This lab has a stock check feature which fetches data from an internal system.
To solve the lab, change the stock check URL to access the admin interface at http://localhost/admin and delete the user carlos.
Approach
Upon gaining access to the lab, I navigated straight to the home page and decided to explore the "check the stock" functionality. What caught my attention was that it sent a POST request to /product/stock, passing a parameter named stockApi that was intended to fetch data from another URL.
I decided to manipulate the stockApi parameter, changing it to http://localhost/admin, which surprisingly granted me access to the admin panel. However, my attempt to delete the user "Carlos" was unsuccessful due to lacking admin privileges (determined by the session cookie). Upon inspecting the request responsible for user deletion, I noticed it was a GET request.
Since I successfully accessed the admin panel, I realized I could exploit this by sending a request to delete the user "Carlos" via Server-Side Request Forgery (SSRF). My request looked something like this: