What is SSRF
Server-Side Request Forgery forces your server to make HTTP requests to destinations chosen by the attacker. Instead of attacking your internal infrastructure directly, the attacker uses your application as a proxy. This is particularly dangerous in cloud environments where the server has access to internal services not exposed to the internet.
The classic scenario: cloud metadata
All major clouds expose a metadata service accessible only from within instances. On AWS, it's http://169.254.169.254/latest/meta-data/. If your application accepts a user-supplied URL and makes a server-side request (link preview, image import, webhook), the attacker can request this internal address.
Real impact: in 2019, Capital One was breached via an SSRF that allowed retrieval of temporary IAM credentials from the EC2 metadata service. Over 100 million customer records were exposed.
Where SSRFs hide
Bypass techniques
Basic filters are easily circumvented:
169.254.169.254 can be written as 0xa9fea9fe, 2852039166 (decimal), or 0251.0376.0251.0376 (octal)http://evil.com@169.254.169.254 can trick some URL parsersEffective defenses
GCP and Azure too
On GCP, the metadata service is at http://metadata.google.internal/computeMetadata/v1/ and requires the Metadata-Flavor: Google header. On Azure, it's http://169.254.169.254/metadata/instance with the Metadata: true header. Header-based protection makes exploitation harder but not impossible if the application allows controlling the outgoing request's headers.
In our audits
At CleanIssue, we systematically test external fetch features against cloud metadata addresses. SSRF is often combined with other flaws to achieve critical impact. Request your audit call to evaluate your exposure.
Related articles
Three adjacent analyses to keep exploring the same attack surface.
AWS, GCP, Azure cloud security: the 10 most common IAM mistakes
The IAM configuration mistakes that expose your cloud infrastructure: excessive permissions, static credentials, missing MFA, and more.
SQL injection: concrete examples and modern defenses
How SQL injection works in 2026, the variants (union, blind, time-based), and real protections beyond prepared statements.
Kubernetes: 7 critical vulnerabilities we find in audits
The seven most frequent Kubernetes configuration flaws in our audits: RBAC, secrets, network policies, privileged pods, and more.
Sources
Editorial analysis based on official vendor, project, and regulator documentation.
Related services
If this topic maps to a real risk in your stack, these are the most relevant CleanIssue audits.