Skip to content

Request Forgery

Info

ID: AT-PE003
Tactic: Payload Execution
Sub-techniques: CSRF, JNDI Injection, SSRF, Serialized Data External Linking

Request Forgery

Adversaries may craft requests that cause the application or an associated service to perform actions on their behalf. Techniques like Server-Side Request Forgery (SSRF) can trick the system into calling internal endpoints, while Cross-Site Request Forgery (CSRF) exploits a user’s active session to execute unintended commands. Additionally, forging requests to external services - like JNDI injection - can load remote classes or direct the victim environment to retrieve malicious code.

Because many cloud workloads rely on ephemeral service tokens and assume trust in certain internal routes, request forgery can pivot an attacker from a superficial vantage to more privileged positions. This technique often pairs with insecure access controls or incomplete input validation, letting attackers bypass segmentation or access data typically restricted to internal processes. Request forgery is particularly damaging when combined with application features that automatically process or store fetched data.