Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Splash Render - SSRF

By kannthu

High
Vidoc logoVidoc Module
#splash#ssrf#oast#oss
Description

What is the "Splash Render - SSRF?"

The "Splash Render - SSRF" module is designed to detect a server-side request forgery (SSRF) vulnerability in the Splash rendering service. Splash is a headless browser that allows users to render web pages and execute JavaScript code. This module focuses on identifying misconfigurations or vulnerabilities related to SSRF in the Splash rendering service.

This module has a severity level of high, indicating that the detected vulnerability or misconfiguration can have a significant impact on the security of the system.

Impact

A successful exploitation of an SSRF vulnerability in the Splash rendering service can allow an attacker to make arbitrary requests to internal resources or external systems, potentially leading to unauthorized access, data leakage, or further attacks on the target system.

How the module works?

The "Splash Render - SSRF" module works by sending a specific HTTP request to the target system. The request includes a path parameter that triggers the rendering of a web page using the Splash rendering service. The module then analyzes the response to determine if it contains specific content and meets certain conditions.

For example, the module may check if the response body contains the phrase "Interactsh Server" and if the response status code is 200. If both conditions are met, the module considers the vulnerability or misconfiguration as detected.

By using various matching conditions, the module can accurately identify SSRF vulnerabilities in the Splash rendering service.

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/render.html?url=htt...
Matching conditions
word: Interactsh Serverand
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability