HTTP Verb Tampering
Intro to HTTP Verb Tampering
The first type of HTTP Verb Tampering vulnerability is mainly caused by Insecure Web Server Configurations
, and exploiting this vulnerability can allow us to bypass the HTTP Basic Authentication prompt on certain pages.
Identify
When we start the exercise at the end of this section, we see that we have a basic File Manager
web application, in which we can add new files by typing their names and hitting enter
:

However, suppose we try to delete all files by clicking on the red Reset
button. In that case, we see that this functionality seems to be restricted for authenticated users only, as we get the following HTTP Basic Auth
prompt:

As we do not have any credentials, we will get a 401 Unauthorized
page

So, let's see whether we can bypass this with an HTTP Verb Tampering attack. To do so, we need to identify which pages are restricted by this authentication. If we examine the HTTP request after clicking the Reset button or look at the URL that the button navigates to after clicking it, we see that it is at /admin/reset.php
. So, either the /admin
directory is restricted to authenticated users only, or only the /admin/reset.php
page is. We can confirm this by visiting the /admin
directory, and we do indeed get prompted to log in again. This means that the full /admin
directory is restricted.
Exploit

As the page uses a GET
request, we can send a POST
request and see whether the web page allows POST
requests (i.e., whether the Authentication covers POST
requests). To do so, we can right-click on the intercepted request in Burp and select Change Request Method
, and it will automatically change the request into a POST
request:

Once we do so, we can click Forward
and examine the page in our browser. Unfortunately, we still get prompted to log in and will get a 401 Unauthorized
page if we don't provide the credentials:

So, it seems like the web server configurations do cover both GET
and POST
requests. However, as we have previously learned, we can utilize many other HTTP methods, most notably the HEAD
method, which is identical to a GET
request but does not return the body in the HTTP response. If this is successful, we may not receive any output, but the reset
function should still get executed, which is our main target.
To see whether the server accepts HEAD
requests, we can send an OPTIONS
request to it and see what HTTP methods are accepted, as follows:
eldeim@htb[/htb]$ curl -i -X OPTIONS http://SERVER_IP:PORT/
HTTP/1.1 200 OK
Date:
Server: Apache/2.4.41 (Ubuntu)
Allow: POST,OPTIONS,HEAD,GET
Content-Length: 0
Content-Type: httpd/unix-directory
As we can see, the response shows Allow: POST,OPTIONS,HEAD,GET
, which means that the web server indeed accepts HEAD
requests, which is the default configuration for many web servers. So, let's try to intercept the reset
request again, and this time use a HEAD
request to see how the web server handles it:

Once we change POST
to HEAD
and forward the request, we will see that we no longer get a login prompt or a 401 Unauthorized
page and get an empty output instead, as expected with a HEAD
request. If we go back to the File Manager
web application, we will see that all files have indeed been deleted, meaning that we successfully triggered the Reset
functionality without having admin access or any credentials:

PoCs - Questions
Try to use what you learned in this section to access the 'reset.php' page and delete all files. Once all files are deleted, you should get the flag.

I can write into new file name and for example, put the same name "notes.txt", with it, i will be to intercept the peticion with burp -->

For this peticion, it return us "Unauthoried", but if you replace the GET for DELETE, maybe the system think we need DELETE it without auth -->


Bypassing Security Filters
This is commonly found in security filters that detect malicious requests. For example, if a security filter was being used to detect injection vulnerabilities and only checked for injections in POST
parameters (e.g. $_POST['parameter']
), it may be possible to bypass it by simply changing the request method to GET
.
Identify
In the File Manager
web application, if we try to create a new file name with special characters in its name (e.g. test;
), we get the following message:

This message shows that the web application uses certain filters on the back-end to identify injection attempts and then blocks any malicious requests
Exploit
To try and exploit this vulnerability, let's intercept the request in Burp Suite (Burp) and then use Change Request Method
to change it to another method:

This time, we did not get the Malicious Request Denied!
message, and our file was successfully created:

So, we can inject a command that creates two files and then check whether both files were created. To do so, we will use the following file name in our attack (file1; touch file2;
):

Then, we can once again change the request method to a GET
request:

Once we send our request, we see that this time both file1
and file2
were created:

PoCs - Questions
To get the flag, try to bypass the command injection filter through HTTP Verb Tampering, while using the following filename: file; cp /flag.txt ./

We cannot do anything without prior permissions, but we can see that the peticion is GET, change it for POST, but we can know, the parameter filename -->

Remenber, urlencoder the file name
Last updated