<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>chs.us — Carl Sampson</title><link>https://chs.us/</link><description/><language>en-us</language><managingEditor>carl.sampson@gmail.com (Carl Sampson)</managingEditor><webMaster>carl.sampson@gmail.com (Carl Sampson)</webMaster><lastBuildDate>Thu, 02 Apr 2026 22:40:44 -0400</lastBuildDate><atom:link href="https://chs.us/series/ssrf-deep-dive/index.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-27696: SSRF in changedetection.io via URL Validation Bypass</title><link>https://chs.us/2026/02/ssrf-changedetection-cve-2026-27696/</link><pubDate>Fri, 27 Feb 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/2026/02/ssrf-changedetection-cve-2026-27696/</guid><description>CVE-2026-27696: A high-severity SSRF in changedetection.io that bypasses URL allowlist validation to access cloud metadata services. CVSS 8.6.</description><category>Security</category><category>Ssrf</category><category>Cve</category><category>Application-Security</category></item><item><title>Exploring SSRF Attack Vectors: Understanding the Threat</title><link>https://chs.us/2025/05/ssrf-attack-vectors/</link><pubDate>Mon, 12 May 2025 22:28:45 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/2025/05/ssrf-attack-vectors/</guid><description>A comprehensive look at SSRF attack vectors — how attackers exploit server-side request forgery to access internal resources, cloud metadata, and more.</description><category>Security</category><category>Ssrf</category><category>Application-Security</category></item><item><title>SSRF Defense</title><link>https://chs.us/2025/04/ssrf-defense/</link><pubDate>Mon, 28 Apr 2025 20:21:08 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/2025/04/ssrf-defense/</guid><description>Practical SSRF defense strategies: input validation, URL allowlisting, network segmentation, and tools for preventing server-side request forgery.</description><category>Security</category><category>Ssrf</category><category>Application-Security</category></item></channel></rss>