CWE-918
ISO27001-A.14.2.5
OWASP 2013-A5
OWASP 2017-A6
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Server-Side Request Forgery (Oracle Cloud)

Severity:
Critical
Summary

Invicti detected a Server-Side Request Forgery based on pattern matching and confirmed the vulnerability using specific Oracle Cloud meta-data API requests.

Impact

Server-Side Request Forgery allows an attacker to make local and/or remote network requests while masquerading as the target server.

Having an Oracle Cloud meta-data API endpoint that is accessible through SSRF MAY lead to total compromise of the virtual computer and other Oracle Cloud resources that are accessible by the compromised account.

Remediation
  • Where possible, do not let users specify URLs for outgoing requests issued by your server.
  • If you definitely need dynamic URLs, use whitelisting. Make a list of valid, accepted URLs and do not accept other URLs.
  • Ensure that you only accept URLs that are located on the trusted domains.
Required Skills for Successful Exploitation
Actions To Take
Vulnerability Index

You can search and find all vulnerabilities

Select Vulnerability
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.