Server-Side Request Forgery Flashcards

1
Q

Explain what is SSRF.

A

It’s a vulnerability that happens when an application retrieves remote resources without validating user input. An attacker could supply his own input as a URL and then control the resources that are retrieved by the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the possible impacts of a SSRF attack?

A

An attacker could supply an URL that exposes sensitive data, scan the target’s internal network or even perform RCE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an In-Band SSRF attack?

A

SSRF type where the server responds with the resource specified by the end-user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Blind SSRF attack?

A

A SSRF type where there is no sign or indication that the server is vulnerable. The response is not unusual and the attacker would need to provide an URL for a server that he controls in order to confirm if any requests were made.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What request characteristic(s) should you look for when searching for SSRF?

A

Look for requests that have any of the following:
- Include full or partial URL in the POST body or parameters;
- Headers that include URLs like the Referer;
- Allow for user input that could lead in a server retrieving remote resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following would be useful for a payload when testing for SSRF?
(Select all that apply)
1. http://localhost
2. https://ifconfig.pro
3. http://
4. ifconfig
5. ‘ OR 1=1
6. http://127.0.0.1

A

1, 2 and 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of URL can be used to access files while performing an SSRF attack?

A

file:// URLs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly