Server-Side Request Forgery (SSRF) Flashcards
1
Q
What’s SSRF?
A
occurs when an attacker is able to make a server-side application send arbitrary requests to other internal or external systems
2
Q
How can be SSRF vulnerabilities exploited?
A
- bypass network security controls
- access sensitive data
- perform unauthorized actions
- conduct attacks against other systems reachable by the targeted server
3
Q
What is the attack process of SSRF?
A
- attacker crafts a malicious request that includes a URL to the targeted system
- the URL can be supplied as user input, such as through a form field or query parameter
- the server-side application processes the request and sends the specified URL, often without proper validation or sanitization
- the targeted server receives the request from the server-side application, which appears to originate from within its trusted network, allowing the attacker to access internal resources or attack other systems
4
Q
What are the potential consequences of SSRF?
A
- unauthorized access to internal resources or systems
- data leakage or retrieval of sensitive information
- attacks against other systems accessible by the targeted server
- potential for remote code execution or remote command execution
5
Q
What is the prevention and mitigation of SSRF?
A
- Input Validation and Sanitization
- Whitelisting
- Network Segmentation
- Server Configuration
- Regular Security Testing