CAPEC 664 Server Side Request Forgery

Stable Standard High Risk
Severity High

Description

{'xhtml:p': 'An adversary exploits improper input validation by submitting maliciously crafted input to a target application running on a server, with the goal of forcing the server to make a request either to itself, to web services running in the server\u00e2\u0080\u0099s internal network, or to external third parties. If successful, the adversary\u00e2\u0080\u0099s request will be made with the server\u00e2\u0080\u0099s privilege level, bypassing its authentication controls. This ultimately allows the adversary to access sensitive data, execute commands on the server\u00e2\u0080\u0099s network, and make external requests with the stolen identity of the server. Server Side Request Forgery attacks differ from Cross Site Request Forgery attacks in that they target the server itself, whereas CSRF attacks exploit an insecure user authentication mechanism to perform unauthorized actions on the user's behalf.'}

Attack Execution Flow

3

Mitigations

5

Consequences

Relationships

Resources Required

1