Vulnerabilities / Server-side request forgery

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Severity
High
CWE Name
Server-side request forgery
CWE ID
CWE-918
CVSS Score
5.3
Compliance
OWASP TOP10 -> A10
PCI-DSS -> 6.5.1
ISO27001 -> A.5.33, A.5.34, A.8.3, A.8.4, A.8.12, A.8.26
Server-side request forgery

In a Server-side request forgery (SSRF) attack, the attacker tricks the vulnerable application into sending a custom request to an internal application. The attacker might be able to exfiltrate information by making requests to internal applications that otherwise would be out of reach from the attacker. This attack can also be used to trigger actions on those applications, bypassing the restriction of only being available internally.

How to fix

  • The best strategy is to have a filter on the identified vulnerable parameter with a whitelist of URLs where the server can execute requests to. Alternatively, the filter can have patterns for allowed URLs. In case you already have filters in place, review and refine them to be more effective.