Host Header Injection - internal.qa.delivery.indrive.com
Low
I
inDrive
Submitted None
Team Summary
Official summary from inDrive
Subscribe to our telegram channel with updates https://t.me/indrive_bbp
Actions:
Reported by
sid_x95
Vulnerability Details
Technical details and impact analysis
HTTP Host header attacks exploit vulnerable websites that handle the value of the Host header in an unsafe way. If the server implicitly trusts the Host header, and fails to validate or escape it properly, an attacker may be able to use this input to inject harmful payloads that manipulate server-side behavior.
Found the host header injection of given URLs:
https://internal.qa.delivery.indrive.com/
https://internal.sandbox.delivery.indrive.com/
## Steps To Reproduce:
1. Intercept the request in burp
3. Change the host name to bing.com
Request:
GET / HTTP/1.1
Host: bing.com
Upgrade-Insecure-Requests: 1
Accept-Encoding: gzip, deflate
Accept: */*
Accept-Language: en-US,en-GB;q=0.9,en;q=0.8
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36
Connection: close
Cache-Control: max-age=0
Response:
HTTP/1.1 301 Moved Permanently
location: https://bing.com/
date: Thu, 20 Jul 2023 06:24:26 GMT
server: istio-envoy
connection: close
content-length: 0
## Impact
An attacker can redirect users to malicious websites, which can lead to phishing attacks.
An attacker can create a valid webpage with malicious recommendations and the user believes the recommendation as it was from the valid website.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved