HTTP Verb Tampering

Vulnerability Details

Severity:

Medium

Category:

Web Application

Description

The application or its access controls respond differently to various HTTP methods, allowing attackers to bypass restrictions by changing the request method.

Risks

An attacker could bypass authentication or authorization mechanisms by using alternative HTTP methods such as HEAD, PUT, DELETE, or PATCH to access restricted endpoints.

Remediation

Implement access controls that apply consistently across all HTTP methods. Explicitly define allowed methods for each endpoint. Return 405 Method Not Allowed for unsupported methods. Avoid method-based security logic.