Server-side Request Forgery
When an application allows or is obligated to make requests to the internal network of the server, and can be tricked to make unauthorized requests, allowing the enumeration of internal network services. This could lead to:
Internal Network Scanning: Abuses SSRF to perform reconnaissance on internal services or private IP ranges
Accessing Metadata Services: Exploits SSRF to access cloud metadata services (e.g., AWS, GCP), potentially exposing sensitive credentials or configurations
HTTP Header Manipulation: Combines SSRF with header injection to manipulate backend behavior, such as bypassing authentication or redirecting traffic
File Exfiltration: Uses SSRF to trick the server into fetching and exposing sensitive files
Service Exploitation: Targets vulnerable internal services accessible via SSRF to execute unauthorized commands
Last updated
Was this helpful?