Aws Invalid Header Fields Not Dropped
Description
Detects AWS Application Load Balancers (ALBs) that are not configured to drop invalid HTTP header fields. When this security control is disabled, malicious actors could potentially exploit header vulnerabilities by sending malformed HTTP headers that might lead to HTTP desync attacks or request smuggling.
Detection Strategy
• Checks each Application Load Balancer in the AWS account and region
• Examines the load balancer attribute 'routing.http.drop_invalid_header_fields.enabled'
• Reports a vulnerability if this attribute is set to 'false'
• Only evaluates Application Load Balancers (Type: 'application') - Network Load Balancers and Gateway Load Balancers are excluded
Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan.If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.