Server-Side Request Forgery (trace.axd)

Severity: Critical
Summary#

Invicti detected a Server-Side Request Forgery based on pattern matching and confirmed the vulnerability using specific trace.axd related requests.

Impact#

Server-Side Request Forgery allows an attacker to make local and/or remote network requests while masquerading as the target server.

Having trace.axd endpoint that is accessible through SSRF leads to attacker gaining access to request details and server variables of all sessions, among other information.

Remediation#
  • Where possible, do not use users' input for URLs.
  • If you definitely need dynamic URLs, use whitelisting. Make a list of valid, accepted URLs and do not accept other URLs.
  • Ensure that you only accept URLs those are located on the trusted domains.

In addition to above, apply the following changes on your web.config file to disable ASP.NET tracing:

<System.Web>
     <trace enabled="false" />
</System.Web>

Build your resistance to threats. And save hundreds of hours each month.

Get a demo See how it works