-
Notifications
You must be signed in to change notification settings - Fork 567
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
generic_ssrf: Include vulnerable SSRF parameter in VULN description #2131
Conversation
Notification shows parameter that triggered the SSRF
I can appreciate the need for this, but i am concerned that looking for such generic words in the response will cause a lot of false positives in terms of reported triggering parameters. I think the right way to do this is probably to generate a subdomain tag for each item, and maintain a mapping of subdomain tag to parameters. This will require some refactoring. |
I've yet to have a false positive on this so far. Found some weird endpoints that would take html parameter and slack would preview it. Any FP's and I'll alert you but so far this has worked well. |
…to generic-ssrf-parameter-refactor
@random-robbie after revisiting this module, there are a lot of things I was no longer happy with and decided it needed a pretty major refactor. I started from your commit, and made it so any parameter used in an interactsh URL will get individually tracked across the life of the scan. This way, we will be able to identify the parameter just be associating the subdomain ID, regardless of whether the parameter appears in the response, and also ruling out any weird false positives.
We figured out how :)
|
Thanks @random-robbie, after @liquidsec's edits, this is approved. Congrats on your first contribution 🙏 |
Notification shows parameter that triggered the SSRF