Hintru ENES ← Todos los labs

Avail.zone – Open Redirect / SSRF via website Parameter

EN easy bug bounty writeup Open RedirectSSRFparameter injectionURL manipulationphishingrecon

A phishing/spam email promotes a 'free partnership tool' at start.avail.zone. The invite URL passes a domain through a query parameter — what does the server actually do with it? Investigate the request flow and find an abuse path that could turn this 'invite' into something nastier.

0/5
resueltos
Paso 1 Paso 2 Paso 3 Paso 4 Paso 5
enumeration

Paso 2 · Fingerprint the Application's Response Behaviour

Objetivo: Determine whether the application reflects, fetches, or redirects to the value supplied in the `website` parameter.

Contexto: With the modified URL in hand, use your browser and Burp Suite (Proxy → Intercept or HTTP History) to capture the full request/response cycle when the page loads.

Pistas progresivas

Revela solo las que necesites. Claude lleva la cuenta de cuántas usaste para calibrar la retroalimentación.

Pista 1 — empujón direccional

Open Burp Suite, enable the proxy, and visit the modified invite URL. Check both the initial response and any subsequent requests the browser or server makes.

Pista 2 — técnica / clase de vuln

Look for three distinct behaviours: (1) the value appears in HTML/JS output (reflection), (2) the server issues an HTTP request to the supplied domain (SSRF), or (3) the browser is sent to the supplied domain (Open Redirect).

Pista 3 — casi la solución

In Burp's HTTP History, filter for requests going OUT from the server to external hosts, or look for a 3xx Location header pointing to your supplied domain. Also check the rendered page source for the raw domain string.

Tu intento