TypeSetter CMS 5.1 Host Header Injection

Credit: Navina Asrani
Risk: Low
Local: No
Remote: Yes

‚Äč# Exploit Title: TypeSetter CMS 5.1 Host Header Injection # Date: 10-02-2018 # Exploit Author: Navina Asrani # Contact: https://twitter.com/NavinaSanjay # Website: https://securitywarrior9.blogspot.in/ # Vendor Homepage: https://www.typesettercms.com/ # Version: 5.1 # CVE : NA # Category: Webapp CMS 1. Description The application allows illegitimate host header manipulation and leads to aribtary web page re-direction. This can also lead to severe attacks such as password reset or web cache poisoning 2. Proof of Concept 1. Visit the application 2. Tamper the request and change the host to any arbitrary header like google.com 3. The same is added in request and complete page re-direction takes place. Exploitation Technique: A attacker can perform application modification to perform advanced attacks as as password reset/ cache poisoning etc. Severity Level: High Security Risk: The presence of such a risk can lead to user cache poisoning and user re-direction Exploit code: GET / HTTP/1.1 Host: google.com You can observe the page being re-directed and the Location header changed in response to: http://www.google.com/ 3. Solution: To Mitigate host header injections allows only a white-list of allowed host names.

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2018, cxsecurity.com


Back to Top