Blind server-side request forgery (SSRF) is a vulnerability that allows an attacker to induce an application to send HTTP requests to a specified URL, but no response is returned to them.
To detect blind SSRF vulnerabilities with out-of-band testing, you can use Collaborator to inject a domain into a request that attempts to trigger an out-of-band interaction with your target application. Burp then monitors the Collaborator server for any out-of-band interactions with that domain.
If Collaborator detects that your application has sent a request to the inserted domain, that means it's vulnerable to SSRF.
You can follow the tutorial below by using the Blind SSRF with out-of-band detection lab from our Web Security Academy.
To test for blind SSRF with Burp Suite:
productId parameter.
Referer header with a Collaborator payload.