|This article needs additional citations for verification. (March 2008)|
In HTTP networking, typically on the World Wide Web, referer spoofing (based on a canonised misspelling of "referrer") is the sending of incorrect referer information in an HTTP request in order to prevent a website from obtaining accurate data on the identity of the web page previously visited by the user.
To improve their privacy, individual browser users may replace accurate referer data with inaccurate data, though many simply suppress their browser's sending of any referer data. Sending no referrer information is not technically spoofing, though sometimes also described as such. Users may also modify other HTTP headers.
In software, systems and networks testing, referer spoofing is often just part of a larger procedure of transmitting both accurate and inaccurate and both expected and unexpected input to the HTTPD system being tested and observing the results.
While many web sites are configured to gather referer information and serve different content depending on the referer information obtained, exclusively relying on HTTP referer information for authentication and authorization purposes is not a genuine state of the art computer security measure. HTTP referer information is freely alterable and interceptable, and is not a password, though some poorly configured systems treat it as such. Nevertheless, it is sometimes contended[by whom?] that referer spoofing was not legitimate and/or constituted unauthorized access. As a vast majority of users don't change defaults, referer protection is useful regardless of the few who have the knowledge of how to break it.
Some websites, especially many image hosting sites, utilise referer information to secure their materials: only browsers arriving from their web pages are served images. Additionally a site may want users to click through pages with advertising content before directly being able to access a downloadable file — using the referring page or referring site information can help a site redirect unauthorized users to the landing page the site would like to use.
If attackers acquire knowledge of these approved referers, which is often trivial because many sites follow a common template, they can use that information combined with this exploit to gain free access to the materials.
Spoofing often allows access to a site's content where the site's web server is configured to block browsers that do not send referer headers. Website owners may do this to disallow hotlinking.
It can also be used to defeat referer checking controls that are used to mitigate Cross-Site Request Forgery attacks.
Several software tools exist to facilitate referer spoofing in web browsers. Some are extensions to popular browsers such as Mozilla Firefox or Internet Explorer, which may provide facilities to customise and manage referrer URLs for each website the user visits.
Other tools include proxy servers, to which an individual configures their browser to send all HTTP requests. The proxy then forwards different headers to the intended website, usually removing or modifying the referer header. Such proxies may also present privacy issues for users, as they may log the user's activity.
- The manipulation of other HTTP headers is not referer spoofing, but is a related practice.
- and sometimes penetration testing