HTTP Bypass via Header Injection

Welcome to another edition. A few days ago I was playing a CTF and was faced with an IP restriction on an API. Fortunately, there was a misconfiguration and using an “X-Forwarded-For” header was able to bypass it. Here is a list I have compiled in case some of my readers want to incorporate this technique in their pentest arsenal.

Access-Control-Allow-Origin
Client-IP
Forwarded
Forwarded-For
Forwarded-For-IP
Origin
X-Client-IP
X-Custom-IP-Authorization
X-Forwarded
X-Forwarded-By
X-Forwarded-For
X-Forwarded-For-Original
X-Forwarded-Host
X-Forwarder-For
X-Originating-IP
X-Remote-Addr
X-Remote-IP
CF-Connecting-Ip
X-Real-IP
True-Client-IP

Until next time! 🙂

Leave a comment

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: