Host header injection/redirection | signup and login page

Disclosed: 2020-02-21 11:27:12 By hassancypher To nordsecurity
Low
Vulnerability Details
Hey Team. There's a host header injection vulnerability in signup and login page. If possible, the application should avoid incorporating user-controllable data into redirection targets. In many cases, this behavior can be avoided in two ways: Remove the redirection function from the application, and replace links to it with direct links to the relevant target URLs. Maintain a server-side list of all URLs that are permitted for redirection. Instead of passing the target URL as a parameter to the redirector, pass an index into this list. Vulnerable URL: https://affiliates.nordvpn.com/signup Payload: " Host: constitutionclub.in" How to reproduce this vulnerability: 1.Open this URL "https://affiliates.nordvpn.com/signup" 2.Send it to the repeater in burp suite add the payload to the header request and forward the request. 3.It will directly redirect to constitutionclub.in ## Impact Whenever a user visits this URL, it will redirect them to site.com. It is used in phishing attacks.
Actions
View on HackerOne
Report Stats
  • Report ID: 758380
  • State: Closed
  • Substate: duplicate
  • Upvotes: 8
Share this report