Uncommon query string parameter

By
Rejah Rehim
Published on
24 Jun 2018
1 min read

There are applications that supplying multiple HTTP parameters with the same name. This method to supply HTTP parameters might cause the application to interpret values in an unanticipated way. By exploiting this bug, an attacker can easily bypass any input validation. The attacker can also modify internal variables of the application to trigger internal application error. These conditions can cause catastrophic effects on the server. If query strings are not passed in a secure way to the URL, the attacker can get sensitive information about the user and the application. The sensitive information includes usernames, passwords, tokens (authX), database details, and the other potentially sensitive data.

Example

The following link is an example of a query string.

http://example.beaglesecurity.com/over/there?name=data

Impact

The following are the impacts of this vulnerability:-

  • The attacker can leak sensitive information about the server and the end users.

Mitigation / Precaution

Beagle recommends the following fixes:-

  • Implement proper input validation for fields like forms, headers and many more.
  • Try to accept parameters only where they are supposed to be supplied.
  • Ensure that the application encodes the user-supplied input whenever possible with GET/POST HTTP request to the HTTP backend.
Automated human-like penetration testing for your web apps & APIs
Teams using Beagle Security are set up in minutes, embrace release-based CI/CD security testing and save up to 65% with timely remediation of vulnerabilities. Sign up for a free account to see what it can do for you.

Written by
Rejah Rehim
Rejah Rehim
Co-founder, Director
Find website security issues in a flash
Improve your website's security posture with proactive vulnerability detection.
Free website security assessment
Experience the power of automated penetration testing & contextual reporting.