Server-Side Request Forgery
Summary#
Invicti detected a possible Server-Side Request Forgery by capturing a DNS request that was made to {SSRFRESPONDER} but was unable to confirm the vulnerability.
Impact#
Server-Side Request Forgery allows an attacker to make local and/or remote network requests while masquerading as the target server.
Remediation#
- Where possible, do not use users' input for URLs.
- If you definitely need dynamic URLs, use whitelisting. Make a list of valid, accepted URLs and do not accept other URLs.
- Ensure that you only accept URLs those are located on the trusted domains.
Classifications#
Further Reading#