webPromedium

Lab 47 — PingRadar — Blind SSRF via Webhook Test Delivery

hackadvisor

Task: PingRadar webhook test delivery makes server-side HTTP requests to arbitrary URLs with no SSRF protection; delivery logs expose response headers but not body (blind SSRF). Solution: port-scan localhost to find internal monitoring-aggregator on port 3001, leak x-internal-token from /health response headers via delivery log API, inject Bearer token via webhook custom headers to access /admin/export, which writes report containing flag to shared filesystem rendered on the delivery logs page.

$ ls tags/ techniques/
response_header_exfiltrationinternal_service_enumerationinternal_port_scanningssrf_via_webhook_testinternal_token_leakbearer_token_injection_via_custom_headersside_channel_data_exfiltrationexport_report_file_write

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups