Soumettre #687568: jameschz Hush 2.0 Improper Neutralization of HTTP Headers for Scripting Syntaxinformation

Titrejameschz Hush 2.0 Improper Neutralization of HTTP Headers for Scripting Syntax
Description$_SERVER['HOST'] is populated from the HTTP Host header submitted by the client. When the application uses this value directly to build absolute URLs, generate links in emails, or reflect it into HTML responses, an attacker can supply an arbitrary Host header and achieve a range of impacts
La source⚠️ https://github.com/lakshayyverma/CVE-Discovery/blob/main/hush.md
Utilisateur
 lakshay12311 (UID 91298)
Soumission02/11/2025 13:19 (il y a 6 mois)
Modérer19/11/2025 17:55 (17 days later)
StatutAccepté
Entrée VulDB332978 [jameschz Hush Framework 2.0 HTTP Host Header Util.php $_SERVER['HOST']]
Points18

Do you need the next level of professionalism?

Upgrade your account now!