Host Header Injection/Redirection in: https://www.instacart.com/
I
Instacart
Submitted None
Team Summary
Official summary from Instacart
We NO LONGER accept similar reports about Host header Injections (including `X-Forwarded-Host`, etc)
Actions:
Reported by
0xm1racle
Vulnerability Details
Technical details and impact analysis
Hi,
Your website is vulnerable to Host Header Injection because the host header can be changed to something outside the target domain
In many cases, developers are trusting the HTTP Host header value and using it to generate links, import scripts and even generate password resets links with its value. This is a very bad idea, because the HTTP Host header can be controlled by an attacker. This can be exploited using web-cache poisoning and by abusing alternative channels like password reset emails.
GET / HTTP/1.1
Host: google.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:47.0) Gecko/20100101 Firefox/47.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: close
HTTP/1.1 301 Moved Permanently
Date: Tue, 09 Aug 2016 23:55:09 GMT
Location: https://google.com/
Server: nginx
Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
Connection: Close
Content-Type: text/html
Content-Length: 178
Reference: https://www.acunetix.com/vulnerabilities/web/host-header-attack
Regards,
Clarck
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Open Redirect