- 重要な情報
- はじめに
- 用語集
- ガイド
- エージェント
- インテグレーション
- OpenTelemetry
- 開発者
- API
- CoScreen
- アプリ内
- Service Management
- インフラストラクチャー
- アプリケーションパフォーマンス
- 継続的インテグレーション
- ログ管理
- セキュリティ
- UX モニタリング
- 管理
Detect successful exploitation attempts of the SSRF vulnerability.
Server-Side Request Forgery (SSRF) is a web security vulnerability that allows an attacker to deceive the application and make requests to an unintended location.
In a typical SSRF attack, the attacker might cause the server to make a connection to internal-only services within an organization’s infrastructure. In other cases, they may be able to force the server to connect to arbitrary external systems, potentially leaking sensitive data.
Monitor application security events to detect SSRF attack patterns (@appsec.security_activity:attack_attempt.ssrf
) on distributed traces where external HTTP requests are performed. The heuristic conducts additional analysis to detect if the SSRF vulnerability exists and is triggered or not. When a vulnerability exploitation attempt is detected (@appsec.security_activity:vulnerability_trigger.ssrf
), a Security Signal with CRITICAL
severity is generated.
The detection heuristics are as follow:
Analyze the external HTTP requests which are performed by the application to look for suspicious calls
bla.db.internal:6379:1324/?q=nice
)Check if the user inputs is manipulating or tampering those requests
The severity of the signal is lowered to High
when the application threw an exception during execution, indicating they might not have succeeded at impacting the system.