This class is an extension of the MITRE ATT&CK matrix and represents an attacker bypassing security by using SSRF.
Server-Side Request Forgery (SSRF) is a technique used by adversaries to exploit vulnerabilities in web applications by manipulating server-side requests. This attack occurs when an application fetches a remote resource without validating the user-supplied URL. Attackers can leverage SSRF to make the server perform unauthorized actions, such as accessing internal systems, retrieving sensitive data, or interacting with cloud services.
Mitigations: Input Validation: Ensure strict input validation to prevent SSRF attacks. Whitelisting: Implement a whitelist of allowed URLs to restrict the resources that can be accessed. Network Segmentation: Isolate internal systems from external-facing applications to limit the impact of SSRF attacks. Access Controls: Restrict server-side request capabilities to only necessary internal resources.