إرسال #687568: jameschz Hush 2.0 Improper Neutralization of HTTP Headers for Scripting Syntaxالمعلومات

عنوانjameschz Hush 2.0 Improper Neutralization of HTTP Headers for Scripting Syntax
الوصف$_SERVER['HOST'] is populated from the HTTP Host header submitted by the client. When the application uses this value directly to build absolute URLs, generate links in emails, or reflect it into HTML responses, an attacker can supply an arbitrary Host header and achieve a range of impacts
المصدر⚠️ https://github.com/lakshayyverma/CVE-Discovery/blob/main/hush.md
المستخدم
 lakshay12311 (UID 91298)
ارسال02/11/2025 01:19 PM (6 أشهر منذ)
الاعتدال19/11/2025 05:55 PM (17 days later)
الحالةتمت الموافقة
إدخال VulDB332978 [jameschz Hush Framework 2.0 HTTP Host Header Util.php $_SERVER['HOST']]
النقاط18

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!