From the course: Complete Guide to Cybersecurity: A Practical Approach

Unlock this course with a free trial

Join today to access over 24,400 courses taught by industry experts.

Understanding server-side request forgery (SSRF) vulnerabilities

Understanding server-side request forgery (SSRF) vulnerabilities

From the course: Complete Guide to Cybersecurity: A Practical Approach

Understanding server-side request forgery (SSRF) vulnerabilities

- Let's go over server-side request forgery. This is one of the most common vulnerabilities nowadays in web applications. Basically, these type of vulnerabilities will enable an attacker to manipulate a server-side application to send requests to unintended destinations. Basically, the attacker can exploit this to make the server establish connections with either internal services that are restricted to the organization's infrastructure and then being able to reveal sensitive information or to external systems potentially resulting in the exposure of sensitive data like authorization, credentials, and so on. This is an example on how an attacker can initiate a server-side request forgery attack to the vulnerable application and then basically the application is unaware of the attack and executes requests on behalf of the attacker. This request can be directed towards internal services or external services as well as I mentioned to you earlier. One of the best resources out there to…

Contents