mgonzalezcx / WebGoat

WebGoat is a deliberately insecure application
https://webgoat.github.io/WebGoat/
Other
0 stars 0 forks source link

CX SSRF @ webgoat-lessons/ssrf/src/main/java/org/owasp/webgoat/ssrf/SSRFTask2.java [develop] #27

Open mgonzalezcx opened 2 years ago

mgonzalezcx commented 2 years ago

SSRF issue exists @ webgoat-lessons/ssrf/src/main/java/org/owasp/webgoat/ssrf/SSRFTask2.java in branch develop

The application sends a request to a remote server, for some resource, using openStream in webgoat-lessons\ssrf\src\main\java\org\owasp\webgoat\ssrf\SSRFTask2.java:50. However, an attacker can control the target of the request, by sending a URL or other data in url at webgoat-lessons\ssrf\src\main\java\org\owasp\webgoat\ssrf\SSRFTask2.java:50.

Severity: Medium

CWE:918

Vulnerability details and guidance

Internal Guidance

Checkmarx

Training Recommended Fix

Lines: 51 46


Code (Line #51):

        if (url.matches("http://ifconfig.pro")) {

Code (Line #46):

    public AttackResult completed(@RequestParam String url) {