Summary

Acunetix 360 detected a Server-Side Request Forgery based on pattern matching and confirmed the vulnerability using specific Oracle Cloud meta-data API requests.

Impact

Server-Side Request Forgery allows an attacker to make local and/or remote network requests while masquerading as the target server.

Having an Oracle Cloud meta-data API endpoint that is accessible through SSRF MAY lead to total compromise of the virtual computer and other Oracle Cloud resources that are accessible by the compromised account.

Remediation

  • Where possible, do not let users specify URLs for outgoing requests issued by your server.
  • If you definitely need dynamic URLs, use whitelisting. Make a list of valid, accepted URLs and do not accept other URLs.
  • Ensure that you only accept URLs that are located on the trusted domains.

Severity

Critical

Classification

CWE-918 ISO27001-A.14.2.5 OWASP 2013-A5 OWASP 2017-A6 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L