skip to content
Decrypt LOL

Get Cyber-Smart in Just 5 Minutes a Week

Decrypt delivers quick and insightful updates on cybersecurity. No spam, no data sharing—just the info you need to stay secure.

Read the latest edition

New Method Exploits Reflected Input Vulnerabilities Using Range Header

/ 1 min read

🪄 New method discovered for exploiting reflected input vulnerabilities. Recent research highlights a technique that combines desynchronization and header injection to exploit reflected input vulnerabilities effectively. By utilizing the Range header, attackers can isolate fully-exploitable payloads from unexploitable reflected content, which often resides in less accessible areas of a response. The study reveals that many endpoints respond positively to unsolicited Range requests, allowing attackers to manipulate responses without the typical restrictions imposed by CORS. This method poses significant challenges for defenders, as the individual components of the attack appear benign, making detection difficult. Understanding how these vulnerabilities can be combined is crucial for improving security measures against such sophisticated attack chains.

Source
{entry.data.source.title}
Original