Submit #687568: jameschz Hush 2.0 Improper Neutralization of HTTP Headers for Scripting Syntaxinfo

Titeljameschz Hush 2.0 Improper Neutralization of HTTP Headers for Scripting Syntax
Beschreibung$_SERVER['HOST'] is populated from the HTTP Host header submitted by the client. When the application uses this value directly to build absolute URLs, generate links in emails, or reflect it into HTML responses, an attacker can supply an arbitrary Host header and achieve a range of impacts
Quelle⚠️ https://github.com/lakshayyverma/CVE-Discovery/blob/main/hush.md
Benutzer
 lakshay12311 (UID 91298)
Einreichung02.11.2025 13:19 (vor 6 Monaten)
Moderieren19.11.2025 17:55 (17 days later)
StatusAkzeptiert
VulDB Eintrag332978 [jameschz Hush Framework 2.0 HTTP Host Header Util.php $_SERVER['HOST']]
Punkte18

Interested in the pricing of exploits?

See the underground prices here!