CodeQL: How to resolve partial Server-Side Request Forgery warning when taking user-based input as a FastAPI endpoint?

I am cross-posting here on Information Security as well to request input on the security of the Python code I’ve written and whether it can be considered a false positive.
I’m writing a function to return a file from an msys2 package repo,… Continue reading CodeQL: How to resolve partial Server-Side Request Forgery warning when taking user-based input as a FastAPI endpoint?

How to resolve server-side request forgery (SSRF) warning for a HTTP request that takes Python package names as input?

I’m working on a function that returns a HTTP response from https://pypi.org/simple/ when Python’s pip installer requests it for a package. When pushing my code onto GitHub, the CodeQL checks warn of the risk of server side request forgery… Continue reading How to resolve server-side request forgery (SSRF) warning for a HTTP request that takes Python package names as input?

We intercept browser in burp and change the referral URL, is it a vulnerability? [closed]

If I put the browser with burp suite and send it to the repeater and there if I change the referral url to any random url is it a vulnerability?
If it is vulnerable, what is the name of the vulnerability?
If it is not vulnerable please jus… Continue reading We intercept browser in burp and change the referral URL, is it a vulnerability? [closed]

postgres database information passing in request can we exploit further? [closed]

Application login request is shown below.
The postgres information is passed via the cabinetName parameter. Is it a vulnerability? is it useful? can we exploit it?
or any other ways to exploit below request?
POST /<REDACTED>/LoginSer… Continue reading postgres database information passing in request can we exploit further? [closed]