Beginner
4.8
2,847
Server-Side Request Forgery (SSRF): Requesting Hidden Resources in OWASP Juice Shop
Learn to exploit SSRF vulnerabilities in OWASP Juice Shop by leveraging a Gravatar URL field to interact with restricted server-side resources.

Ready
3
Modules
30 minutes
Duration
Lab Modules
3 steps
Lab Overview
Server-Side Request Forgery (SSRF) is a critical vulnerability that allows attackers to trick a server into fetching or interacting with internal or external resources. In this lab, you will explore SSRF vulnerabilities in the OWASP Juice Shop application by leveraging a vulnerable Gravatar URL field to simulate an attack. Through this exercise, you will understand how attackers exploit SSRF vulnerabilities to access restricted server-side functionality and learn the importance of securing server resource requests.
Objectives
Upon completion of this lab, you will be able to:
- Understand Server-Side Request Forgery (SSRF) vulnerabilities.
- Craft SSRF payloads to exploit internal server resources.
- Recognize the risks of improper server-side validation.
Who is this lab for?
This lab is designed for:
- Security professionals looking to enhance their skills in exploiting and mitigating SSRF vulnerabilities.
- Developers aiming to understand SSRF risks and implement secure server-side validation.
- IT professionals and beginners interested in server-side security concepts.

Ready
3
Modules
30 minutes
Duration
Lab Modules
3 steps