Let’s look at an application designed to illustrate the potential issues associated with SSRF. This application contains three endpoints: /, /admin, /ssrf.

The / endpoint provides users with a simple form containing only a button. When the button is clicked, a GET request is sent to /admin, the other endpoint. This endpoint accepts a GET parameter named ‘url’ and sends a HTTP request to the provided URL. In the previous form, found at /, the ‘url’ parameter is set to a site that returns the current time.

The /ssrf endpoint is designed only to be accessible from the localhost ( While not as common as it used to be, this was a standard way to “secure” an endpoint in the past. The idea behind restricting access to is that it would only be accessible to a user with access to the server’s operating system. However, as we’ll soon see, this method should never be trusted.

If we look at the code for the /ssrf endpoint, we can see several interesting components:

  1. The “url” parameter is sent directly to the requests.get() resulting in requests.get(url). Leveraging this, we can force the server to send HTTP GET requests to arbitrary locations by simply changing the “url” parameter! This, by definition, is a perfect example of an SSRF!

  2. Because we can send an HTTP request from the scope of the application, we can access the /admin endpoint!


NOTE: If the webpage within the learning environment does not load properly, refresh the learning environment browser.

To bypass the security for this endpoint, we need to enter within the ‘url’ parameter in the URL. Your URL should look like the following:


Once we do this, we’ll see the message displayed to an authenticated admin!

NOTE BELOW: If you do not see the following displayed message:

Here's the Time: Welcome, Admin! You've successfully exploited a server-side request forgery vulnerability!

Click the Run button within the code editor and refresh the learning environment’s URL

Take this course for free

Mini Info Outline Icon
By signing up for Codecademy, you agree to Codecademy's Terms of Service & Privacy Policy.

Or sign up using:

Already have an account?