Server-side request forgery (SSRF)
Description
It is possible to induce the application's server into making requests to an arbitrary domain.
Impact
- Obtain usable credentials at the API Connect endpoint.
- Read, write and delete user and system data.
- Browse any path registered in the system, in the context of Apache Camel.
- Consume HTTP, FTP, or any valid Apache Camel protocol-component services.
- Obtain information from the network adjacent to the server, or its Public IP.
- Obtain a token from any user, by modifying the clientIP field.
- Evade control mechanisms against automated attacks, such as CAPTCHA and OTP (dynamic key).
- Write files to the server, and identify its operating system.
Recommendation
The system must avoid that the information query from the server be controlled by users. If this is necessary, the system must restrict the endpoints accepted for query.
Threat
Unauthorized attacker from the Internet.
Expected Remediation Time
⌚ minutes.
Score
Default score using CVSS 3.1. It may change depending on the context of the src.
Base
- Attack vector: N
- Attack complexity: L
- Privileges required: N
- User interaction: N
- Scope: C
- Confidentiality: L
- Integrity: H
- Availability: L
Temporal
- Exploit code madurity: X
- Remediation level: X
- Report confidence: X
Result
- Vector string: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L/E:X/RL:X/RC:X
- Score:
- Base: 9.9
- Temporal: 9.9
- Severity:
- Base: Critical
- Temporal: Critical
Requirements
Fixes
free trial
Search for vulnerabilities in your apps for free with our automated security testing! Start your 21-day free trial and discover the benefits of our Continuous Hacking Machine Plan. If you prefer a full service that includes the expertise of our ethical hackers, don't hesitate to contact us for our Continuous Hacking Squad Plan.