Complimentary 90-day, on-prem license available for entities involved in Covid19 response.
Summary

Netsparker detected a possible Server-Side Request Forgery by capturing a DNS request that was made to Netsparker Hawk but was unable to confirm the vulnerability.

Impact

Server-Side Request Forgery allows an attacker to make local and/or remote network requests while masquerading as the target server.

Remediation
  • Where possible, do not use users' input for URLs.
  • If you definitely need dynamic URLs, use whitelisting. Make a list of valid, accepted URLs and do not accept other URLs.
  • Ensure that you only accept URLs those are located on the trusted domains.

 

Classifications
CWE-918, ISO27001-A.14.2.5, WASC-20, OWASP 2013-A1, OWASP 2017-A1
Netsparker

Dead accurate, fast & easy-to-use Web Application Security Scanner

GET A DEMO