Summary

Acunetix 360 detected a Server-Side Request Forgery based on pattern matching but was unable to confirm the vulnerability.

Impact

Server-Side Request Forgery allows an attacker to make local and/or remote network requests while masquerading as the target server.

Having an SSH endpoint that is accessible through SSRF MAY lead to total compromise of the target computer other resources that are accessible by the compromised account.

Remediation

  • Where possible, do not use users' input for URLs.
  • If you definitely need dynamic URLs, use whitelisting. Make a list of valid, accepted URLs and do not accept other URLs.
  • Ensure that you only accept URLs those are located on the trusted domains.

Severity

High

Classification

CWE-918 ISO27001-A.14.2.5 OWASP 2013-A5 OWASP 2017-A6 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L