Host Header Injection/Redirection
None
R
RubyGems
Submitted None
Actions:
Reported by
rootnp
Vulnerability Details
Technical details and impact analysis
rubygems.org is vulnerable to host header injection because the host header can be changed to something outside the target domain.
Attack vectors are somewhat limited but depends on how the host header is used by the back-end application code. If code references the hostname used in the URL such as password reset pages, an attacker could spoof the host header of the request in order to trick the application to forwarding the password reset email to the attackers domain instead, etc. Other attack vectors may also be possible through manipulation of hyperlinks or other misc. code that relies on the host/domain of the request.
nc rubygems.org 80
GET / HTTP/1.1
Host: google.com
HTTP/1.1 301 Moved Permanently
Server: nginx
Date: Mon, 19 Sep 2016 06:44:25 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: keep-alive
Location: https://google.com/
X-UA-Compatible: IE=Edge,chrome=1
Report Details
Additional information and metadata
State
Closed
Substate
Duplicate
Submitted
Weakness
Violation of Secure Design Principles