What other methods would an attacker use for making an HTTP request that isn’t Fetch() or an XHR or using the DOM?

We are running user-submitted JavaScript, server-side to be executed within a headless browser that doesn’t have a DOM or any child of the window or document or location objects – because these are already removed. Is there a way for plain… Continue reading What other methods would an attacker use for making an HTTP request that isn’t Fetch() or an XHR or using the DOM?

What is the difference when a request is made to an open redirect vulnerable url though a browser and through the server using ssrf?

There is a url abc.com/something vulnerable to open redirect to xyz.com (fixed)
I am catching requests at xyz.com to see contents of requests coming to it.

When I browse abc.com/something (being logged in to abc.com) from a browser, then … Continue reading What is the difference when a request is made to an open redirect vulnerable url though a browser and through the server using ssrf?