Open In App

Client-Side HTTP Parameter Pollution Attack

Client-Side HTTP Parameter Pollution is a client-side security vulnerability in web applications designed to use HTTP requests. HTTP parameter pollution exploits the ability of HTTP methods such as POST, PUT and DELETE to send additional data with a request. This allows attackers to inject arbitrary HTML code which will be processed by the vulnerable application as part of its normal operation. The vulnerability specifically targets web frameworks that facilitate the development of SPAs (Single Page Applications) where content can be dynamically generated before page rendering or in response to user actions.

 

Factors Affecting Attack:

Countermeasures: 

Conclusion: 

A new, fine-grained parameter parsing function should be implemented in web frameworks. The following properties should be checked, in order to avoid all possible attacks. So far, no reported or published exploits take advantage of this kind of attack. Moreover, no reports about this vulnerability have been found in the wild.HTTP Parameter Pollution seems to be an innovative attack that uses some side-channel information from video formats (in particular H.264) in order to bypass application filters and authorization mechanisms. Moreover, its exploitation is not trivial and not easy; however, it is possible.

Article Tags :