Summary #

Invicti detected a Server-Side Request Forgery based on pattern matching but was unable to confirm the vulnerability.

Impact #

Server-Side Request Forgery allows an attacker to make local and/or remote network requests while masquerading as the target server.

Remediation #
  • Where possible, do not use users' input for URLs.
  • If you definitely need dynamic URLs, use whitelisting. Make a list of valid, accepted URLs and do not accept other URLs.
  • Ensure that you only accept URLs those are located on the trusted domains.
Classifications #
CWE-918; ISO27001-A.14.2.5; OWASP 2013-A5; OWASP 2017-A6 , CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Dead accurate, fast & easy-to-use Web Application Security Scanner

Get a demo