id: oob-param-based-interaction info: name: Parameter Based Generic OOB Interaction author: pdteam severity: info description: The remote server fetched a spoofed URL from the request parameters. reference: - https://github.com/PortSwigger/collaborator-everywhere metadata: max-request: 1 tags: oast,ssrf,generic http: - method: GET path: - "{{BaseURL}}/?u=http://{{interactsh-url}}/&href=http://{{interactsh-url}}/&action=http://{{interactsh-url}}/&host={{interactsh-url}}&http_host={{interactsh-url}}&email=root@{{interactsh-url}}&url=http://{{interactsh-url}}/&load=http://{{interactsh-url}}/&preview=http://{{interactsh-url}}/&target=http://{{interactsh-url}}/&proxy=http://{{interactsh-url}}/&from=http://{{interactsh-url}}/&src=http://{{interactsh-url}}/&ref=http://{{interactsh-url}}/&referrer=http://{{interactsh-url}}/" matchers: - type: word part: interactsh_protocol name: http words: - "http" # digest: 490a00463044022075a79146936cfa5c5f9a29d042ad96b8d503f9cfed95ad37bb732820fb0f68240220086341bd2ffb76824a10dbd8574cd6e8c6c00b8e4825b6a1d36464baa1e8a0de:922c64590222798bb761d5b6d8e72950