Jump to content

Server-side request forgery

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Ronykris22 (talk | contribs) at 07:16, 5 May 2020. The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

In computer security, server-side request forgery (SSRF) is a type of exploit where an attacker abuses the functionality of a server causing it to access or manipulate information in the realm of that server that would otherwise not be directly accessible to the attacker.[1]

Similar to cross-site request forgery which utilises a web client, for example, a web browser, within the domain as a proxy for attacks; an SSRF attack utilizes an insecure server within the domain as a proxy.

Types of SSRF -

i. Basic SSRF: Here the response is displayed to the attacker.

ii. Blind SSRF: Here the response is not displayed to the attacker. (Difficult to detect at first sight)

Basic SSRF:

In this type of attack the response is displayed to the attacker. The server fetches the URL requested by the attacker and sends the response back to the attacker.

Blind SSRF:

In this type of attack the response is not sent back to the attacker. Therefore, the attacker has to device ways to confirm this vulnerability.

References

  1. ^ "The Open Web Application Security Project". OWASP.org. Retrieved 23 July 2018.