SSRF-Dns-Rebinding
https://gitlab.com/jobertabma/vulnerable-code/-/tree/master/ssrf-dns-rebinding?ref_type=heads
Step 1: Understand the Vulnerability
External SSRF Vulnerability (index.php):
The vulnerable code in
index.phptakes ahostparameter from the URL, checks if it resolves to127.0.0.1(localhost), and if it does not, makes a request to the specified host.

Internal Document (index.html):
A simple internal document served on
127.0.0.1:8080.3. Automation Script (automation script):
The script sets up two local PHP servers:
One serves internal documents on
127.0.0.1:8080.Another serves external documents on
127.0.0.1:8081.
It then opens a URL
http://127.0.0.1:8081/?host=test.com, which triggers the SSRF vulnerability inindex.php.

Step 2: Create and Run the Bash Script
1.Create the Bash Script: Create a file named ssrf-dns-rebinding.sh and add the provided Bash script to it.
2.Make the Script Executable: Change the script's permissions to make it executable.
3. Run the script:
Internal:

Extenal:

Expected Outcomes:
By running the script and observing the expected output, you demonstrate a successful SSRF with DNS Rebinding attack. The external
index.phpscript, due to the DNS rebinding, accesses the internal document hosted on127.0.0.1:8080, showing how an attacker can exploit this vulnerability to access internal resources.


Last updated