'; } else{ echo ''; } echo '
|
|
|||
| Rule General Information |
|---|
| Release Date: | 2026-01-20 | |
| Rule Name: | Server Side Request Forgery Detection | |
| Severity: | ||
| CVE ID: | ||
| Rule Protection Details |
|---|
| Description: | Server-Side Request Forgery (SSRF) vulnerability is a security flaw where an attacker induces the server to initiate malicious requests, thereby accessing internal resources that are otherwise inaccessible, cloud metadata services, or performing port scanning, leading to information leakage or further attacks. This rule is used to detect suspicious behavior involving access to resources via the gopher protocol. | |
| Impact: | SSRF is a security vulnerability constructed by an attacker to form a request initiated by a server. By exploiting this vulnerability, an attacker can bypass access restrictions such as firewalls, thereby using an infected or vulnerable server as a proxy for port scanning and even accessing internal system data. | |
| Affected OS: | Windows, Linux, Others | |
| Reference: | ||
| Solutions |
|---|
| Please contact the software vendor to update the software patch. |