Log in
Try accessing: ssrf-sheriff.yandex.net
Bughunter can generate a special subdomain for testing and then analyze requests.
Note:
There are several methods for detecting Server-Side Request Forgery (SSRF) vulnerabilities, suitable for both blind scenarios and scenarios where you can observe the server's responses.
"X-Yandex-Bugbounty-Flag"
or the response body. Flag example:
YandexBB{eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.eyJ0aW1lc3RhbXAiOiIyMDI0LTA5LTIzVDE0OjQ5OjMwLjg4NDcxMDkyMiswMzowMCJ9.signature}
For blind-ssrf verification, you can implement response time verification by passing the optional get parameter sleep=n
causing an n-second delay before the response.
Example: https://ssrf-sheriff.yandex.net/last/wmkcjfe?sleep=10
The request logs are available on a separate external host at
https://ssrf-sheriff-logs.yandex.net
. This domain exposes two API methods:
/last/{subdomain}
, where subdomain is your generated test subdomain.
Example: https://ssrf-sheriff-logs.yandex.net/last/wmkcjfe
This endpoint returns the last 100 log entries.
/log/{subdomain}
, where subdomain is the subdomain part of your personal domain name.
Example: https://ssrf-sheriff-logs.yandex.net/log/
wmkcjfe
This endpoint returns an infinitely loading page with events appearing in real time.
The service is built upon the open-source project {ssrf-sheriff}