Testing for HTTP parameter pollution
HTTP parameter pollution (HPP) is an attack in which multiple HTTP parameters are sent to the web server with the same name. The intention is to determine whether the application responds in an unanticipated manner, allowing exploitation. For example, in a GET
request, additional parameters can be added to the query string—in this fashion: "&name=value"
—where name
is a duplicate parameter name already known by the application code. Likewise, HPP attacks can be performed on POST
requests by duplicating a parameter name in the POST
body data.
Getting ready
Using OWASP Mutillidae II, let’s determine whether the application allows HPP attacks.
How to do it...
- From the OWASP Mutillidae II menu, select Login by navigating to OWASP 2013 | A1 - Injection (Other) | HTTP Parameter Pollution | Poll Question:
Figure 8.21 – Navigate to the HTTP Parameter Pollution lesson...