Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

HTTP Parameter Pollution #173

Open
luantranminh opened this issue Jul 21, 2024 · 0 comments
Open

HTTP Parameter Pollution #173

luantranminh opened this issue Jul 21, 2024 · 0 comments
Labels

Comments

@luantranminh
Copy link
Owner

luantranminh commented Jul 21, 2024

https://www.youtube.com/watch?v=QVZBl8yxVX0

What is HTTP Parameter Pollution?

HTTP Parameter Pollution (HPP) is an attack evasion technique that allows an attacker to craft an HTTP request to manipulate or retrieve hidden information.

A web server may override parameters, choose the first occurrence or the last occurrence, or combine them in the case of duplicates. This opens a gate to inject malicious parameters.

Example of HTTP Parameter Pollution

image

Mitigating HTTP Parameter Pollution Attacks

  • Strict Parameter Validation
  • Single Parameter Instances
  • Input Sanitization
  • Use of Security Headers : using security headers like Content Security Policy to mitigate the risk of code injection attacks Security Headers #174
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

1 participant