ExamGecko
Question list
Search
Search

Related questions











Question 271 - 312-50v12 discussion

Report
Export

Jason, an attacker, targeted an organization to perform an attack on its Internet-facing web server with the intention of gaining access to backend servers, which are protected by a firewall. In this process, he used a URL https://xyz.com/ feed.php?url:externaIsile.com/feed/to to obtain a remote feed and altered the URL input to the local host to view all the local resources on the target server.

What is the type of attack Jason performed In the above scenario?

A.
website defacement
Answers
A.
website defacement
B.
Server-side request forgery (SSRF) attack
Answers
B.
Server-side request forgery (SSRF) attack
C.
Web server misconfiguration
Answers
C.
Web server misconfiguration
D.
web cache poisoning attack
Answers
D.
web cache poisoning attack
Suggested answer: B

Explanation:

Server-side request forgery (also called SSRF) is a net security vulnerability that allows an assaulter to induce the server-side application to make http requests to associate arbitrary domain of the attacker's choosing.

In typical SSRF examples, the attacker might cause the server to make a connection back to itself, or to other web-based services among the organization's infrastructure, or to external third-party systems.

Another type of trust relationship that often arises with server-side request forgery is where the application server is able to interact with different back-end systems that aren't directly reachable by users. These systems typically have non- routable private informatics addresses. Since the back-end systems normally ordinarily protected by the topology, they typically have a weaker security posture.

In several cases, internal back-end systems contain sensitive functionality that may be accessed while not authentication by anyone who is able to act with the systems.

In the preceding example, suppose there's an body interface at the back-end url https://192.168.0.68/admin. Here, an attacker will exploit the SSRF vulnerability to access the executive interface by submitting the following request:

POST /product/stock HTTP/1.0

Content-Type: application/x-www-form-urlencoded

Content-Length: 118 stockApi=http://192.168.0.68/admin

asked 18/09/2024
Eric Jones
43 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first