Free Article Link: Click for free!
Press enter or click to view image in full size
Hello readers,
Sometimes the most interesting vulnerabilities are not hiding in login forms, password reset flows, or API endpoints — they hide in the background. This story started with a feature that most testers completely ignore: an error logging endpoint.
While testing target.com, I noticed a request being sent to an endpoint called:
POST /tunnel/At first glance, it looked harmless. Just telemetry. Just logging. Just Sentry doing its thing. But security testing has taught me one important rule:
If the server makes a request based on something I control — I look closer. And that’s exactly what happened here.
Server-Side Request Forgery (SSRF) happens when an application allows user-controlled input to influence a server-side HTTP request.
In simple terms:
Instead of sending requests directly to a system, I trick the server into sending them on my behalf.
Why does that matter?
Because servers can access internal services, reach private infrastructure, are…