SERVER SIDE REQUEST FORGERY
SERVER SIDE REQUEST FORGERY
SAKTHI AYYAPPAN
SERVER-SIDE REQUEST FORGERY
• It’s all about an attacker crafting a request that the server obediently
• REFLECTED SSRF
• BLIND SSRF
• DNS REBINDING
into a web application, and the application then reflects that input
vulnerability.
internal resource.
internal resource.
• The web application processes the injected payload and makes a
resource.
display the response from the internal resource to the attacker. This
Despite not seeing the response directly, the attacker employs techniques
to confirm the success of the SSRF attack indirectly like the Time Delays
internet.
Protocol-Based Attacks:
others.
protocols.
• In a protocol-based Server-Side Request Forgery (SSRF) attack,
protocols.
For example, an image with embedded URL or XML External Entity (XXE)
attack.
internal network.
FUNCTIONALITY
Time-Based Attacks:
not.
or not.
attacks.
IMPACTS OF SSRF :
resources.
1. Data Leakage:
(SSRF) vulnerabilities:
URLs.
file://, gopher://).
facing systems.
access.
services.
promptly.
tools.
mitigation strategies.
deployment
REFERENCES :
https://portswigger.net/web-
security/ssrf#:~:text=Server%2Dside%20request%20forgery%20is,services%20within%
20the%20organization's%20infrastructure.
https://www.feroot.com/education-center/what-is-server-side-request-forgery-ssrf/