SLIDE 25 September 21, 2016
- G. Pellegrino - Uses and Abuses of Server-Side Requests
25
Classification
Behavior Target
Proxy Open Origin Policy Storage Amplifier Bridge Client SSR Service External Service Interpreter Probe
Flaw
Forgery Information Gathering Insufficient Enforcement of Security Policies Client Side Policies Server Side Policies
Control
Request Response Destination Content Content
- Supersedes and includes pre-existing classifications (Polyakov’s, CWE, and SSRF bible)
- Four different dimensions:
– Flaws: includes known classes plus a new one, i.e., insufficient enforcement of security policies – Behavior (new): identified seven distinct behaviors. Most are legitimate, but the combination can lead to
attacks
– Control: the control the attacker has on the content of SSRs and responses (new) – Target: the possible target of an attack
Elements not considered by previous works