Skip to content

Commit dddfab6

Browse files
committed
chore(API6:2023): Review heading table contents
1 parent 7164d32 commit dddfab6

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

2023/en/src/0xa6-server-side-request-forgery.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ API6:2023 Server Side Request Forgery
44
| Threat agents/Attack vectors | Security Weakness | Impacts |
55
| - | - | - |
66
| API Specific : Exploitability **2** | Prevalence **2** : Detectability **1** | Technical **2** : Business Specific |
7-
| Exploitation requires the attacker to find an API endpoint that receives a URI as a parameter and then accesses the provided URI. URL parsing inconsistencies are well-known for most common programming languages' built-in functions and libraries. | Modern concepts in application development encourage developers to access URIs provided by the client. Usually, server-side data retrieval is not logged, or when it is chances are it isn't being monitored. | Successful exploitation might lead to internal services enumeration (e.g. port scanning) or information disclosure, bypassing firewalls or other security mechanisms. In some cases, it can lead to DoS or the server being used as a proxy to hide malicious activities. |
7+
| Exploitation requires the attacker to find an API endpoint that receives a URI as a parameter and then accesses the provided URI. In general basic SSRF (when the response is returned to the attacker) is easier to exploit than Blind SSRF in which the attacker has no feedback whether or not the attack was successful. | Modern concepts in application development encourage developers to access URIs provided by the client, whilst URL parsing inconsistencies are well-known for most common programming languages' built-in functions and libraries. Regular API request including special crafted URLs (e.g. internal/private/well-known IP addresses) and response analysis will be required to detect the issue. When the response is not returned (Blind SSRF), confirming the vulnerability requires more effort and creativity. | Successful exploitation might lead to internal services enumeration (e.g. port scanning) or information disclosure, bypassing firewalls or other security mechanisms. In some cases, it can lead to DoS or the server being used as a proxy to hide malicious activities. |
88

99
## Is the API Vulnerable?
1010

0 commit comments

Comments
 (0)