HTTP Parameter Pollution
Manipulate or pollute HTTP requests by injecting multiple parameters with the same name into a single request, potentially allowing to bypass security controls, altering the behavior of the application, or accessing unauthorized data.
We can find a typical example of this vulnerability as follows:
We send a petition to a login form
We can create confusion by duplicating the user parameter, which could allow us to get information or even access another account
We can also do this by modifying directly the request parameters
Example request
Last updated
Was this helpful?