Server-Side Request Forgery (SSRF)
Overview
Common SSRF Attacks
SSRF Against the Server Itself
POST /product/stock HTTP/1.0
Content-Type: application/x-www-form-urlencoded
Content-Length: 118
stockApi=http://localhost/adminSSRF Against Internal Systems
Bypassing SSRF Protections
Deny-List Filters
Allow-List Filters
Using Open Redirects
Blind SSRF
Detection
Exploitation
Prevention
Last updated