The diffir

MediumWeb

Overview

This is my super secure source code viewer service. It is very restricted, but  vulnrable.

Flag Format: Flag{}

Lab Details

Prerequisites & Requirements

  • Basic knowledge of HTTP protocols and web applications
  • Understanding of Server-Side Request Forgery (SSRF) vulnerabilities
  • Knowledge of URL parsing differences between Python libraries
  • Familiarity with Flask web framework
  • Basic understanding of localhost/private IP restrictions
  • Experience with URL encoding and special characters

What will you learn?

  • How URL parsing confusion vulnerabilities work
  • The differences between urllib.parse and requests library URL handling
  • SSRF exploitation techniques and bypass methods
  • How to identify parsing inconsistencies between different libraries
  • The importance of consistent input validation across all components
  • How to use backslash (\) and @ characters to confuse URL parsers
  • Directory traversal techniques in URL paths

Tools

  • Python 3 - For writing exploitation scripts
  • Web Browser - For manual testing and payload delivery
  • Text Editor - For analyzing source code

Job Positions

Tags

SsrfConfusion AttacksOwasp Top 10PythonInput ValidationSource Code Review