Host Header Injection leads to Open Redirect and Content Spoofing or Text Injection.
Medium
O
Omise
Submitted None
Actions:
Reported by
oblivionlight
Vulnerability Details
Technical details and impact analysis
## Summary:
1.) Open Redirection
The https://dashboard.omise.co/test/dashboard website is vulnerable to an Open Redirection flaw if the server receives a crafted X-Forwarded-Host header.
Description:
Open Redirect is a vulnerability in which the attacker manipulates a web page to redirect the users to unknown destinations (malicious/phishing destinations in most cases).
Steps To Reproduce:
1. Visit https://dashboard.omise.co/signin and sign in with your credentials and make sure you have not verified your email.
2. Once you log in, you will be on this page -- https://dashboard.omise.co/test/dashboard , send the request to Repeater and add X-Forwarded-Host: bing.com below Host: dashboard.omise.co
3. Open the request in the browser and click on "here" inside --> Please check your mailbox (***********@gmail.com) to confirm your email address.
If you did not get an email from us, please click here to request another email.
4. It will redirect to a malicious page.
POC:
Attached Video.
2.) Content Spoofing or Text Injection.
The https://dashboard.omise.co/test/settings website is vulnerable to a Content Spoofing or Text Injection flaw if the server receives a crafted X-Forwarded-Host header.
Description:
Content spoofing, also referred to as content injection, "arbitrary text injection" or virtual defacement, is an attack targeting a user made possible by an injection vulnerability in a web application. When an application does not properly handle user-supplied data, an attacker can supply content to a web application, typically via a parameter value, that is reflected back to the user. This presents the user with a modified page under the context of the trusted domain.
Steps To Reproduce:
1. Visit https://dashboard.omise.co/signin and sign in with your credentials and make sure you have not verified your email.
2. Once you log in, go to Settings https://dashboard.omise.co/test/settings , send the request to Repeater and add X-Forwarded-Host: bing.com below Host: dashboard.omise.co
3. Open the request in the browser and in the Settings option under Chains mark Enable account chaining CheckBox.
4. Once you mark the check box it will show the URL, copy that URL and paste it in the browser.
5. It will redirect.
POC:
Attached Video.
## Impact
Open Redirection Impact -
An attacker can redirect users to malicious websites, which can lead to phishing attacks.
Content Spoofing or Text Injection Impact -
An attacker can create a valid webpage with malicious recommendations and the user believes the recommendation as it was from the stock website.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Bounty
$300.00