HTTP Verb Tampering
HTTP verb tampering involves manipulating the HTTP methods used in requests to bypass security measures.
Web servers typically support several HTTP methods:
HEAD
,PUT
,POST
,GET
,DELETE
,OPTIONS
,PATCH
,TRACE
,CONNECT
Security Filters Bypass:
Insecure coding practices can lead to security vulnerabilities. For instance, a developer might secure a specific method (e.g.,
GET
) against SQL Injection (SQLi) but neglect others likePOST
.Attackers can exploit this oversight by using a different HTTP method to bypass security checks and perform malicious actions such as SQLi.
Bypassing Access Controls:
HTTP verb tampering can be used to bypass
401 Unauthorized
and403 Forbidden
responses if security controls are improperly implemented across different HTTP methods.
Bypassing Basic HTTP Authentication:
Changing the HTTP request method can sometimes bypass basic authentication mechanisms, further highlighting the risks of insecure handling of HTTP methods.
While automated security tools can detect issues arising from insecure server configurations, they often miss vulnerabilities caused by poor coding practices.
Manual testing is essential to uncover these verb-based vulnerabilities, especially those that automated tools might overlook.
Check HackTricks for more methods.
Last updated