🔎 Cybersecurity Challenge #6 – Spot the Vulnerability
This application fetches an image from a URL provided by the user. Sounds harmless, right? 👨💻
But allowing servers to request external resources based on user input can sometimes open the door to dangerous attacks.
Take a closer look at how the URL is validated and how the request is made.
⚠️ Is the validation strong enough?
Question: What security vulnerability exists in this code?
A) SQL Injection
B) Server-Side Request Forgery (SSRF)
C) External XML Entity (XXE)
D) URL Redirection
💬 Comment your answer and tell us which line reveals the vulnerability!
In the next post, I’ll reveal the correct answer and explain how attackers could exploit it in real-world environments.
#cybersecurity #infosec #ethicalhacking #websecurity #bugbounty #securecoding #CyberKid #securitychallenge #SSRF








