This document discusses server-side request forgery (SSRF) attacks and how they can be used to exploit PDF generators. It provides examples of using SSRF to access internal servers and cloud metadata by modifying URLs passed to PDF generators. It also describes techniques for bypassing restrictions, such as using DNS rebinding, JavaScript data exfiltration, or embedding files within PDFs using the <link> tag. The document advocates testing PDF generators thoroughly for SSRF vulnerabilities and provides information on tools that can help automate SSRF testing and exploitation.