Loading HuntDB...

Host Header Injection/Redirection

None
R
RubyGems
Submitted None
Reported by rootnp

Vulnerability Details

Technical details and impact analysis

Violation of Secure Design Principles
rubygems.org is vulnerable to host header injection because the host header can be changed to something outside the target domain. Attack vectors are somewhat limited but depends on how the host header is used by the back-end application code. If code references the hostname used in the URL such as password reset pages, an attacker could spoof the host header of the request in order to trick the application to forwarding the password reset email to the attackers domain instead, etc. Other attack vectors may also be possible through manipulation of hyperlinks or other misc. code that relies on the host/domain of the request. nc rubygems.org 80 GET / HTTP/1.1 Host: google.com HTTP/1.1 301 Moved Permanently Server: nginx Date: Mon, 19 Sep 2016 06:44:25 GMT Content-Type: text/html Transfer-Encoding: chunked Connection: keep-alive Location: https://google.com/ X-UA-Compatible: IE=Edge,chrome=1

Report Details

Additional information and metadata

State

Closed

Substate

Duplicate

Submitted

Weakness

Violation of Secure Design Principles