π° I Found Host Header Injection & Got a Quick $1,000 Bounty! (Full Guide) π

π How I Found a Host Header Injection Bug & Earned a $1,000 Bounty
During a recent bug bounty hunt, I discovered a Host Header Injection vulnerability that led to account takeover, password reset poisoning, and phishing attacks. Within hours of reporting, I received a $1,000 bounty! π°π₯
In this guide, Iβll break down exactly how I found, exploited, and reported this bug to maximize impact. Letβs get started! π
π΅οΈββοΈ Step 1: Finding a Target with Host Header Dependency
Many websites rely on the Host
header to determine the domain name. If improperly validated, attackers can manipulate it to cause security issues. π¨
I started by sending a simple request to a login page:
curl -I https://target.com/login
Response:
HTTP/1.1 200 OK
Server: nginx
X-Powered-By: PHP
π Key Finding: The server was handling Host
headers dynamically, making it a prime target for Host Header Injection!
π₯ Step 2: Injecting a Malicious Host Header
I modified my request to inject a fake Host:
GET /reset-password HTTP/1.1
Host: attacker.com
If the server does not properly validate the Host header, it could be used to: β
Hijack password reset links by sending victims a poisoned email.
β
Bypass authentication systems that rely on the Host header.
β
Perform web cache poisoning to inject malicious responses.
β οΈ Step 3: Confirming Password Reset Hijacking
To check if the vulnerability was exploitable, I initiated a password reset on my test account. I received the following email:
To reset your password, click the link below:
https://attacker.com/reset-password?token=123456
π₯ Impact: The reset link was poisoned with my attacker-controlled Host header, allowing me to hijack accounts! π
π© Reporting & Quick $1,000 Bounty
Once I confirmed the impact, I submitted a detailed report outlining: β
How the Host header was vulnerable.
β
How it could be exploited for phishing, cache poisoning, and account takeover.
β
A proof-of-concept (PoC) with a working attack scenario.
Within 24 hours, the security team responded and awarded me a $1,000 bounty! π°π₯
π Lessons Learned
1οΈβ£ Always test Host header manipulation in password reset & login pages.
2οΈβ£ Try injecting external domains (attacker.com) to see if they reflect.
3οΈβ£ Check if email confirmations use unvalidated Host headers.
4οΈβ£ Look for cache poisoning and authentication bypasses.
π₯ Want More Hacking Tutorials?
π‘οΈ Subscribe for Cybersecurity Videos: youtube.com/@theindiannetwork
π Need Ethical Hacking Consultation? Contact: theindiannetwork@protonmail.com