Runbook

Apache HTTP Server - SSRF Attempts

Back to Runbooks

Overview

A server-side request forgery (SSRF) is a type of attack that exploits vulnerabilities in web applications to gain unauthorized access to resources on the server. In the context of Apache HTTP Server, this incident type refers to attempts to exploit SSRF vulnerabilities in the server. Attackers can use SSRF to bypass security controls, access sensitive information, and launch further attacks on the system. This incident type requires immediate attention and remediation to prevent further unauthorized access and data breaches.

Parameters

Debug

Check the list of enabled Apache HTTP Server modules

Check if mod_proxy is enabled

Check Apache HTTP Server version

Check Apache HTTP Server configuration file syntax

Check Apache HTTP Server access logs for suspicious requests

Check the network connections on the server

Repair

Restrict access to the vulnerable Apache HTTP server by adding a firewall that filters incoming and outgoing traffic to only allow necessary traffic.

Configure the Apache HTTP server to run as a non-privileged user with restricted access to system resources to limit the impact of any successful SSRF attacks.

Learn more

Related Runbooks

Check out these related runbooks to help you debug and resolve similar issues.