What is SSRF (Server-Side Request Forgery)?
An attack where an attacker causes a server to make HTTP requests to destinations chosen by the attacker — often internal networks or cloud metadata endpoints.
Full explanation
SSRF occurs when an application accepts a URL from user input and makes a server-side request to it. If the attacker can specify internal IPs (127.0.0.1, 169.254.169.254, or private network ranges), the server can be tricked into fetching cloud metadata (AWS IMDS, GCP metadata) or internal admin interfaces. SSRF is how attackers break out of an isolated app and into the infrastructure around it.
Example
An image-proxy endpoint `/proxy?url=...` that fetches the URL and returns it. The attacker passes `http://169.254.169.254/latest/meta-data/iam/` to exfiltrate AWS instance credentials.
Related
FAQ
Does IMDSv2 fix SSRF?
It fixes the AWS metadata path. It does not protect your internal services from SSRF.