Loading HuntDB...

Host Header Injection/Redirection in: https://www.instacart.com/

I
Instacart
Submitted None

Team Summary

Official summary from Instacart

We NO LONGER accept similar reports about Host header Injections (including `X-Forwarded-Host`, etc)

Reported by 0xm1racle

Vulnerability Details

Technical details and impact analysis

Open Redirect
Hi, Your website is vulnerable to Host Header Injection because the host header can be changed to something outside the target domain In many cases, developers are trusting the HTTP Host header value and using it to generate links, import scripts and even generate password resets links with its value. This is a very bad idea, because the HTTP Host header can be controlled by an attacker. This can be exploited using web-cache poisoning and by abusing alternative channels like password reset emails. GET / HTTP/1.1 Host: google.com User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:47.0) Gecko/20100101 Firefox/47.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: close HTTP/1.1 301 Moved Permanently Date: Tue, 09 Aug 2016 23:55:09 GMT Location: https://google.com/ Server: nginx Strict-Transport-Security: max-age=31536000; includeSubDomains; preload Connection: Close Content-Type: text/html Content-Length: 178 Reference: https://www.acunetix.com/vulnerabilities/web/host-header-attack Regards, Clarck

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Open Redirect