Unsanitized user input in HTTP request (SSRF)
Overview
Rule ID:
javascript_lang_http_url_using_user_input
Applicable Languages: Javascript
Weakness ID: CWE-918
Description
Building URLs from user input exposes your application to Server-Side Request Forgery (SSRF) attacks. This vulnerability enables attackers to trick the application into making unauthorized HTTP requests.
Remediation Guidelines
Avoid directly including user input in URLs for HTTP requests. This practice can expose your application to Server-Side Request Forgery (SSRF) vulnerabilities.
Validate or map user input against a predefined set of allowed values before incorporating it into URLs. This method helps reduce the risk of SSRF attacks.
References
Configuration
To omit this rule during a scan, and to provide you with continuous 24/7 code-level scanning, you can employ our SAST TOOL
Last updated