bitcoin
bitcoin

$91319.761342 USD

-4.80%

ethereum
ethereum

$2467.537092 USD

-9.74%

tether
tether

$1.000097 USD

-0.02%

xrp
xrp

$2.246790 USD

-9.99%

bnb
bnb

$603.659641 USD

-6.27%

solana
solana

$138.254834 USD

-14.33%

usd-coin
usd-coin

$0.999925 USD

-0.01%

dogecoin
dogecoin

$0.208713 USD

-10.50%

cardano
cardano

$0.673166 USD

-9.84%

tron
tron

$0.233009 USD

-4.90%

chainlink
chainlink

$14.774467 USD

-12.62%

stellar
stellar

$0.291152 USD

-9.72%

avalanche
avalanche

$21.431152 USD

-11.28%

toncoin
toncoin

$3.432747 USD

-8.95%

sui
sui

$2.750352 USD

-18.09%

Cryptocurrency News Video

Password reset token leak via "Host header" and "url" on third party website | Earn upto 200 to 300$

Feb 25, 2025 at 06:06 am Tech_Minded_Ashish

Password Reset Token Leak via "Host Header" and "URL" on a Third-Party Website This vulnerability occurs when a web application improperly handles password reset tokens, exposing them to attackers through: Host Header Manipulation: Some applications generate password reset links using the Host header provided in the HTTP request. If an attacker manipulates the Host header and the application blindly trusts it, the reset link might include a malicious domain controlled by the attacker. The victim, upon receiving and clicking the link, submits their reset token to the attacker's domain, allowing account takeover. URL Exposure on a Third-Party Website: If an application leaks password reset URLs in referer headers, logs, or third-party integrations, an attacker monitoring those locations can capture the reset token. Example: If the reset link is included in a URL parameter that gets logged or shared with external services (e.g., analytics tools, chatbots), attackers might retrieve it and reset the victim’s password. Impact Allows an attacker to reset passwords of victim accounts. Leads to full account takeover. Can be exploited remotely if combined with phishing or session hijacking. Mitigation ✅ Use absolute, hardcoded URLs for password reset links instead of relying on the Host header. ✅ Implement a strict Content Security Policy (CSP) to prevent token exposure in third-party requests. ✅ Avoid logging sensitive URLs and tokens. ✅ Use Referer-Policy: no-referrer to prevent leaks in referer headers. ✅ Ensure password reset tokens are short-lived and single-use. #ethicalhacking #bugbountyhunting #coding #cybersecurity #computersecurity
Video source:Youtube

Disclaimer:info@kdj.com

The information provided is not trading advice. kdj.com does not assume any responsibility for any investments made based on the information provided in this article. Cryptocurrencies are highly volatile and it is highly recommended that you invest with caution after thorough research!

If you believe that the content used on this website infringes your copyright, please contact us immediately (info@kdj.com) and we will delete it promptly.

Other videos published on Feb 25, 2025