You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Aikido firewall for Node.js 16+ secures your app against server-side request forgery (SSRF) attacks. SSRF vulnerabilities allow attackers to send crafted requests to internal services, bypassing firewalls and security controls. Runtime blocks SSRF attacks by intercepting and validating requests to internal services.
4
+
5
+
## Example
6
+
7
+
```
8
+
GET https://your-app.com/files?url=http://localhost:3000/private
9
+
```
10
+
11
+
```js
12
+
constresponse=http.request(req.query.url);
13
+
```
14
+
15
+
In this example, an attacker sends a request to `localhost:3000/private` from your server. Firewall can intercept the request and block it, preventing the attacker from accessing internal services.
16
+
17
+
```
18
+
GET https://your-app.com/files?url=http://localtest.me:3000/private
19
+
```
20
+
21
+
In this example, the attacker sends a request to `localtest.me:3000/private`, which resolves to `127.0.0.1`. Firewall can intercept the request and block it, preventing the attacker from accessing internal services.
22
+
23
+
We don't protect against stored SSRF attacks, where an attacker injects a malicious URL into your app's database. To prevent stored SSRF attacks, validate and sanitize user input before storing it in your database.
24
+
25
+
## Which built-in modules are protected?
26
+
27
+
Firewall protects against SSRF attacks in the following built-in modules:
0 commit comments