Hintru ENES ← All labs

Avail.zone – Open Redirect / SSRF via website Parameter

EN easy bug bounty writeup Open RedirectSSRFparameter injectionURL manipulationphishingrecon

A phishing/spam email promotes a 'free partnership tool' at start.avail.zone. The invite URL passes a domain through a query parameter — what does the server actually do with it? Investigate the request flow and find an abuse path that could turn this 'invite' into something nastier.

0/5
solved
Step 1 Step 2 Step 3 Step 4 Step 5
web

Step 4 · Probe Whether the Server Fetches Your URL

Objective: Determine whether the server itself fetches the supplied URL, enabling SSRF against internal or cloud metadata services.

Context: If the backend fetches the `website` value server-side (e.g. to scrape the target site, take a screenshot, or verify it exists), the vulnerability escalates from Open Redirect to SSRF.

Progressive hints

Only reveal the ones you need. Claude tracks how many you used to calibrate the feedback.

Hint 1 — directional nudge

Set up an out-of-band listener (Burp Collaborator, interactsh, or a simple netcat/HTTP server on a VPS). Supply its address in the `website` parameter and check for inbound connections that originate from the avail.zone server — not your browser.

Hint 2 — technique / vuln class

SSRF payloads to try:
- Your Collaborator URL (confirms server-side fetch)
- http://169.254.169.254/latest/meta-data/ (AWS IMDSv1)
- http://metadata.google.internal/ (GCP)
- http://169.254.169.254/metadata/v1/ (DigitalOcean)

Hint 3 — near solution

Use:
https://start.avail.zone/build-connections?website=http://169.254.169.254/latest/meta-data/
or
https://start.avail.zone/build-connections?website=https://YOUR-ID.oastify.com

If Collaborator logs an HTTP request from an IP belonging to avail.zone's infrastructure, SSRF is confirmed. If the page reflects content from the internal URL, it's a blind→semi-blind SSRF.

Your attempt