Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Remediation advice in SSRF could be more broadly focused #18815

Open
PhilipAtCisco opened this issue Feb 19, 2025 · 1 comment
Open

Remediation advice in SSRF could be more broadly focused #18815

PhilipAtCisco opened this issue Feb 19, 2025 · 1 comment
Labels
question Further information is requested

Comments

@PhilipAtCisco
Copy link

Description of the issue

The remediation advice for how to mitigate SSRF vulnerabilities is focused on URL allowlisting. While this is fairly good for https schemes where possible to implement, it's not really a comprehensive defense for SSRF.

The advice given assumes that an attacker can't manipulate DNS entries for the domain being allowlisted. It also doesn't offer any advice for mitigating SSRF if an attacker has complete control of the URL and an allowlist isn't practical.

It would be good to add a sentence to the advice to make the remediation advice less specific. Perhaps incorporating a mention of additional network or application controls to prevent servers from making connections to internal resources in the first place (e.g. based on IP addresses).

https://owasp.org/Top10/A10_2021-Server-Side_Request_Forgery_%28SSRF%29/

@PhilipAtCisco PhilipAtCisco added the question Further information is requested label Feb 19, 2025
@Kwstubbs
Copy link
Contributor

Kwstubbs commented Feb 20, 2025

Hi Philip,

The advice given assumes that an attacker can't manipulate DNS entries for the domain being allowlisted.

I don't see how this is relevant to the SSRF present on the vulnerable application.

It also doesn't offer any advice for mitigating SSRF if an attacker has complete control of the URL and an allowlist isn't practical.

We want the docs to be easy to understand. Do you know if there is any way to get the IP address of the URL in the same request that grabbed the server contents? Otherwise to properly check the IP address gets more complicated than can be described in a help doc. I can look into it in the coming weeks.

Perhaps incorporating a mention of additional network or application controls to prevent servers from making connections to internal resources in the first place (e.g. based on IP addresses).

Sure, I'll add a statement about network segmentation.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
question Further information is requested
Projects
None yet
Development

No branches or pull requests

2 participants