Join GitHub today
GitHub is home to over 50 million developers working together to host and review code, manage projects, and build software together.
Sign up[Java] CWE-918: Query for server side request forgery (SSRF) detection #80
Comments
|
Your submission is now in status SecLab finalize. For information, the evaluation workflow is the following: |
|
Thanks for the submission! We have reviewed your report and validated your findings. After internally assessing the findings and the query we have determined this query is not eligible for a reward under the Bug Bounty program for the following reason: Duplicate submission, PR rejected, Best regards and happy hacking! |
|
Your submission is now in status Closed. For information, the evaluation workflow is the following: |
CVE ID(s)
None
Report
If network request are made using
java.net.URLconstructed directly from a user-provided value, an attacker might be able to bypass security restrictions such as external firewalls and execute request on internal services by providing URLs likehttp://127.0.0.1:8081/adminRelated pull request:
github/codeql#3452