Home / Vulnerability Database / Config files : Host spoofing
Config files
Config files : Host spoofing
Classification
OWASP Top 10 2021
Overview
The application may need to pass the Host header in order to correctly generate various URLs (redirects, resources, links in emails, etc.). The possibility of substitution of such a header makes the application vulnerable.
This is possible as a result of using the \(http_host variable instead of \)host.
LOW
DerScanner Severity Score
Do you want to fix Config files : Host spoofing in your application?
See also
Config files
Config files : Text4Shell Vulnerability
Config files
Config files : Incorrect directory deletion
Config files
