Skip to content

Security Test: Request URL Override

Description

Default Severity:

Request URL Override vulnerabilities occur when an application allows attackers to manipulate the target URL by injecting headers such as X-Original-URL or X-Rewrite-URL. These headers can override the intended URL used in a request, leading to unauthorized access to resources, bypassing of security controls, or redirection to malicious sites. Such vulnerabilities often arise when applications rely on client-supplied headers to determine the target URL without proper validation or sanitization. Failure to enforce strict URL validation can result in security breaches, data leaks, or phishing attacks.

Reference:

Configuration

Identifier: configuration/request_url_override

Examples

All configuration available:

checks:
  configuration/request_url_override:
    skip: false # default
    options:
      skip_objects: # cf. Options below

Options

Options can be set in the options key of the Security Test Configuration.

Property Type Default Description
skip_objects List[string] List of objects that are to be skipped by the security test.

Compliance and Standards

Standard Value
OWASP API Top 10 API10:2023
OWASP LLM Top 10 LLM06:2023
PCI DSS 6.5.1
GDPR Article-32
SOC2 CC1
PSD2 Article-95
ISO 27001 A.14.2
NIST SP800-53
FedRAMP AC-7
CWE 601
CVSS Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:H/RL:O/RC:C
CVSS Score 6.5