Loading HuntDB...

Modify Host Header which is sent to email

High
E
Endless Group
Submitted None
Reported by codermak

Vulnerability Details

Technical details and impact analysis

Code Injection
## Summary: Modify host header and include the fake website in password reset email. Password reset mail is taking source domain from request header host, which can be modified using burp suite and the modified link is sent to the victims email ## Steps To Reproduce: 1. Go to https://da.theendlessweb.com:2222/ 2. Start burp suite 3. Enter username and click on Send me a Link 4. Intercep the request and modify the URL to some other custom url 5. Forward the modified request 6. Password reset email will be sent. 7. Check your email and you will see the new url (which was configured in step 4) in the email. ## Supporting Material/References: * Snapshots in attachment ## Impact With this, attacker can make any victim to visit their custom website and can affect the victim in many ways

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Code Injection