I’ve checked this before, but this only shows that the vulnerability point is in ‘hash’. It’s really confused me how to use it for SSRF. just like a request splitting?
could u plz give me a hint about how to use it for SSRF? I’m stuck here for a few days.
This site uses cookies for anonymized analytics to improve the site. Rapid7 will never sell the data collected on this site.
View our Cookie Policy for full details
This site uses cookies for anonymized analytics. For more information or to change your cookie settings, view our Cookie Policy.
I’ve checked this before, but this only shows that the vulnerability point is in ‘hash’. It’s really confused me how to use it for SSRF. just like a request splitting?