Jump to content

HTTP verb tampering


Ares

Recommended Posts

Hello,

UniGUI develops the project and is deployed on the hyper-server. For intrusion detection, there are high-risk issues as follows, please ask how to deal with.

//=====================================================================

HTTP verb tampering

WVS /ext-6.6.0/build/classic/theme-classic/resources/images/button/ HTTP/1.1
Connection: keep-alive
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host:
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21

//=====================================================================

WVS /ext-6.6.0/ HTTP/1.1
Connection: keep-alive
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: 220.130.39.24
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21

//=====================================================================

 

thanks

Link to comment
Share on other sites

Just now, Ares said:

1.90.0.1481 uniGUI trial edi tion
1.90.0.1506 uniGUI Complete - Professional Edition

OK, but why use the trial version if you have a license?

2 minutes ago, Ares said:

1.90.0.1506 uniGUI Complete - Professional Edition

Please visit here first:

 

Link to comment
Share on other sites

  • 4 weeks later...
  • 3 years later...
54 minutes ago, A.Soltani said:

 

Hi

 

How to solve this problem(http tampering)?

IMG_20221107_115255_776.jpg

Hello,

1. try to add Custom Header on UniGUIServerModuleHTTPCommand:

// https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS
//  AResponseInfo.CustomHeaders.AddValue('Access-Control-Expose-Headers', '"Location, Warning, Etag"');
//  AResponseInfo.CustomHeaders.AddValue('Access-Control-Allow-Origin-Headers', '"Accept, Content-Type, If-None-Match, X-If-None-Match"');
//  AResponseInfo.CustomHeaders.AddValue('Access-Control-Allow-Headers', '"Content-Type, If-None-Match, X-If-None-Match, Authorization"');
//  AResponseInfo.CustomHeaders.AddValue('Access-Control-Allow-Credentials', 'true');
  AResponseInfo.CustomHeaders.AddValue('Access-Control-Allow-Methods', 'GET');//,POST, DELETE, HEAD, OPTIONS
  AResponseInfo.CustomHeaders.AddValue('Access-Control-Max-Age', '86400');

2. You should also check for "chunked" encoding

3. You have to look for Reflected HTML Injection vulnerabilities -
//Reflected Injection attack can be performed differently according to the HTTP methods i.e, GET and POST. I would remind, that with POST method data is being sent and with GET method data is being requested.

I share all my solution in this topic: 

 

Link to comment
Share on other sites

  • 2 months later...

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...