Server-Side & Network
Server-Side & Network vulnerabilities at a glance
Overview
Server-side and network vulnerabilities exploit how applications process requests, interact with external systems, and handle file operations. These attacks target the server infrastructure and network communications rather than the application logic itself.
Server-Side Request Forgery (SSRF) tricks servers into making requests to internal systems. HTTP Request Smuggling exploits inconsistencies in how proxies and servers parse requests. Response Splitting injects headers to manipulate caching and routing. File Upload vulnerabilities allow attackers to upload malicious files that execute on the server. Directory Traversal attacks manipulate file paths to access files outside intended directories. These vulnerabilities are particularly dangerous because they can bypass network security controls and access systems that should be isolated.
Where it occurs
These vulnerabilities typically appear in components that handle external input, manage network communications, or bridge internal and external systems, where improper validation or configuration can expose sensitive resources or functionality.
Impact
Server-side and network vulnerabilities can lead to data exfiltration, internal access, remote code execution, service disruption, and security control bypass.
Prevention
Prevent issues by validating URLs against approved domains, blocking access to private networks, and isolating internal services through network segmentation.
Specific Vulnerabilities
Explore specific vulnerability types within this category:
Detect These Vulnerabilities in Your Code
Sourcery automatically identifies server-side & network and related vulnerabilities in your codebase.
Scan Your Code for Free