In this lab, we have to exploit the blind SSRF via XXE. This is called blind because we cannot see the application’s response to our payload in http response, but we can cause an out-of-band interaction with the server of our control, like collaborator.
In this lab also the check stock is vulnerable. So I will directly start with the burp’s request and response.

Send above request to the repeater and edit the request with the external entity. First I test for normal XXE, but it says Invalid Porduct ID.

Now we can test for the SSRF through XXE using collaborator.Here it still says invalid product ID.

But when I checked in collaborator, it shows DNS and HTTP responses.

Paylod used:

