Server-Side Request Forgery (SSRF)
highWhat is SSRF?
SSRF allows an attacker to make the server-side application send HTTP requests to an arbitrary domain of the attacker's choosing, often targeting internal services.
How it works
The application accepts a URL from user input and fetches it server-side. An attacker provides URLs pointing to internal services (169.254.169.254, localhost, internal APIs) to access metadata, internal APIs, or cloud credentials.
Impact
Cloud metadata credential theft (AWS/GCP/Azure keys), internal service enumeration, port scanning of internal networks, and reading local files via file:// protocol.
ShieldReport tests URL-accepting endpoints with internal IP addresses, cloud metadata URLs, and DNS rebinding payloads.
How to fix it
Validate and sanitize all user-supplied URLs. Use allowlists for permitted domains. Block requests to private IP ranges and cloud metadata endpoints. Use a proxy with egress filtering.
Tags
Is your site vulnerable to SSRF?
Run a free scan to find out in under 2 minutes.
Scan Now