In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Server-side Request Forgery (SSRF) vulnerabilities in an interactive lesson.
Start learningUpgrade github.com/imgproxy/imgproxy/v3/security
to version 3.27.2 or higher.
Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) due to improper blocking of the 0.0.0.0
address, even when IMGPROXY_ALLOW_LOOPBACK_SOURCE_ADDRESSES
is set to false. An attacker can access services on the local host by sending requests to 0.0.0.0
.