The vulnerability lies in the HttpUriPlugin of webpack, specifically in how it validates URIs against the allowedUris configuration. The advisory and the provided proof-of-concept clearly demonstrate an SSRF vulnerability due to a bypass in the allow-list check. By analyzing the commits between the last vulnerable version (v5.104.0) and the first patched version (v5.104.1), I identified the security fix in commit c5100702335a9cdcb75558ccd80def2329bd4abf. The patch is located in lib/schemes/HttpUriPlugin.js within the apply method. The vulnerable logic resided in an inner function, isAllowed, which performed a simple string prefix check (startsWith) on the URI. This was insufficient and could be bypassed using a specially crafted URL containing a userinfo part (@). The fix involves parsing the URI with new URL() to correctly identify the origin before checking it against the allowedUris. Therefore, the HttpUriPlugin.apply method is the primary function that would appear in a runtime profile during the exploitation of this vulnerability.