Java SSRF query: copyedit qhelp

This commit is contained in:
Chris Smowton
2021-04-14 13:09:58 +01:00
parent 3333e7d186
commit e8613367e8

View File

@@ -5,22 +5,22 @@
<overview>
<p>Directly incorporating user input into a HTTP request without validating the input
<p>Directly incorporating user input into an HTTP request without validating the input
can facilitate Server Side Request Forgery (SSRF) attacks. In these attacks, the server
may be tricked into making a request and interacting with an attacker-controlled server.
may be tricked into making a request and interacting with an attacker-controlled server.
</p>
</overview>
<recommendation>
<p>To guard against SSRF attacks, it is advisable to avoid putting user input
directly into the request URL. Instead, maintain a list of authorized
directly into a request URL. Instead, maintain a list of authorized
URLs on the server; then choose from that list based on the user input provided.</p>
</recommendation>
<example>
<p>The following example shows an HTTP request parameter being used directly in a forming a
<p>The following example shows an HTTP request parameter being used directly to form a
new request without validating the input, which facilitates SSRF attacks.
It also shows how to remedy the problem by validating the user input against a known fixed string.
</p>