Server-side requests (SSR) are a potent and important tool for modern web applications, as they enable features such as link preview and web hooks. Unfortunately, naive usage of SSR opens the underlying application up to Server-Side Request Forgery – an underappreciated vulnerability risk. To shed light on this vulnerability class, we conduct an in-depth analysis of known exploitation methods as well as defenses and mitigations across PHP. We then proceed to study the prevalence of the vulnerability and defenses across 27,078 open-source PHP applications. For this we perform an initial data flow analysis, identifying attacker-controlled inputs into known SSR functions, followed up by a manual analysis of our results to gain a detailed understanding of the involved vulnerabilities and present defenses. Our results show that defenses are sparse. The hypermajority of our 237 detected data flows are vulnerable. Only two analyzed applications implement safe SSR features.
Since known defenses are not used and detected attacker-controlled flows are almost always vulnerable, we can only conclude that developers are still unaware of SSR abuses and the need to defend against them. Consequently, SSRF is a present and underappreciated danger in modern web applications.
@conference{Wessels:Koch:Pellegrino:Johns:2024,
title = "SSRF vs. Developers: A Study of SSRF-Defenses in PHP Applications",
author = "Wessels, Malte" AND "Koch, Simon" AND "Pellegrino, Giancarlo" AND "Johns, Martin",
year = 2024,
month = 8,
journal = "33rd USENIX Security Symposium (USENIX Security 24)",
pages = "6777--6794",
publisher = "USENIX Association"
}