The Burp Suite User Forum will be discontinued on the 1st November 2024.

Burp Suite User Forum

For support requests, go to the Support Centre. To discuss with other Burp users, head to our Discord page.

SUPPORT CENTRE DISCORD

Create new post

SSRF with filter bypass via open redirection vulnerability

Saarcastified | Last updated: Oct 28, 2024 05:52AM UTC

I have done the lab, but the IP mentioned in the lab description is not responding. the IP is http://192.168.0.12:8080/ I have done multiple times giving a 20 minute break to reset the lab. Still the same. Can anyone help me?

Ben, PortSwigger Agent | Last updated: Oct 28, 2024 09:27AM UTC

Hi, I have just run through this lab and been able to solve it using the written solution provided. Are you able to provide us with more details of the steps that you are carrying out to try and solve this particular lab?

Saarcastified | Last updated: Oct 29, 2024 04:41AM UTC

I have done the exact steps needed to solve the lab. That didn't work. So, I used the solution provided and performed the exact steps. I get the error as 192.168.0.12:8080 is not reachable in my burpsuite log.

Ben, PortSwigger Agent | Last updated: Oct 29, 2024 08:32AM UTC

Hi, Are you able to email us at support@portswigger.net and include some screenshots of your approach so that we can see exactly what you are doing?

Saarcastified | Last updated: Oct 29, 2024 08:51AM UTC

Sure, will do.

You must be an existing, logged-in customer to reply to a thread. Please email us for additional support.