-
Notifications
You must be signed in to change notification settings - Fork 0
Host header poisoning #9
Comments
threatLevel="Low" type="Host-Header-Poisoning" The application appears to trust the user-supplied host header which allows the attacker to load a PNG-file from another server because the HTTP Host header value is used to generate an image link. This is a very bad idea, because the HTTP Host header can be controlled by an attacker. ROS also verified that the links in the password reset e-mail are not using the Host Header. This prevents an attacker from stealing password reset tokens. Original request:
Example request (changed host to radicallyopensecurity.com):
Note that in the response the image address is changed to: radicallyopensecurity.com
In the Burp proxy a request is send to the PNG file on the radicallyopensecurity.com server.:
Impact: Recommendation: |
The application appears to trust the user-supplied host header.
The text was updated successfully, but these errors were encountered: