OWASP Top 10 – A102021-Server-Side Request Forgery (SSRF)
English | Size: 355.38 MB
Category: Tutorial
SSRF flaws occur whenever a web application is fetching a remote resource without validating the user-supplied URL. It allows an attacker to coerce the application to send a crafted request to an unexpected destination, even when protected by a firewall, VPN, or another type of network access control list (ACL).
As modern web applications provide end-users with convenient features, fetching a URL becomes a common scenario. As a result, the incidence of SSRF is increasing. Also, the severity of SSRF is becoming higher due to cloud services and the complexity of architectures.
RAPIDGATOR
rapidgator.net/file/ee95994b5a09b53f011c72ea5eaff869/OWASP_Top_10_-_A102021-Server-Side_Request_Forgery_(SSRF).rar.html