Skip to content

πŸ› οΈ HTTP parameter pollution ​

Theory ​

A query parameter allows a client to refine researches on a website. It is composed of a key (the parameter name) and a value (what we are requesting).

With parameter pollution, we enter a query parameter with the same key multiple times. For example, we could have $URL?username=X&username=Y, but which one does a web server choose?
In fact, each web servers adopt different behaviors: some of them choose the first parameter, the second parameter, or every parameter.

This attack could allow an attacker to bypass input validation and WAFs rules, manipulate, access, or retrieve hidden information.

Practice ​

Before the attack ​

Arjun can be used to find HTTP parameters in a website.

bash
arjun -u $URL/endpoint

It's possible to specify a delay between requests and handle rate limits.
Check out the GitHub page.

After discovering a few HTTP parameters, one should know the server's behavior when presented with the same key multiple times.

  1. When presented with a query string in a URL, check the response the server gives with one key.

    http://example.com/search=result1

  2. Repeat the first step with another value (make sure to check the response).

    http://example.com/search=result2

  3. Once you are able to identify what kind of response the server returns for each value, try to combine both and see which one is used.

    http://example.com/page?search=result1&search=result2

*The result could be a combination of both, giving a new response.

The payload that would be used to conduct a HPP will depend on the browser's behavior (found previously).

Resources ​

https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/07-Input_Validation_Testing/04-Testing_for_HTTP_Parameter_Pollution