Summary

Netsparker detected a Server-Side Request Forgery based on pattern matching but was unable to confirm the vulnerability.

Impact

Server-Side Request Forgery allows an attacker to make local and/or remote network requests while masquerading as the target server.

Having an SSH endpoint that is accessible through SSRF MAY lead to total compromise of the target computer other resources that are accessible by the compromised account.

Remediation
  • Where possible, do not use users' input for URLs.
  • If you definitely need dynamic URLs, use whitelisting. Make a list of valid, accepted URLs and do not accept other URLs.
  • Ensure that you only accept URLs those are located on the trusted domains.
Netsparker

Dead accurate, fast & easy-to-use Web Application Security Scanner

GET A DEMO