提出 #687568: jameschz Hush 2.0 Improper Neutralization of HTTP Headers for Scripting Syntax情報

タイトルjameschz Hush 2.0 Improper Neutralization of HTTP Headers for Scripting Syntax
説明$_SERVER['HOST'] is populated from the HTTP Host header submitted by the client. When the application uses this value directly to build absolute URLs, generate links in emails, or reflect it into HTML responses, an attacker can supply an arbitrary Host header and achieve a range of impacts
ソース⚠️ https://github.com/lakshayyverma/CVE-Discovery/blob/main/hush.md
ユーザー
 lakshay12311 (UID 91298)
送信2025年11月02日 13:19 (6 月 ago)
モデレーション2025年11月19日 17:55 (17 days later)
ステータス承諾済み
VulDBエントリ332978 [jameschz Hush Framework 2.0 HTTP Host Header Util.php $_SERVER['HOST']]
ポイント18

Do you want to use VulDB in your project?

Use the official API to access entries easily!