Testing for Vulnerability

Test Objectives

  • Assess if the Host header is being parsed dynamically in the application.

  • Bypass security controls that rely on the header.

How to Test

  • Supply an arbitrary Host Header

GET / HTTP/1.1
Host: www.attacker.com

  • Check for flawed validation (Bypass)

# Supplying non numeric port number

GET /example HTTP/1.1
Host: vulnerable-website.com:bad-stuff-here
# Registering a domain that matches the same sequence of characters

GET /example HTTP/1.1
Host: notvulnerable-website.com

  • Send ambiguous requests

Other Techniques

This is just a small sample of the many possible ways to issue harmful, ambiguous requests. For example, you can also adapt many HTTP request smuggling techniques to construct Host header attacks.

  • Inject host override headers

In Burp Suite, you can use the Param Miner extension's "Guess headers" function to automatically probe for supported headers using its extensive built-in wordlist.


REFERENCES

Last updated

Was this helpful?