SSRF
Last updated
Was this helpful?
Last updated
Was this helpful?
In a SSRF attack an attacker tricks the compromised server into issuing requests. Since these requests will be issued from the server, the attacker may gain access to resources that are accessible by this server only (such as internal resources or source IP restricted resources).
Some parts of this page are based on by OWASP, which is licensed under .