Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Interesting, it's worth noting that the scheme can sometimes also be used to cause SSRF to a different protocol which might not use http, like ftp or gopher, s3,...

SSRF are fun, sometimes the leak credentials directly also - when server is based on a trusted subsystem the auth headers might leak outside.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: