Non-secure requests are not automatically upgraded to HTTPS
Non-secure requests are not automatically upgraded to HTTPS | HSTS MISSING
Hi Team:
I found another potential bug on your site.
VULNERABLE URL :
Issue description:----
The application fails to prevent users from connecting to it over unencrypted connections. An attacker able to modify a legitimate user's network traffic could bypass the application's use of SSL/TLS encryption, and use the application as a platform for attacks against its users. This attack is performed by rewriting HTTPS links as HTTP so that if a targeted user follows a link to the site from an HTTP page, their browser never attempts to use an encrypted connection.
To exploit this vulnerability, an attacker must be suitably positioned to intercept and modify the victim's network traffic. This scenario typically occurs when a client communicates with the server over an insecure connection such as public Wi-Fi, or a corporate or home network that is shared with a compromised computer. Common defenses such as switched networks are not sufficient to prevent this. An attacker situated in the user's ISP or the application's hosting infrastructure could also perform this attack. Note that an advanced adversary could potentially target any connection made over the Internet's core infrastructure.
Steps to Reproduce:
1) Go to https://hstspreload.org/
2) enter your domain: website.com
POC:
here I attached proof of concept of HSTS result.
Issue remediation
The application should instruct web browsers to only access the application using HTTPS. To do this, enable HTTP Strict Transport Security (HSTS) by adding a response header with the name 'Strict-Transport-Security' and the value 'max-age=expireTime', were to expire time is the time in seconds that browsers should remember that the site should only be accessed using HTTPS. Consider adding the 'includeSubDomains' flag if appropriate.
Note that because HSTS is a "trust on first use" (TOFU) protocol, a user who has never accessed the application will never have seen the HSTS header, and will therefore still be vulnerable to SSL stripping attacks. To mitigate this risk, you can optionally add the 'preload' flag to the HSTS header, and submit the domain for review by browser vendors.
References
HTTP Strict Transport Security
HSTS Preload Form
Vulnerability classifications
CWE-523: Unprotected Transport of Credentials
Kind Regards
Read More
Reference: https://owasp.org/
Some same reports:--
https://hackerone.com/reports/
https://hackerone.com/reports/
References
https://owasp.org/www-project-
Please sign in to leave a comment.
Comments
0 comments