OWASP Top Ten 2021 - A10 Server-Side Request Forgery (SSRF)

owasp-a10

Server-side request forgery is a vulnerability that allows a malicious user to trick the server-side application into making requests to an unintended destination/resource.

Server-Side Request Forgery (SSRF) attacks are a type of vulnerability where an attacker can manipulate a web application's parameter to create or control requests on a vulnerable server. These attacks are often used by attackers to target internal systems that are inaccessible from the external network and usually protected by a firewall.

The most common case is an application that, to implement a function, makes HTTPS requests to a third-party service. This request may be necessary to: consult an API, download a package, or retrieve user-related information through an account (e.g., Facebook, Gravatar). An attacker could exploit this function to make requests to, for example, a domain under their control.

OWASP Top 10 Application Security Risks - 2021 Reference
A10:2021-Server-side request forgery (SSRF) OWASP


A successful SSRF attack can allow an attacker to escalate and move laterally behind the back-end web server firewall without restrictions, potentially leading to the complete compromise of the application's confidentiality, integrity, and availability.

Francesco Ongaro

Request more information about this

Or call us at
(+39) 045 4853232


Recent Posts

Visit the blog


Popular Tags


🎉 We want to talk to you! Book an appointment!