• MetInfo Password Reset Poisoning By Host Header Attack


    if we know some user's email, the we will can reset the user's email by host header attack.

    The attack vector is that the user binded email and we know the user's email.

    The following POST request is the normal request.

    as the picture shows,the request host header is Localhost.

    so the reset password email is like this:

    but this link'host comes from the reset passowrd request host header.If we change the reset passowrd request host header, then the reset passowrd link in email will changes.

    so if a attacker konw some user's email and change the host header of the reset passowrd request. when the user click the fake reset password link, the attacker will receive this request, then change the link with the true host, finally change the user's password.

    1. change the host header of the reset passowrd request

    1. the user will receive the reset password email like this

    1. the user click the fake reset password link.

    2. the attacker will receive this request.

    1. then the attacker change this request with the true host(the website's host), and visit the link to change the user's password.

  • 相关阅读:
    rowkey设计原则和方法
    ubuntu安装及使用
    sqoop数据迁移
    Hive 自定义UDF操作步骤
    hive之数据导入导出
    MySQL优化
    MongoDB、Redis、elasticSearch、hbase的对比
    数据库基本操作
    count(*) 和 count(1)和count(列名)区别
    BigDecimal的运算——加减乘除
  • 原文地址:https://www.cnblogs.com/babers/p/8503116.html
Copyright © 2020-2023  润新知