Skip to content

Commit 244d498

Browse files
committed
Tweaks
1 parent 42b699f commit 244d498

File tree

1 file changed

+11
-2
lines changed

1 file changed

+11
-2
lines changed

http_client.rst

Lines changed: 11 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -787,9 +787,17 @@ recommended in production.
787787
SSRF (Server-side request forgery) Handling
788788
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
789789

790-
[SSRF](https://portswigger.net/web-security/ssrf) allows an attacker to induce the backend application to make HTTP requests to an arbitrary domain. These attacks can also target the internal hosts and IPs of the attacked server.
790+
.. versionadded:: 5.1
791+
792+
The SSRF protection was introduced in Symfony 5.1.
793+
794+
`SSRF`_ allows an attacker to induce the backend application to make HTTP
795+
requests to an arbitrary domain. These attacks can also target the internal
796+
hosts and IPs of the attacked server.
791797

792-
If you use an ``HttpClient`` together with user-provided URIs, it is probably a good idea to decorate it with a ``NoPrivateNetworkHttpClient``. This will ensure local networks are made inaccessible to the HTTP client::
798+
If you use an ``HttpClient`` together with user-provided URIs, it is probably a
799+
good idea to decorate it with a ``NoPrivateNetworkHttpClient``. This will
800+
ensure local networks are made inaccessible to the HTTP client::
793801

794802
use Symfony\Component\HttpClient\HttpClient;
795803
use Symfony\Component\HttpClient\NoPrivateNetworkHttpClient;
@@ -1932,3 +1940,4 @@ test it in a real application::
19321940
.. _`Server-sent events`: https://html.spec.whatwg.org/multipage/server-sent-events.html
19331941
.. _`EventSource`: https://www.w3.org/TR/eventsource/#eventsource
19341942
.. _`idempotent method`: https://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol#Idempotent_methods_and_web_applications
1943+
.. _`SSRF`: https://portswigger.net/web-security/ssrf

0 commit comments

Comments
 (0)