CodeAnt AI detects Server-Side Request Forgery (SSRF) vulnerabilities across 12 languages: Python, Java, JavaScript, Go, C#, Ruby, PHP, Kotlin, Rust, Scala, C++, Terraform.
Detected Vulnerabilities
CWE-918: Server-Side Request Forgery (SSRF)
CWE-918: Server-Side Request Forgery (SSRF)
Severity: Critical
Description
The application accepts user-supplied URLs and makes server-side HTTP requests to those URLs without sufficient validation, allowing attackers to target internal services.Impact
Access to internal services, cloud metadata endpoints (169.254.169.254), internal APIs, and other network resources not intended to be publicly accessible. Can lead to credential theft, data exfiltration, and remote code execution.Remediation
Validate and sanitize all user-supplied URLs. Use allowlists for permitted domains and IP ranges. Block requests to private IP ranges and metadata endpoints. Use network segmentation to limit server-side request capabilities.CWE-441: Unintended Proxy or Intermediary (Confused Deputy)
CWE-441: Unintended Proxy or Intermediary (Confused Deputy)
Severity: High