HTTP Parameter Pollution
When different components of an application stack parse duplicate parameters differently, allowing attackers to send conflicting values that pass validation in one layer but execute in another
User Request → Nginx (PHP validation) → Python/Flask API → DatabaseImpact
SSRF: Access internal services, cloud metadataAuth bypass: Privilege escalation, unauthorized accessBusiness logic: Price manipulation, inventory bypassCache poisoning: Serve malicious content to users
How Different Technologies Parse Duplicate Parameters
How Different Technologies Parse Duplicate ParametersPHP
Uses last value (B)
Python/Flask
Uses first value (A)
Node.js/Express
Returns array [A, B]
Java/Tomcat
Uses first value (A)
ASP.NET
Concatenates "A,B"
Last updated