Skip to main content

SSRF Injection in headers

Description

SSRF flaws occur whenever a web application is fetching a remote resource without validating the user-supplied URL. It allows an attacker to coerce the application to send a crafted request to an unexpected destination, even when protected by a firewall, VPN, or another type of network access control list (ACL).

Remediation

How to prevent:

  • Segment remote resource access functionality in separate networks to reduce the impact of SSRF.
  • Sanitize and validate all client-supplied input data.
  • Enforce the URL schema, port, and destination with a positive allow list.
  • Disable HTTP redirections.

Configuration

Identifier: request_forgery/ssrf_header

Examples

Ignore this check

{
"checks": {
"request_forgery/ssrf_header": {
"skip": true
}
}
}

Score

  • Escape Severity: LOW
    • OWASP: API10:2023
    • PCI DSS: 6.5.6
    • CWE
      • 918
      • 441
    • WASC: WASC-15

CVSS

  • CVSS_VECTOR: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
  • CVSS_SCORE: 7.3