Path: /
According to the scan report:
Path: /
Difficulties: JavaScript event handlers, JavaScript modifies request
Technologies: JavaScript
Vulnerabilities: Base64-encoded data in parameter, Request URL overrideVulnerability 1: Base64-encoded data in parameter
Capture the request using burpsuite:

In Burp Suite, when you select the TrackingID, you will observe that it is a Base64 encoded value. Burp Suite displays its decoded value.

Other way:
Although the TrackingId here has a type as class and a value as some random identifier, the purpose of the TrackingId is to track user activity. This feature is mostly used on shopping sites to keep a record of a user’s browsing history without requiring them to log in. This generally has low criticality. However, if any sensitive information, such as a username or password, is passed through the request in a Base64-encoded value, it becomes a high-criticality issue. Additionally, in some cases, changing the TrackingId value might allow an attacker to impersonate another user and potentially access their data.
Vulnerability 2: Request URL Override
In this, the requested URL can be overwritten by HTTP headers. An example is the X-Forwarded-Host header. The complications are not very severe but can lead to issues like cache poisoning. If anyone tries to load the poisoned content, they might see the content added by the attacker. Secondly, there will be many fake logs, making it difficult for administrators to identify legitimate ones and work on them.
I have used curl a command to test this.
My Internal IP is 10.0.2.15.


In the output of the curl command, I cannot see anywhere IP address I have mentioned in X-Forwarded-Host. Also, I cannot Verify the content of log file as I don't know where a log file is.
Also, I don't get anything captured in Netcat listener.

This is a vulnerability according to the scan report but I cannot verify this.
Last updated
Was this helpful?