Zen for Java secures your app against server-side request forgery (SSRF) attacks. SSRF vulnerabilities allow attackers to send crafted requests to internal services, bypassing firewalls and security controls. Runtime blocks SSRF attacks by intercepting and validating requests to internal services.
GET https://your-app.com/files?url=http://localhost:3000/private
URL url = new URL(urlString); // From query
HttpURLConnection connection = (HttpURLConnection) url.openConnection();
connection.setRequestMethod("GET");
int responseCode = connection.getResponseCode();
In this example, an attacker sends a request to localhost:3000/private
from your server. Zen can intercept the request and block it, preventing the attacker from accessing internal services.
GET https://your-app.com/files?url=http://localtest.me:3000/private
In this example, the attacker sends a request to localtest.me:3000/private
, which resolves to 127.0.0.1
. Zen can intercept the request and block it, preventing the attacker from accessing internal services.
We don't protect against stored SSRF attacks, where an attacker injects a malicious URL into your app's database. To prevent stored SSRF attacks, validate and sanitize user input before storing it in your database.