SERVER-SIDE

Server-side attacks target the application or service provided by a web server. the four classes of server-side vulnerabilities are:

  • Server-Side Request Forgery (SSRF)

  • Server-Side Template Injection (SSTI)

  • Server-Side Includes (SSI) Injection

  • eXtensible Stylesheet Language Transformations (XSLT) Server-Side Injection

SERVER-SIDE TEMPLATE INJECTION (SSTI)

occurs when web applications utilizes templating engines and server-side templates to generate responses such as HTML content dynamically. This generation is often based on user input, enabling the web application to respond to user input dynamically. When an attacker can inject template code, a Server-Side Template Injection vulnerability can occur. SSTI can lead to various security risks, including data leakage and even full server compromise via remote code execution.

SERVER-SIDE INCLUDES (SSI) INJECTION

Similar to server-side templates, server-side includes (SSI) can be used to generate HTML responses dynamically. SSI directives instruct the webserver to include additional content dynamically. These directives are embedded into HTML files. For instance, SSI can be used to include content that is present in all HTML pages, such as headers or footers. When an attacker can inject commands into the SSI directives, Server-Side Includes (SSI) Injection can occur. SSI injection can lead to data leakage or even remote code execution.

XSLT SERVER-SIDE INJECTION

XSLT (Extensible Stylesheet Language Transformations) server-side injection is a vulnerability that arises when an attacker can manipulate XSLT transformations performed on the server. XSLT is a language used to transform XML documents into other formats, such as HTML, and is commonly employed in web applications to generate content dynamically. In the context of XSLT server-side injection, attackers exploit weaknesses in how XSLT transformations are handled, allowing them to inject and execute arbitrary code on the server.

Last updated