Modify Host Header which is sent to email

Disclosed: 2020-02-12 12:24:39 By codermak To endless_group
High
Vulnerability Details
## Summary: Modify host header and include the fake website in password reset email. Password reset mail is taking source domain from request header host, which can be modified using burp suite and the modified link is sent to the victims email ## Steps To Reproduce: 1. Go to https://da.theendlessweb.com:2222/ 2. Start burp suite 3. Enter username and click on Send me a Link 4. Intercep the request and modify the URL to some other custom url 5. Forward the modified request 6. Password reset email will be sent. 7. Check your email and you will see the new url (which was configured in step 4) in the email. ## Supporting Material/References: * Snapshots in attachment ## Impact With this, attacker can make any victim to visit their custom website and can affect the victim in many ways
Actions
View on HackerOne
Report Stats
  • Report ID: 791293
  • State: Closed
  • Substate: resolved
  • Upvotes: 30
Share this report