-
-
Notifications
You must be signed in to change notification settings - Fork 310
Open
Description
Summary
That feature will block host header poisoning attacks.
Basic example
In owasp coraza, The waf will check the valid vhosts and the server names, that can be used in Host: headers if the host header not match those valid vhosts, return 403 and block the request
Motivation
Because of host header poisoning danger can be used to steal password reset token and to bypass security controls and for sophiscated phishing.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels