Host Header Injection/Redirection Attack

Disclosed: 2016-08-07 23:06:12 By footstep To gratipay
None
Vulnerability Details
Hello, __I'm sorry for adding this, please allow me to close if you do not accept the risk involved.__ Gratipay is vulnerable to host header injection because the host header can be changed to something outside the target domain (ie. gratipay.com and grtp.co) and cause it to redirect to to that domain instead. Attack vectors are somewhat limited but depends on how the host header is used by the back-end application code. If code references the hostname used in the URL such as password reset pages, an attacker could spoof the host header of the request in order to trick the application to forwarding the password reset email to the attackers domain instead, etc. Other attack vectors may also be possible through manipulation of hyperlinks or other misc. code that relies on the host/domain of the request. __PoC:__ {F110430} Regards, Shuaib Oladigbolu
Actions
View on HackerOne
Report Stats
  • Report ID: 157465
  • State: Closed
  • Substate: not-applicable
  • Upvotes: 7
Share this report