๐ Cybersecurity Challenge #6 โ Spot the Vulnerability
This application fetches an image from a URL provided by the user. Sounds harmless, right? ๐จโ๐ป
But allowing servers to request external resources based on user input can sometimes open the door to dangerous attacks.
Take a closer look at how the URL is validated and how the request is made.
โ ๏ธ Is the validation strong enough?
Question: What security vulnerability exists in this code?
A) SQL Injection
B) Server-Side Request Forgery (SSRF)
C) External XML Entity (XXE)
D) URL Redirection
๐ฌ Comment your answer and tell us which line reveals the vulnerability!
In the next post, Iโll reveal the correct answer and explain how attackers could exploit it in real-world environments.
#cybersecurity #infosec #ethicalhacking #websecurity #bugbounty #securecoding #CyberKid #securitychallenge #SSRF