Password Reset Poisoning via Dangling Markup
攻击者利用主机头注入和悬垂标记技术,在密码重置邮件中注入恶意代码,劫持用户账户。通过篡改HTTP Host头并注入未过滤输入到HTML模板中,实现账户接管。 2025-7-29 07:31:25 Author: infosecwriteups.com(查看原文) 阅读量:17 收藏

Bash Overflow

Discover how attackers exploit host header injection and dangling markup to hijack accounts via poisoned password reset emails.

🔓 Free Link

Zoom image will be displayed

Password Reset Poisoning via Dangling Markup

Disclaimer:
The techniques described in this document are intended solely for ethical use and educational purposes. Unauthorized use of these methods outside approved environments is strictly prohibited, as it is illegal, unethical, and may lead to severe consequences.

It is crucial to act responsibly, comply with all applicable laws, and adhere to established ethical guidelines. Any activity that exploits security vulnerabilities or compromises the safety, privacy, or integrity of others is strictly forbidden.

  1. Summary of the Vulnerability
  2. Steps to Reproduce & Proof of Concept (PoC)
  3. Impact

Password reset poisoning via dangling markup is a subtle yet dangerous vulnerability where an attacker manipulates HTTP headers, particularly the Host header to inject unsanitized input into HTML templates that are used in password reset emails.

In the PortSwigger lab referenced, the web application sends a password reset email that contains…


文章来源: https://infosecwriteups.com/password-reset-poisoning-via-dangling-markup-ee7ee428d632?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh