Server-Side Request Forgery
Description
The application is susceptible to Server-Side Request Forgery (SSRF), a high-risk vulnerability that allows attackers to make unauthorized requests to internal and external resources. This vulnerability arises when user-controlled input is not properly validated or sanitized before being used in requests to resources, enabling attackers to manipulate these requests for malicious purposes.
Remediation
Avoid using user-supplied data for constructing requests. If there is a business need for this, consider an allowlist approach and/or block requests to internal resources using firewall rules or a robust request library with anti-SSRF support.
Details
ID | Aggregated | CWE | Type | Risk |
---|---|---|---|---|
918.1 | false | 918 | Active | high |
Links
Docs
Edit this page to fix an error or add an improvement in a merge request.
Create an issue to suggest an improvement to this page.
Product
Create an issue if there's something you don't like about this feature.
Propose functionality by submitting a feature request.
Feature availability and product trials
View pricing to see all GitLab tiers and features, or to upgrade.
Try GitLab for free with access to all features for 30 days.
Get help
If you didn't find what you were looking for, search the docs.
If you want help with something specific and could use community support, post on the GitLab forum.
For problems setting up or using this feature (depending on your GitLab subscription).
Request support