypass via Open Redirect Chain
hackadvisor
Task: PingRadar webhook platform has a Webhook Tester (SSRF vector) and an unauthenticated Click Tracking open redirect; SSRF blocklist blocks private IPs but not the app's own internal hostname. Solution: Chain the open redirect through the internal hostname to bypass SSRF filter — webhook tester fetches app.pingradar.local:8080/api/track which 302-redirects to localhost:3001 cloud metadata service, leaking IAM credentials containing the flag.
$ ls tags/ techniques/
ssrfinternal_servicewebhookopen_redirectssrf_filter_bypassredirect_chaincloud_metadataiam_credentialsclick_trackinghostname_bypass
ssrf_via_open_redirectredirect_chain_bypasscloud_metadata_accesshostname_allowlist_bypassunvalidated_redirect_destination
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]Lab 47 — PingRadar — Blind SSRF via Webhook Test Delivery— hackadvisor
- [web][Pro]Lab 340 — PingRelay — Blind SSRF via Webhook Test— hackadvisor
- [web][Pro]PingForge— hackadvisor
- [web][Pro]Lab 89 — PingRadar — SSRF via DNS Rebinding (TOCTOU)— hackadvisor
- [web][Pro]Lab 6 — HookRelay — SSRF via IPv6-Mapped-IPv4 Bypass— hackadvisor