webProeasy
Lab 204 — PayLoom — SSRF via Webhook Testing to Cloud Metadata
hackadvisor
Task: PayLoom payment gateway with webhook test feature that fetches arbitrary URLs server-side without validation. Solution: Exploit SSRF to reach internal IMDS on localhost:3001 and extract IAM credentials containing the flag in SecretAccessKey.
$ ls tags/ techniques/
localhost_service_discoverymetadata_enumerationssrf_via_webhookiam_credential_extraction
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]Lab 6 — HookRelay — SSRF via IPv6-Mapped-IPv4 Bypass— hackadvisor
- [web][Pro]Lab 205 — DockForge — SSRF in Webhook Test Endpoint— hackadvisor
- [web][Pro]Lab 347 — PushRelay — SSRF via URL Parsing Confusion in Webhook Tester— hackadvisor
- [web][Pro]Lab 104 — CloudOps Copilot — AI SSRF via Infrastructure Tool Abuse— hackadvisor
- [web][Pro]Lab 92 — EventPulse — SSRF via IPv6 Bypass in Webhook Verification— hackadvisor