2021 OWASP Top Ten: Server Side Request Forgery
19.2 هزار بار بازدید -
3 سال پیش
-
SSRF flaws occur whenever a
SSRF flaws occur whenever a web application is fetching a remote resource without validating the user-supplied URL. It allows an attacker to coerce the application to send a crafted request to an unexpected destination, even when protected by a firewall, VPN, or another type of network access control list (ACL). As modern web applications provide end-users with convenient features, fetching a URL becomes a common scenario. As a result, the incidence of SSRF is increasing. Also, the severity of SSRF is becoming higher due to cloud services and the complexity of architectures.
#OWASPTOP10
Video 11 / 11
⬇️⬇️⬇️ JOIN THE COMMUNITY! ⬇️⬇️⬇️
DevCentral is an online community of technical peers dedicated to learning, exchanging ideas, and solving problems - together.
Find all our platform links ⬇️ and follow our Community Evangelists! 👋
➡️ DEVCENTRAL: https://community.f5.com
➡️ YOUTUBE: devcentral
➡️ LINKEDIN: LinkedIn: f5-devcentral
➡️ TWITTER: Twitter: devcentral
Your Community Evangelists:
👋 Jason Rahm: LinkedIn: jrahm | Twitter: jasonrahm
👋 Buu Lam: LinkedIn: buulam | Twitter: buulam
👋 Aubrey King: LinkedIn: aubreyking | Twitter: aubreykingf5
#OWASPTOP10
Video 11 / 11
⬇️⬇️⬇️ JOIN THE COMMUNITY! ⬇️⬇️⬇️
DevCentral is an online community of technical peers dedicated to learning, exchanging ideas, and solving problems - together.
Find all our platform links ⬇️ and follow our Community Evangelists! 👋
➡️ DEVCENTRAL: https://community.f5.com
➡️ YOUTUBE: devcentral
➡️ LINKEDIN: LinkedIn: f5-devcentral
➡️ TWITTER: Twitter: devcentral
Your Community Evangelists:
👋 Jason Rahm: LinkedIn: jrahm | Twitter: jasonrahm
👋 Buu Lam: LinkedIn: buulam | Twitter: buulam
👋 Aubrey King: LinkedIn: aubreyking | Twitter: aubreykingf5
3 سال پیش
در تاریخ 1400/11/08 منتشر شده
است.
19,220
بـار بازدید شده