Skip to content

Instantly share code, notes, and snippets.

@TJetnipat
Last active February 13, 2024 14:00
Show Gist options
  • Star 3 You must be signed in to star a gist
  • Fork 1 You must be signed in to fork a gist
  • Save TJetnipat/02b3854543b7ec95d54a8de811f2e8ae to your computer and use it in GitHub Desktop.
Save TJetnipat/02b3854543b7ec95d54a8de811f2e8ae to your computer and use it in GitHub Desktop.
A Host Header Injection issue on the Login page of Plesk Obsidian through 18.0.49 allows attackers to redirect users to malicious websites via a HTTP "Host" request header.
Vulnerability: Host Header Injection
Product: Plesk Obsidian
Version: 18.0.49 and below
Tools:
Burp Suite
Mozilla Firefox (as a browser)
Scenario: Attacker could redirect users login page to malicious login page by inject a payload directly into the “Host: ” HTTP request header.
Steps:
1. Access the target website (which Plesk installed) without URL path.
2. Intercept “login.php” request and Modify the “Host: ” HTTP request header value to malicious website. In this case -> attacker.com and then forward the edited request.
3. The target website will redirect to “https://attacker.com/login_up.php” instead of “https:<target>/login.php”.
More step by step screanshot and PoC video:
https://medium.com/@jetnipat.tho/cve-2023-24044-10e48ab940d8
@bugoverfl0w
Copy link

What the fak? how can you attacker user?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment