OWASP Top Ten 2021 - A10 Server-Side Request Forgery (SSRF)

owasp-a10

Server-side request forgery is a vulnerability that allows a malicious user to trick the server-side application into making requests to an unintended destination/resource.

Server-Side Request Forgery (SSRF) attacks are a type of vulnerability where an attacker can manipulate a web application's parameter to create or control requests on a vulnerable server. These attacks are often used by attackers to target internal systems that are inaccessible from the external network and usually protected by a firewall.

The most common case is an application that, to implement a function, makes HTTPS requests to a third-party service. This request may be necessary to: consult an API, download a package, or retrieve user-related information through an account (e.g., Facebook, Gravatar). An attacker could exploit this function to make requests to, for example, a domain under their control.

OWASP Top 10 Application Security Risks - 2021 Reference
A10:2021-Server-side request forgery (SSRF) OWASP


A successful SSRF attack can allow an attacker to escalate and move laterally behind the back-end web server firewall without restrictions, potentially leading to the complete compromise of the application's confidentiality, integrity, and availability.

Francesco Ongaro

Request more information about this


Recent Posts

Visit the blog


Popular Tags


🎉 We want to talk to you! Book an appointment!