Skip to content

Latest commit

 

History

History
26 lines (18 loc) · 1.3 KB

ssrf.md

File metadata and controls

26 lines (18 loc) · 1.3 KB

Server-side request forgery (SSRF)

Zen for Java secures your app against server-side request forgery (SSRF) attacks. SSRF vulnerabilities allow attackers to send crafted requests to internal services, bypassing firewalls and security controls. Runtime blocks SSRF attacks by intercepting and validating requests to internal services.

Example

GET https://your-app.com/files?url=http://localhost:3000/private
URL url = new URL(urlString); // From query
HttpURLConnection connection = (HttpURLConnection) url.openConnection();
connection.setRequestMethod("GET");
int responseCode = connection.getResponseCode();

In this example, an attacker sends a request to localhost:3000/private from your server. Zen can intercept the request and block it, preventing the attacker from accessing internal services.

GET https://your-app.com/files?url=http://localtest.me:3000/private

In this example, the attacker sends a request to localtest.me:3000/private, which resolves to 127.0.0.1. Zen can intercept the request and block it, preventing the attacker from accessing internal services.

We don't protect against stored SSRF attacks, where an attacker injects a malicious URL into your app's database. To prevent stored SSRF attacks, validate and sanitize user input before storing it in your database.