NgixProxy_Pathfinder/nginx/modsec/owasp-crs/rules/ssrf-no-scheme.data

36 lines
1.1 KiB
Plaintext

# SSRF patterns without schemes
#
# This file contains localhost and internal DNS names that are commonly used
# in SSRF attacks. These patterns are checked without URI schemes to catch
# cases where frameworks automatically prepend 'http://' or 'https://'.
#
# Sources:
# - https://gist.githubusercontent.com/jhaddix/78cece26c91c6263653f31ba453e273b/raw/a4869d58a5ce337d1465c2d1b29777b9eecd371f/cloud_metadata.txt
# - https://book.hacktricks.xyz/pentesting-web/ssrf-server-side-request-forgery/cloud-ssrf
# - https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Server%20Side%20Request%20Forgery
# - https://github.com/assetnote/blind-ssrf-chains
# - https://github.com/coreruleset/coreruleset/issues/4427
# Standard hosts aliases
localhost/
localhost.localdomain/
localhost4/
localhost4.localdomain4/
ipv6-localhost/
ip6-loopback/
# Docker based aliases
host.docker.internal/
gateway.docker.internal/
kubernetes.docker.internal/
# Podman
host.containers.internal/
# K8s API local service
kubernetes.default.svc.cluster.local/
# Testing services
localtest.me/
lvh.me/