Preventing server-side request forgery attacks Conference

Jabiyev, B, Mirzaei, O, Kharraz, A et al. (2021). Preventing server-side request forgery attacks . 1626-1635. 10.1145/3412841.3442036

cited authors

  • Jabiyev, B; Mirzaei, O; Kharraz, A; Kirda, E

abstract

  • In today's web, it is not uncommon for web applications to take a complete URL as input from users. Usually, once the web application receives a URL, the server opens a connection to it. However, if the URL points to an internal service and the server still makes the connection, the server becomes vulnerable to Server-Side Request Forgery (SSRF) attacks. These attacks can be highly destructive when they exploit internal services. They are equally destructive and need much less effort to succeed if the server is hosted in a cloud environment. Therefore, with the growing use of cloud computing, the threat of SSRF attacks is becoming more serious. In this paper, we present a novel defense approach to protect internal services from SSRF attacks. Our analysis of more than 60 SSRF vulnerability reports shows that developers' awareness about this vulnerability is generally limited. Therefore, coders usually have flaws in their defenses. Even when these defenses have no flaws, they are usually still affected by important security and functionality limitations. In this work, we develop a prototype based on the proposed approach by extending the functionality of a popular reverse proxy application and deploy a set of vulnerable web applications with that prototype. We demonstrate how SSRF attacks on these applications, with almost no loss of performance, are prevented.

publication date

  • March 22, 2021

Digital Object Identifier (DOI)

International Standard Book Number (ISBN) 13

start page

  • 1626

end page

  • 1635