Submeter #687568: jameschz Hush 2.0 Improper Neutralization of HTTP Headers for Scripting Syntaxinformação

Títulojameschz Hush 2.0 Improper Neutralization of HTTP Headers for Scripting Syntax
Descrição$_SERVER['HOST'] is populated from the HTTP Host header submitted by the client. When the application uses this value directly to build absolute URLs, generate links in emails, or reflect it into HTML responses, an attacker can supply an arbitrary Host header and achieve a range of impacts
Fonte⚠️ https://github.com/lakshayyverma/CVE-Discovery/blob/main/hush.md
Utilizador
 lakshay12311 (UID 91298)
Submissão02/11/2025 13h19 (há 6 meses)
Moderação19/11/2025 17h55 (17 days later)
EstadoAceite
Entrada VulDB332978 [jameschz Hush Framework 2.0 HTTP Host Header Util.php $_SERVER['HOST']]
Pontos18

Want to stay up to date on a daily basis?

Enable the mail alert feature now!