Server-Side Request Forgery (Packet Cloud)
Summary#
Invicti detected a Server-Side Request Forgery based on pattern matching and confirmed the vulnerability using specific Packet Cloud meta-data API requests.
Impact#
Server-Side Request Forgery allows an attacker to make local and/or remote network requests while masquerading as the target server.
Having a Packet Cloud meta-data API endpoint that is accessible through SSRF MAY lead to the exposure of sensitive information regarding the vulnerable machine and may aid an attacker in compromising it.
Remediation#
- Where possible, do not let users specify URLs for outgoing requests issued by your server.
- If you definitely need dynamic URLs, use whitelisting. Make a list of valid, accepted URLs and do not accept other URLs.
- Ensure that you only accept URLs that are located on the trusted domains.
Classifications#