SSRF Flashcards
What is SSRF?
SSRF stands for Server-Side Request Forgery, this allows a malicious user to cause a web server to make another edited HTTP request to the resource of the attackers choice.
What’re the two types of SSRF and what do they do?
Regular SSRF: Returns data to the attackers screen
and
Blind SSRF: The SSRF will occur, but no data will be returned to the screen of the attacker afterwards
What are some examples of SSRF?
What are some examples of SSRF?
Expected Request, Path Traversal, and Subdomain Manipulation
How do you find SSRF vulnerabilities?
You will most of the time have to look for specific parameters that are known to have potential SSRF vulnerabilities; examples include: dest, path, url, domain, html, etc.
What are the common SSRF defenses that developers use?
There are two primary tools that a developer will use to try and prevent SSRF vulnerabilities: Deny Lists and Allow Lists.
What are Deny Lists?
These lists accept all request except request specified in a list with specific patterns and rules.
What are Allow Lists?
These lists deny all request except request specified in a list with specific patterns and rules.
Whats Open Redirect?
This is an endpoint thats used to automatically take a web visitor to another web address.
How do you overcome Deny Lists/Allow Lists?
You’ll have to essentially spoof the local host IP address or 127.0.0.1, the other way is for the attacker to actually create a subdomain on their own domain.