Task #12593

Task #12556: Pentest - 2nd Assessment [2021]

Pentest_CDB - Arbitrary Host Header Accepted [INFO]

Added by Nurul Athira Abdul Rahim almost 3 years ago. Updated 7 months ago.

Status:Closed - End of life cycleStart date:November 10, 2021
Priority:NormalDue date:
Assignee:Nurul Athira Abdul Rahim% Done:

100%

Category:Penetration Test IssueSpent time:-
Target version:-

Description

In many cases, developers are trusting the HTTP Host header value and using it to generate links, import scripts and even generate password resets links with its value. This is a very bad idea, because the HTTP Host header can be controlled by an attacker. This can be exploited using web-cache poisoning and by abusing alternative channels like password reset emails.

Below are some potential scenarios an attacker can exploit the vulnerability.

- By supplying a malicious host header with a password reset request, it may be possible to generate a poisoned password reset link.
- If the application is not externally accessible or uses IP-based access restrictions. Attackers can use DNS Rebinding to bypass any IP or firewall based access restrictions that may be in place, by proxying through their target's browser. Note that modern web browsers' use of DNS pinning does not effectively prevent this attack.
- Depending on the configuration of the server and any intervening caching devices, it may also be possible to use this for cache poisoning attacks.
- Additionally, it may be possible to directly bypass poorly implemented access restrictions by sending a Host header of 'localhost'.

Solution provided by LGMS :

It is not recommended to use host header within the application function that involve security checking or business flow.

However, if the host header value is required, it's highly advised to make use of a whitelist of allowed hostnames or use the SERVER_NAME instead of the host header.

'Affected URL:

https://10.10.55.34:9444/bsn-cdb-uat/*

History

#1 Updated by Nurul Athira Abdul Rahim over 2 years ago

  • Status changed from New - Begin Life Cycle to Development / Work In Progress

Kindly review the fixes, as the new pentest (March,9,20202) result status stated "not solved".

#2 Updated by Najmi Pasarudin over 2 years ago

  • Status changed from Development / Work In Progress to System Integration Test
  • Assignee changed from Najmi Pasarudin to Nurul Athira Abdul Rahim

CF:Configuration between IBM HTTP Server(Web Server) and IBM WebSphere Application Server(App Server) are using hostsnames instead of ip addresses.

#3 Updated by Najmi Pasarudin over 2 years ago

  • % Done changed from 0 to 90

#4 Updated by Nurul Athira Abdul Rahim 7 months ago

  • Status changed from System Integration Test to Closed - End of life cycle

Closed for this and refer new 2023/2024 pentest report

#5 Updated by Nurul Athira Abdul Rahim 7 months ago

  • % Done changed from 90 to 100

Also available in: Atom PDF