Host Header Attac

Disclosed: 2025-02-08 19:47:29 By n_ob_o_dy To rubygems
Medium
Vulnerability Details
The application is vulnerable to Host Header Injection. An attacker can manipulate the Host header to redirect users to arbitrary domains or potentially poison web caches. Steps to reproduce: ------------------- 1. Navigate to https://rubygems.org/ and intercept the request. 1. Add header ==Forwarded: host=evil.com== and forward the request. 1. Notice you will be redirect to attacker's malicious website. ## Impact Successful exploitation can lead to user redirection to malicious sites, phishing attacks, and potential data loss. The overall impact of a Host Header attack can be significant, leading to financial loss, reputational damage, and legal consequences. It's crucial to address this vulnerability promptly to protect users and systems.
Actions
View on HackerOne
Report Stats
  • Report ID: 2627221
  • State: Closed
  • Substate: resolved
Share this report