Level 4: SSRF Cloud Metadata Access Medium
SSRF Concept: Cloud metadata endpoints expose sensitive IAM credentials. SSRF is the primary attack vector to steal them.
Clue: In cloud environments (AWS, GCP, Azure), instance metadata is accessible at special internal URLs. This lab simulates that. The internal API also responds to the hostname "metadata.internal". Can you access the simulated cloud metadata?
Hint: AWS metadata is at http://169.254.169.254/latest/meta-data/. In this lab, try: http://metadata.internal/latest/meta-data/
Network Topology
This application runs in a Docker network. Key information:
- Your app (this page):
ssrf-app- accessible from internet on port 8041 - Internal API:
internal-api- NOT exposed to the internet - Server uses cURL with HTTP/HTTPS protocols only (no file://)
Your Challenge
Enter a URL below. The server will fetch it using cURL (HTTP/HTTPS only).
Find the flag. Format: IDS{32_character_hexadecimal}
Server Response:
Enter a URL above to make the server fetch it...
Example: http://internal-api/flag1