2016
DOI: 10.1007/978-3-319-45719-2_18
|View full text |Cite
|
Sign up to set email alerts
|

Uses and Abuses of Server-Side Requests

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 6 publications
0
7
0
Order By: Relevance
“…For many years, a large body of studies has delved into discovering vulnerabilities of different network-level entities namely websites(e.g., [12]), web applications such as CM-Ses [13], and web infrastructure such as servers [14]. Only in the past ten years have the security research community also put focus on studying the efficacy of notifying affected parties on remediation.…”
Section: Related Workmentioning
confidence: 99%
“…For many years, a large body of studies has delved into discovering vulnerabilities of different network-level entities namely websites(e.g., [12]), web applications such as CM-Ses [13], and web infrastructure such as servers [14]. Only in the past ten years have the security research community also put focus on studying the efficacy of notifying affected parties on remediation.…”
Section: Related Workmentioning
confidence: 99%
“…Since the uploaded script can be invoked via a URL with any crafted parameters, an adversary is capable of executing any system commands. This poses a critical threat such that the adversary is able to access local file resources and databases [4], inject shell commands and scripts [37], and conduct Server-Side Request Forgery (SSRF) attacks [56].…”
Section: B Ufu and Uefu Vulnerabilitiesmentioning
confidence: 99%
“…However, as URLs often originate from third-party domains, most platforms cannot rely on the client-side programs because the same-origin policy for cross-origin requests (SOP for CORs) prevents the client-side programs from fetching resources from other origins by default. Accordingly, platforms tend to use server-side requests [25] (SSRs). Figure 1 shows the sequence of steps when sharing URLs on social platforms.…”
Section: A Sharing External Content On Social Media Platformsmentioning
confidence: 99%