Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 305ec45

Browse files
committed
Update for an Issue #760
1 parent 32af0b1 commit 305ec45

1 file changed

Lines changed: 12 additions & 12 deletions

File tree

tamper/varnish.py

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -14,18 +14,18 @@ def dependencies():
1414

1515
def tamper(payload, **kwargs):
1616
"""
17-
Append a HTTP Request Parameter to ByPass
18-
WAF Protection of Varnish Firewall.
19-
20-
You can tamper with different Parameters, like:
21-
>> X-forwarded-for: TARGET_CACHESERVER_IP (184.189.250.X)
22-
>> X-remote-IP: TARGET_PROXY_IP (184.189.250.X)
23-
>> X-originating-IP: TARGET_LOCAL_IP (127.0.0.1)
24-
>> x-remote-addr: TARGET_INTERNALUSER_IP (192.168.1.X)
25-
>> X-remote-IP: * or %00 or %0A
26-
27-
http://h30499.www3.hp.com/t5/Fortify-Application-Security/Bypassing-web-application-firewalls-using-HTTP-headers/ba-p/6418366
28-
17+
Append a HTTP Request Parameter to bypass
18+
WAF Protection of Varnish Firewall
19+
20+
Notes:
21+
Reference: http://h30499.www3.hp.com/t5/Fortify-Application-Security/Bypassing-web-application-firewalls-using-HTTP-headers/ba-p/6418366
22+
23+
Examples:
24+
>> X-forwarded-for: TARGET_CACHESERVER_IP (184.189.250.X)
25+
>> X-remote-IP: TARGET_PROXY_IP (184.189.250.X)
26+
>> X-originating-IP: TARGET_LOCAL_IP (127.0.0.1)
27+
>> x-remote-addr: TARGET_INTERNALUSER_IP (192.168.1.X)
28+
>> X-remote-IP: * or %00 or %0A
2929
"""
3030

3131
headers = kwargs.get("headers", {})

0 commit comments

Comments
 (0)