ssrf
Server Side Request Forgery
Vulnerability that allows a malicious user to cause the webserver to make an additional or edited HTTP request to the resource of the attacker's choosing.
Reflected SSRF Examples
1
Actual Request:http://IP/cart?item=http://sub.domain.com/api/cart/item?id=123
Attack: http://IP/cart?item=http://sub.domain.com/api/user
2
Actual Request:http://IP/cart?item=/item?id=123
Attack: http://IP/cart?item=../../user
3
Actual Request:http://kashz.com/file?server=api&id=123
> http://api.kashz.com/file?id=123
Attack: http://kashz.com/file?server=dev.kashz.com/api/user&x=&id=123
This forces the server to make request like http://dev.kashz.com/api/user&x=.kashz.com/file&id=123
Blind SSRF
Protections
Allow list
Deny list
Last updated