Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Server-side request forgery

From Wikipedia, the free encyclopedia
Type of computer security exploit
icon
This articleneeds additional citations forverification. Please helpimprove this article byadding citations to reliable sources. Unsourced material may be challenged and removed.
Find sources: "Server-side request forgery" – news ·newspapers ·books ·scholar ·JSTOR
(October 2022) (Learn how and when to remove this message)

Server-side request forgery (SSRF) is a computer security vulnerability that enables an attacker to send requests from a vulnerable server to internal or external systems[1] or the server itself.[2] The vulnerability arises when server functionality can be manipulated to access or modify resources that are otherwise inaccessible.[3] SSRF is listed among the most critical API security risks[4] and is recognized as one of the most serious software weaknesses.[5]

Overview

[edit]

In an SSRF incident, the vulnerable server issues a request to a URL supplied or altered by the attacker. While the supplied URL can target any endpoint, common destinations include internal networks, localhost services, and cloud metadata endpoints that are otherwise inaccessible to external users.

SSRF is not limited to the HTTP protocol. In cases where the application itself performs the second request, it could use different protocols (e.g. FTP, SMB, SMTP, etc.) and schemes (e.g.file://,phar://,gopher://,data://,dict://, etc.)[2]

SSRF common flow diagram

The severity of an SSRF attack depends on the assets that can be accessed and whether the server’s response is observable to the attacker. In severe cases, SSRF can compromise cloud environments, exploit internal hosts, obtain sensitive information, or use the server as a proxy to conceal other malicious activities.

Similar tocross-site request forgery which utilizes aweb client, for example, a web browser, within the domain as a proxy for attacks; an SSRF attack utilizes a vulnerable server within the domain as aproxy.

Types

[edit]

Basic

[edit]

In this type of attack the response is displayed to the attacker. The server fetches the URL requested by the attacker and sends the response back to the attacker.

Blind

[edit]

In this type of attack the response is not sent back to the attacker. Therefore, the attacker has to devise ways to confirm this vulnerability.

Causes and Prevention

[edit]

SSRF occurs when an API endpoint accesses a URL supplied by the client without verifying that the request is directed to an intended destination.[6]

Prevention measures includeinput validation, which can be supported throughStatic Analysis Security Testing (SAST) tooling. When feasible, restricting server requests to anallowlist of trusted applications is recommended, although additional safeguards may still be necessary to addresshostname resolution,redirects andDNS rebindings. When servers must send requests to arbitrary external domains or IP addresses,network segregation is recommended to block unauthorized traffic at the network layer.[2]

Notable Exploits

[edit]
  • Capital One (2019) A SSRF exploit that exposed an AWS credential key led to the breach of 1 million social insurance numbers, 140,000 Social Security Numbers, and 80,000 bank account numbers, affecting approximately 100 million individuals in the United States and approximately 6 million in Canada.[7] The company received an $80 million fine from theU.S. Office of the Comptroller of the Currency (OCC),[8] and paid $190 million to settle a class-action lawsuit[9] related to the breach.
  • Microsoft Exchange Server (2021) An SSRF vulnerability was leveraged to send arbitrary HTTP requests and authenticate as the Exchange server.[10] It became the most well-known and impactful Exchange exploit chain and affected an estimated 250,000 servers and 30,000 organizations in the US.[11]

References

[edit]
  1. ^Novikov, Ivan (26 January 2017)."SSRF Bible"(PDF).OWASP. Retrieved11 September 2025.{{cite web}}: CS1 maint: url-status (link)
  2. ^abc"Server Side Request Forgery Prevention - OWASP Cheat Sheet Series".cheatsheetseries.owasp.org. Retrieved2025-09-11.
  3. ^"The Open Web Application Security Project".OWASP.org. Retrieved23 July 2018.
  4. ^"OWASP API Security Top 10".owasp.org. Retrieved2025-09-11.
  5. ^"CWE - 2024 CWE Top 25 Most Dangerous Software Weaknesses".cwe.mitre.org. Retrieved2025-09-11.
  6. ^"CWE-918: Server-Side Request Forgery (SSRF)".CWE.Mitre.org. Retrieved4 Oct 2022.
  7. ^"2019 Capital One Cyber Incident | What Happened".Capital One. Retrieved2025-09-17.
  8. ^"OCC Assesses $80 Million Civil Money Penalty Against Capital One".OCC.gov. 2020-08-06. Retrieved2025-09-17.
  9. ^"Capital One settles a class-action lawsuit for $190 million in a 2019 hacking. (Published 2021)". 2021-12-23. Retrieved2025-09-17.
  10. ^Intelligence, Microsoft 365 Security, Microsoft Threat (2021-03-02)."HAFNIUM targeting Exchange Servers with 0-day exploits".Microsoft Security Blog. Retrieved2025-09-17.{{cite web}}: CS1 maint: multiple names: authors list (link) CS1 maint: numeric names: authors list (link)
  11. ^"At Least 30,000 U.S. Organizations Newly Hacked Via Holes in Microsoft's Email Software – Krebs on Security". 2021-03-29. Retrieved2025-09-17.
Threats
vectorial version
vectorial version
Defenses
Related
security
topics
Retrieved from "https://en.wikipedia.org/w/index.php?title=Server-side_request_forgery&oldid=1322851731"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp