Unvalidated redirect via Host Header

Note the URL does not end with a trailing / to try and force a redirect, assuming the assets directory exists on the application. Change www.example.com to the attackers website and note the redirect in the Location header. Sometimes partial restrictions are set and may therefore be tested both via HTTPS and HTTP protocol.

  • Original:
GET /assets HTTP/1.1
Host: www.example.com
  • Edited:
GET /assets HTTP/1.1
Host: www.evil.com

Internal Disclosures via HTTP/1.0

Internal IP disclosures or Internal Host Names can reveal other entities on the local network to gain additional information about the internal infrastructure

On some websites, the request below may reveal an IP address in the Location header or exposing potential headers that usually do not appear in general requests. Send the following request without a Host header. In Burp, make sure it's set to HTTP/1.1 and not HTTP/2 or burp will change it to HTTP/2 by its own. Try both HTTP and HTTPS. As long as it's towards a 3xx redirect endpoint, it should be fine!

GET /assets HTTP/1.0

Sometimes the target website is not self hosted and is hosted on Amazon Web Services. Therefore an AWS instance might show up!