Persisted XSS via HTTP Header in OWASP Juice Shop
Learn persisted XSS via HTTP Header by finding and exploiting a vulnerability in OWASP Juice Shop.
Skills You'll Learn

Lab Modules
Lab Overview
Web applications often have hidden vulnerabilities that can be exploited through unexpected inputs or by manipulating HTTP headers. These weaknesses can allow attackers to inject malicious scripts, bypass restrictions, or tamper with displayed content.
Persistent XSS via HTTP Headers involves exploiting unsafely processed user input originating from an HTTP header. The difficulty lies in identifying the specific header reflected in the user interface, especially since the application does not naturally send this header on its own. Once discovered, injecting a malicious script into the header will persist in the application and execute on subsequent requests. This challenge highlights the importance of proper validation and sanitization of HTTP headers to secure web applications against XSS attacks.
Objectives
Upon completion of this lab, you will be able to:
- Understand and exploit Persistent XSS via HTTP Headers to inject and execute malicious scripts.
- Identify uncommon or proprietary HTTP headers used in web applications.
- Use tools like browser developer tools to craft and send malicious HTTP headers.
- Analyze web application vulnerabilities and understand mitigation strategies.
This lab is designed for:
- Security enthusiasts looking to explore and understand persistent XSS vulnerabilities.
- Developers aiming to learn about the risks associated with processing unsanitized HTTP headers.
- Penetration testers and IT professionals practicing advanced XSS exploitation techniques and learning how to secure web applications.
