A Detailed Guide to the OWASP Top 10 - API7:2023 Server Side Request Forgery

A Detailed Guide to the OWASP Top 10 - API7:2023 Server Side Request Forgery

Assessment

Interactive Video

Information Technology (IT), Architecture

University

Hard

Created by

Quizizz Content

FREE Resource

The video tutorial explains Server-Side Request Forgery (SSRF) vulnerabilities, where an API fetches remote resources without validating user-supplied URLs. This can allow attackers to send crafted requests to unexpected destinations, even bypassing firewalls. An example is given using a social network site where users upload profile pictures. Attackers can exploit this by sending malicious URLs to initiate port scanning. The video also covers how attackers detect open ports and services based on server response times. To prevent SSRF, it is crucial to validate and sanitize client input, disable HTTP redirections, isolate resource fetching, and avoid sending raw responses to clients.

Read more

1 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

What new insight or understanding did you gain from this video?

Evaluate responses using AI:

OFF