Server-Side Request Forgery (SSRF) Flashcards

1
Q

What’s SSRF?

A

occurs when an attacker is able to make a server-side application send arbitrary requests to other internal or external systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can be SSRF vulnerabilities exploited?

A
  1. bypass network security controls
  2. access sensitive data
  3. perform unauthorized actions
  4. conduct attacks against other systems reachable by the targeted server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the attack process of SSRF?

A
  1. attacker crafts a malicious request that includes a URL to the targeted system
  2. the URL can be supplied as user input, such as through a form field or query parameter
  3. the server-side application processes the request and sends the specified URL, often without proper validation or sanitization
  4. the targeted server receives the request from the server-side application, which appears to originate from within its trusted network, allowing the attacker to access internal resources or attack other systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the potential consequences of SSRF?

A
  • unauthorized access to internal resources or systems
  • data leakage or retrieval of sensitive information
  • attacks against other systems accessible by the targeted server
  • potential for remote code execution or remote command execution
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the prevention and mitigation of SSRF?

A
  • Input Validation and Sanitization
  • Whitelisting
  • Network Segmentation
  • Server Configuration
  • Regular Security Testing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly