CWE

Common Weakness Enumeration

A Community-Developed List of Software & Hardware Weakness Types

2021 CWE最重要的硬件弱点
CWE前25个最危险的弱点
>CWEList>CWE- Individual Dictionary Definition (4.9)
ID

CWE-918: Server-Side Request Forgery (SSRF)

弱点ID:918
抽象:根据
结构:简单的
看法customized information:
+Description
Web服务器从上游组件接收一个URL或类似请求,并检索该URL的内容,但不能充分确保将请求发送到预期的目的地。
+Extended Description
By providing URLs to unexpected hosts or ports, attackers can make it appear that the server is sending the request, possibly bypassing access controls such as firewalls that prevent the attackers from accessing the URLs directly. The server can be used as a proxy to conduct port scanning of hosts in internal networks, use other URLs such as that can access documents on the system (using file://), or use other protocols such as gopher:// or tftp://, which may provide greater control over the contents of requests.
+替代条款
XSPA:
Cross Site Port Attack
+关系
部分帮助该表显示了与该弱点相关的弱点和高级类别。这些关系定义为childof,parentof,ementof,并深入了解可能存在于较高和较低抽象水平的类似项目。此外,定义了诸如Peerof和Canalsobe之类的关系,以显示用户可能想要探索的类似弱点。
+Relevant to the view "Research Concepts" (CWE-1000)
自然 Type ID 名称
Childof 班级班级- a weakness that is described in a very abstract fashion, typically independent of any specific language or technology. More specific than a Pillar Weakness, but more general than a Base Weakness. Class level weaknesses typically describe issues in terms of 1 or 2 of the following dimensions: behavior, property, and resource. 441 意外代理或中介(“困惑的副手”)
部分帮助该表显示了与该弱点相关的弱点和高级类别。这些关系定义为childof,parentof,ementof,并深入了解可能存在于较高和较低抽象水平的类似项目。此外,定义了诸如Peerof和Canalsobe之类的关系,以显示用户可能想要探索的类似弱点。
+Relevant to the view "Weaknesses for Simplified Mapping of Published Vulnerabilities" (CWE-1003)
自然 Type ID 名称
Childof 班级班级- a weakness that is described in a very abstract fashion, typically independent of any specific language or technology. More specific than a Pillar Weakness, but more general than a Base Weakness. Class level weaknesses typically describe issues in terms of 1 or 2 of the following dimensions: behavior, property, and resource. 610 Externally Controlled Reference to a Resource in Another Sphere
+介绍模式
部分帮助引言的不同模式提供了有关如何以及何时引入这种弱点的信息。该阶段识别可能发生介绍的生命周期中的一个点,而音符提供了与给定阶段中引言有关的典型情况。
Phase 笔记
Architecture and Design
Implementation
+适用的平台
部分帮助该清单显示了可能出现的弱点的可能区域。这些可能适用于特定的命名语言,操作系统,体系结构,范式,技术或一类此类平台。该平台与给定弱点出现在该实例的频率一起列出。

语言

班级:不是特定语言的(不确定的患病率)

Technologies

Web Server(不确定的患病率)

+常见后果
部分帮助该表指定与弱点相关的不同个人后果。该范围确定了违反的应用程序安全区域,而影响描述了如果对手成功利用这一弱点,就会产生负面的技术影响。其可能性提供了有关预期相对于列表中其他后果的特定后果的可能性的信息。例如,可能会利用弱点来实现一定的影响,但很可能会利用它来实现不同的影响。
范围 Impact 可能性
Confidentiality

技术影响:读取应用程序数据

Integrity

技术影响:Execute Unauthorized Code or Commands

+Observed Examples
Reference Description
邮件服务器中的服务器端请求伪造(SSRF),如野生CISA KEV所利用。
服务器侧请求在云平台中伪造,如野生CISA KEV所利用。
Chain: incorrect validation of intended decimal-based IP address format (CWE-1286) enables parsing of octal or hexadecimal formats (CWE-1389),允许绕过SSRF保护机制(CWE-918).
Web服务器允许攻击者从另一台服务器(包括其他端口)请求URL,该端口允许扫描。
CGI script accepts and retrieves incoming URLs.
Web-based mail program allows internal network scanning using a modified POP3 port number.
URL-downloading library automatically follows redirects to file:// and scp:// URLs
+Memberships
部分帮助此成员关系表显示了其他CWE类别和视图,将此弱点称为成员。该信息通常可用于理解弱点适合外部信息源的何处。
自然 Type ID 名称
MemberOf 看法查看 - CWE条目的子集,提供了一种检查CWE内容的方法。两个主视图结构是切片(平面列表)和图(包含条目之间的关系)。 1337 Weaknesses in the 2021 CWE Top 25 Most Dangerous Software Weaknesses
MemberOf CategoryCategory - a CWE entry that contains a set of other entries that share a common characteristic. 1356 OWASP Top Ten 2021 Category A10:2021 - Server-Side Request Forgery (SSRF)
MemberOf 看法查看 - CWE条目的子集,提供了一种检查CWE内容的方法。两个主视图结构是切片(平面列表)和图(包含条目之间的关系)。 1387 2022 CWE中的弱点前25个最危险的软件弱点
+笔记

关系

CWE-918(SSRF) andCWE-611(XXE)密切相关,因为它们都涉及与Web相关的技术,并且可以向意外的目的地启动出站请求。但是,可以执行XXE的客户端,也可以在软件不直接充当服务器的其他情况下执行,因此SSRF首字母缩写词的“服务器”部分不一定适用。
+References
[REF-913] Alexander Polyakov and Dmitry Chastukhin. "SSRF vs. Business-critical applications: XXE tunneling in SAP". 2012-07-26. <https://media.blackhat.com/bh-us-12/Briefings/Polyakov/BH_US_12_Polyakov_SSRF_Business_Slides.pdf>.
[REF-914] Alexander Polyakov, Dmitry Chastukhin and Alexey Tyurin. "SSRF vs. Business-critical Applications. Part 1: XXE Tunnelling in SAP NetWeaver". <http://erpscan.com/wp-content/uploads/2012/08/SSRF-vs-Businness-critical-applications-whitepaper.pdf>.
[Ref-915] Riyaz吓坏了Walikar。“跨站点端口攻击-XSPA-第1部分”。2012-11-07。<https://ibreak.software/2012/11/cross-site-port-attacks-xspa-part-1/>.
[REF-916] Riyaz Ahemed Walikar. "Cross Site Port Attacks - XSPA - Part 2". 2012-11-13. <https://ibreak.software/2012/11/cross-site-port-attacks-xspa-part-2/>.
[REF-917] Riyaz Ahemed Walikar. "Cross Site Port Attacks - XSPA - Part 3". 2012-11-14. <https://ibreak.software/2012/11/cross-site-port-attacks-xspa-part-3/>.
[REF-918] Vladimir Vorontsov and Alexander Golovko. "SSRF attacks and sockets: smorgasbord of vulnerabilities". <http://www.slideshare.net/d0znpp/ssrf-attacks-and-sockets-smorgasbord-of-vulnerabilities>.
[REF-919] ONsec Lab. "SSRF bible. Cheatsheet". 2013-01-26. <https://docs.google.com/document/d/1v1TkWZtrhzRLy0bYXBcdLUedXGb9njTNIJXa3u9akHM/edit?pli=1#>.
[REF-920] Deral Heiland. "Web Portals: Gateway To Information, Or A Hole In Our Perimeter Defenses". 2008-02. <http://www.shmoocon.org/2008/presentations/web%20portals,%20gateway%20to%20Information.ppt>.
+内容历史记录
+Submissions
Submission Date 提交者 Organization
2013-02-17 CWE内容团队 MITER
+修改
修改日期 Modifier Organization
2015-12-07 CWE内容团队 MITER
updated Relationships
2017-01-19 CWE内容团队 MITER
updated Relationships
2017-11-08 CWE内容团队 MITER
updated Applicable_Platforms, References
2018-03-27 CWE内容团队 MITER
更新的引用
2019-06-20 CWE内容团队 MITER
updated Relationships
2020-02-24 CWE内容团队 MITER
更新了适用的_platforms,关系
2021-07-20 CWE内容团队 MITER
更新的引用,相关_ATTACK_PATTERNS,关系
2021-10-28 CWE内容团队 MITER
updated Relationships
2022-06-28 CWE内容团队 MITER
更新了观察到的examples, Relationships
2022-10-13 CWE内容团队 MITER
更新了观察到的examples
More information is available — Please select a different filter.
页面最后更新:October 13, 2022