This blog is all about Cyber Security and IT

Host Header Attack


 In simple terms if a website is requested and when i change the host to , if I am able to open the host . Than it is a host header attack.

Vulnerability Description: 

Open Redirection is sometimes used as a part of phishing attacks that confuse visitors about which web site they are visiting.

How to find this Vulnerability 

1. Change host to, Than click on go . If  not able to success . than try below method.
2. Change host to and Set X-Forwarded-Host to original, if still unable to get success , try the below one
3. Do the opposite to step two , Means change host to original and Set X-Forwarded-Host to original

If you are unable to find success with the above written steps , Than may be the website is secured for this vulnerability.


If possible, the application should avoid incorporating user-controllable data into redirection targets. In many cases, this behavior can be avoided in two ways:

Remove the redirection function from the application, and replace links to it with direct links to the relevant target URLs.

Maintain a server-side list of all URLs that are permitted for redirection. Instead of passing the target URL as a parameter to the redirector, pass an index into this list.

Example of a Bug Reported:

Vulnerable URL:
Payload: " X-Forwarded-Host: "
How to reproduce this vulnerability:
  1. Open this URL " " and send it to the repeater in burp suite.
  2. add the payload to the header request and forward the request.
  3. It will directly redirect to


Whenever a user visits this URL, it will redirect them to It is used in phishing attacks.


Post a Comment