Briskinfosec - Global Cybersecurity Service Providers

  • +91 86086 34123

  • contact@briskinfosec.com

Stay Connected:

Host Header Attack | Briskinfosec
Image

Host Header Attack

Most of the common web servers are configured in the form of the same server to host many web applications with the same IP address this type of configuration is the reason for the Host Header issues. Here we are going to deal with the host header injection attack in various forms, its impact and mitigation.

CONTENTS:

  • HOST HEADER ISSUES
  • RISK
  • HOW ATTACKERS UTILIZE HOST HEADER ATTACK?
  • WHY HOST HEADER ATTACK HAPPENS?
  • HOW TO FIND HOST HEADER ISSUES?
  • PHASES OF HOST HEADER ISSUES
  • IMPACTS OF HOST HEADER ISSUES
  • MITIGATIONS FOR HOST HEADER ATTACK
  • CONCLUSION
  • HOW BRISKINFOSEC HELPS YOU?
  • CURIOUS TO READ OUR CASE STUDIES?
  • LAST BUT NOT THE LEAST
  • YOU MAY BE INTERESTED ON

HOST HEADER ISSUES:

An attacker can manually divert the code to produce the hacker’s desired output, simply by editing the host header. Most probably web servers are configured to pass the host header to the first virtual host in the list without proper reorganisation. So It is possible to send the HTTP requests with arbitrary host headers to the first virtual host. In that case, if we specify an invalid Host means that the web server process it and pass the invalid host header to the first virtual host in the list.

An attacker can modify the host name by giving a fake web page or vulnerable website and deliver it to the user and fraud the users.

Example:

The result will redirect the user to the attacker’s website by simply modifying the host header.

RISK:

Most probably, many websites use the values provided in the user input field and use it afterwards without an improper input validation. Commonly, this will not have that much impact on the application. But in some cases, if the application accepts the host header, the risk lays there. There may occur:

  •  URL redirection problems.

  • Username and password credentials may get stolen.

  • Financial loss may occur.

HOW ATTACKERS UTILIZE HOST HEADER ATTACK:

The exploitation is based on the logic of the web application. If the application does not use the user’s input value, then there is no risk. But, the host header attack is considered as a serious issue at the time of resetting our password. When we are resetting our forgotten password, or when we change our password for enabling our privacy, the web application generates a link dynamically. There it uses the host header provided in the request. In this scenario, the hacker uses this header for his/her evil cause. The hackers use some social engineering and phishing attacks for getting the link. So, the developers should realise the consequences of host header attack.

WHY HOST HEADER ATTACK HAPPENS?

It is an injection type of attack that is done on the HTTP headers.

  • HTTP headers are dynamically generated based on the input of the user. User inputs can be edited, or spoofed by attackers. It is accessible by everyone.

  • If websites fail to correctly validate or verify the HTTP Host headers.

HOW TO FIND HOST HEADER ISSUES?

Finding host header issues could be done by:

  • Verifying the header of the request.

  • Injecting other domain in the header field.

  • Checking the response of the header in Browser.

PHASES OF HOST HEADER ISSUES:

1.WEB CACHE POISONING WITH SINGLE HOST HEADER:

Web cache poisoning is a kind of technique used by a hacker, to manipulate a web cache that serves a poisoned content for those who requests that webpage. For this attack, the hacker needs to poison a caching proxy that is being run by the website itself, content delivery networks (CND’s), or other caching mechanisms that are carried out between the client and the server. In this scenario where caching is enabled, a hacker will potentially embed a remote URL as the base URL for any website. This causes other users, who request the site to get redirected unknowingly. Thus, if an application fails to prevent the user from using the X-Forwarded-Host header, it will effectively override the Host header. The cache will serve the poisoned content to everyone who requested the webpage, without the knowledge of the victim.

Example:

2.X-FORWARDED HOST HEADER:

Host header injection is mitigated by preventing the tampering of Host header. It means if any request is made with tampered host header, the application responds with an error message like “404 Not Found”. Another way to pass arbitrary Host headers is to use the X-Forwarded-Host header. In some configurations, this header will rewrite the value of the Host header. Therefore, it’s possible to make the following request:

3.WEB POISONING WITH MULTIPLE HOST HEADERS:

It is one form of web cache poisoning attack. It’s similar to that of web cache poisoning using the single header. The only difference in this type is that, it uses multiple headers more than once to the users, whom request the website. By tampering with the header, it is possible. The web cache will deliver the wrong content to the user without their knowledge.

Example:

    GET / HTTP/1.1

   Host: www.example.com

   Host: www.evil.com

4.PASSWORD RESET POISONING:

The significant impact of Host header attack lies in the password resetting functionality. The most common scenario of this attack is that the hacker generates a secret token, and then sends a mail that has a link containing the mysterious symbol of the hacker. The hacker then urges the user to make use of his link and also requests a password reset link that redirects the user to him. In this case, if the web application makes use of this host header value when composing with the reset link, and when the user clicks the poisoned reset link in the mail, the user will become a victim to the hacker. The attacker will obtain the password reset token and make use of his password for his destructive purposes.

Example:

 

IMPACT OF HOST HEADER ISSUES:

  • A hacker can modify the legitimate host header with a wrong host in the request, and it poisons the cache of the web application server as well the proxy. It has nothing to do with the browser. When the authorised user tries to access the host, the cache of the web server is poisoned with the hacker’s domain that redirects the licensed user to the domain of the hacker.

  • If the host headers are used for writing links without a proper HTML encoding, there may be a possibility for Cross-site scripting.

  • Access to the internal host.

  • HTML INJECTION also can be done.

MITIGATIONS FOR HOST HEADER ATTACK:

  • Proper sanitation of input values.

  • Proper verification of the request, whether it came from the original target host or not.

  • Mitigate the Host header attack in Apache and Nginx by creating a dummy virtual host that catches all requests from unrecognised Host headers.

  • Whitelist the trusted domains at the initial phase of the web application.

  • Respective mapping of the domains that are received in the host header of each HTTP request with itself.

  • Use secure server configuration.

  • Disable the support for the X-Forwarded-Host header option.

CONCLUSION:

Many application developers did not realize that the HTTP host header is accessible and controllable by all users. In an application security perspective, the input given by the user is always deceivable, and it is unsafe to trust. So, a web developer should consider host header issues as a serious ongoing threat, which must be inspected deeply. Moreover, we must implement the required mitigation measures to safeguard ourselves.

HOW BRISKINFOSEC HELPS YOU?

For the above requirements to be satisfied, a capable cyber security vendor who provides genuine cybersecurity services must be hired. We have identified many Host Header issues that were existing in many of our client’s applications. Most significantly, we have eliminated them through our security veteran’s and have also provided practical awareness on how to be astoundingly safe against such possible threats. We, are center for Cyber Security Excellence, passionate to secure you from all security threats on your budget. Talk to our experts any time, for further clarification and for better insights.

CURIOUS TO READ OUR CASE STUDIES?

After performing security assessments, we do prepare the deeds done during that scrutinized process as a case study. This is prepared with the sole notion of demonstrating you the challenges and hardships we faced in the bid of identifying and terminating the deeply hidden vulnerabilities. Read our case studies and see the way we eliminated the cyber threats swiftly.

LAST BUT NOT THE LEAST:

We’ve seen people blaspheming many cybersecurity organizations for not helping them to catch sight of the latest and important cyberattacks, at ease. All cybersecurity organizations tell about various attacks but hardly few collect those attacks and present it as a single report for people that encompasses the latest and dreadful global breaches. But, we have our Threatsploit Adversary report which contains significant collection of global cyberattacks. We prepare it to caution people about various cyber threats. Most importantly, it is done because we care for your digital safety and hence, kindly check it out.

YOU MAY BE INTERESTED ON:


Image

Alex Xavier

Security Engineer

He is a security engineer having a good knowledge in the key areas of Web application Penetration Testing and also in Network Security. He does web and network security assessment and also writes informative blogs. He also an active participant in bugbounty programmes and CTF's stuffs.

Add Your Comments

Name*
Email*
Your Comments*