File tree Expand file tree Collapse file tree 1 file changed +4
-4
lines changed
java/ql/src/Security/CWE/CWE-918 Expand file tree Collapse file tree 1 file changed +4
-4
lines changed Original file line number Diff line number Diff line change 5
5
6
6
7
7
<overview >
8
- <p >Directly incorporating user input into a HTTP request without validating the input
8
+ <p >Directly incorporating user input into an HTTP request without validating the input
9
9
can facilitate Server Side Request Forgery (SSRF) attacks. In these attacks, the server
10
- may be tricked into making a request and interacting with an attacker-controlled server.
10
+ may be tricked into making a request and interacting with an attacker-controlled server.
11
11
</p >
12
12
13
13
</overview >
14
14
<recommendation >
15
15
16
16
<p >To guard against SSRF attacks, it is advisable to avoid putting user input
17
- directly into the request URL. Instead, maintain a list of authorized
17
+ directly into a request URL. Instead, maintain a list of authorized
18
18
URLs on the server; then choose from that list based on the user input provided.</p >
19
19
20
20
</recommendation >
21
21
<example >
22
22
23
- <p >The following example shows an HTTP request parameter being used directly in a forming a
23
+ <p >The following example shows an HTTP request parameter being used directly to form a
24
24
new request without validating the input, which facilitates SSRF attacks.
25
25
It also shows how to remedy the problem by validating the user input against a known fixed string.
26
26
</p >
You can’t perform that action at this time.
0 commit comments