Server-side request forgery (SSRF)

Server-side request forgery (SSRF)

Description

It is possible to induce the application's server into making requests to an arbitrary domain.

Impact

- Obtain usable credentials at the API Connect endpoint.
- Read, write and delete user and system data.
- Browse any path registered in the system, in the context of Apache Camel.
- Consume HTTP, FTP, or any valid Apache Camel protocol-component services.
- Obtain information from the network adjacent to the server, or its Public IP.
- Obtain a token from any user, by modifying the clientIP field.
- Evade control mechanisms against automated attacks, such as CAPTCHA and OTP (dynamic key).
- Write files to the server, and identify its operating system.

Recommendation

The system must avoid that the information query from the server be controlled by users. If this is necessary, the system must restrict the endpoints accepted for query.

Threat

Unauthorized attacker from the Internet.

Expected Remediation Time

⌚ 120 minutes.

Score

Default score using CVSS 3.1. It may change depending on the context of the src.

Base

  • Attack vector: N
  • Attack complexity: L
  • Privileges required: N
  • User interaction: N
  • Scope: C
  • Confidentiality: L
  • Integrity: H
  • Availability: L

Temporal

  • Exploit code maturity: X
  • Remediation level: X
  • Report confidence: X

Result

  • Vector string: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L/E:X/RL:X/RC:X
  • Score:
    • Base: 9.9
    • Temporal: 9.9
  • Severity:
    • Base: Critical
    • Temporal: Critical

Score 4.0

Default score using CVSS 4.0. It may change depending on the context of the src.

Base 4.0

  • Attack vector: N
  • Attack complexity: L
  • Attack Requirements: N
  • Privileges required: N
  • User interaction: N
  • Confidentiality (VC): L
  • Integrity (VI): H
  • Availability (VA): L
  • Confidentiality (SC): L
  • Integrity (SI): L
  • Availability (SA): L

Threat 4.0

  • Exploit maturity: X

Result 4.0

  • Vector string: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:L/SI:L/SA:L/E:X
  • Score:
    • CVSS-BT: 8.8
  • Severity:
    • CVSS-BT: High

Requirements

Fixes

Free trial message
Free trial
Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan. If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.