bitcoin
bitcoin

$84893.487933 USD

0.08%

ethereum
ethereum

$1596.274407 USD

0.88%

tether
tether

$0.999636 USD

-0.03%

xrp
xrp

$2.081851 USD

1.38%

bnb
bnb

$591.474593 USD

0.28%

solana
solana

$138.094016 USD

2.28%

usd-coin
usd-coin

$0.999737 USD

-0.03%

dogecoin
dogecoin

$0.159043 USD

3.11%

tron
tron

$0.241190 USD

-1.77%

cardano
cardano

$0.633320 USD

3.41%

unus-sed-leo
unus-sed-leo

$9.224828 USD

-0.09%

chainlink
chainlink

$12.732104 USD

2.05%

avalanche
avalanche

$19.288047 USD

1.39%

toncoin
toncoin

$3.000551 USD

1.99%

stellar
stellar

$0.243091 USD

0.93%

Cryptocurrency News Video

Password reset token leak via "Host header" and "url" on third party website | Earn upto 200 to 300$

Feb 25, 2025 at 06:06 am Tech_Minded_Ashish

Password Reset Token Leak via "Host Header" and "URL" on a Third-Party Website This vulnerability occurs when a web application improperly handles password reset tokens, exposing them to attackers through: Host Header Manipulation: Some applications generate password reset links using the Host header provided in the HTTP request. If an attacker manipulates the Host header and the application blindly trusts it, the reset link might include a malicious domain controlled by the attacker. The victim, upon receiving and clicking the link, submits their reset token to the attacker's domain, allowing account takeover. URL Exposure on a Third-Party Website: If an application leaks password reset URLs in referer headers, logs, or third-party integrations, an attacker monitoring those locations can capture the reset token. Example: If the reset link is included in a URL parameter that gets logged or shared with external services (e.g., analytics tools, chatbots), attackers might retrieve it and reset the victim’s password. Impact Allows an attacker to reset passwords of victim accounts. Leads to full account takeover. Can be exploited remotely if combined with phishing or session hijacking. Mitigation ✅ Use absolute, hardcoded URLs for password reset links instead of relying on the Host header. ✅ Implement a strict Content Security Policy (CSP) to prevent token exposure in third-party requests. ✅ Avoid logging sensitive URLs and tokens. ✅ Use Referer-Policy: no-referrer to prevent leaks in referer headers. ✅ Ensure password reset tokens are short-lived and single-use. #ethicalhacking #bugbountyhunting #coding #cybersecurity #computersecurity
Video source:Youtube

Disclaimer:info@kdj.com

The information provided is not trading advice. kdj.com does not assume any responsibility for any investments made based on the information provided in this article. Cryptocurrencies are highly volatile and it is highly recommended that you invest with caution after thorough research!

If you believe that the content used on this website infringes your copyright, please contact us immediately (info@kdj.com) and we will delete it promptly.

Other videos published on Apr 19, 2025