From d8038b7714f9d75fed30f7af0f06941df5c13899 Mon Sep 17 00:00:00 2001 From: AmirHossein Raeisi <96957814+Ahsraeisi@users.noreply.github.com> Date: Sun, 1 Sep 2024 12:19:18 +0330 Subject: [PATCH] Update 12.6.1.yaml Signed-off-by: AmirHossein Raeisi <96957814+Ahsraeisi@users.noreply.github.com> --- templates/12.6.1.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/templates/12.6.1.yaml b/templates/12.6.1.yaml index 13d6802..df170e0 100644 --- a/templates/12.6.1.yaml +++ b/templates/12.6.1.yaml @@ -11,6 +11,7 @@ info: - https://owasp.org/Top10/A10_2021-Server-Side_Request_Forgery_%28SSRF%29/ - https://github.com/projectdiscovery/nuclei-templates/blob/main/dast/vulnerabilities/ssrf/blind-ssrf.yaml - https://cheatsheetseries.owasp.org/cheatsheets/Server_Side_Request_Forgery_Prevention_Cheat_Sheet.html + - https://snbig.github.io/Vulnerable-Pages/ASVS_12_6_1/ tags: asvs,12.6.1 description: | Verify that the web or application server is configured with an allow list of resources or systems to which the server can send requests or load data/files from. @@ -54,4 +55,4 @@ http: part: interactsh_protocol # Confirms the HTTP Interaction words: - "http" - - "dns" \ No newline at end of file + - "dns"