We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 6b3da7f commit 205b175Copy full SHA for 205b175
modules/auxiliary/scanner/http/host_header_injection.rb
@@ -54,11 +54,11 @@ def run_host(target_host)
54
if res.headers =~ /#{p}/ || res.body =~ /#{p}/
55
print_good("#{peer} is vulnerable to HTTP Host-Header Injection")
56
report_vuln(
57
- :host: rhost,
58
- :port: rport,
59
- :proto: 'tcp',
60
- :sname: (ssl ? 'https' : 'http'),
61
- :info: "Vulnerable to HTTP Host-Header Injection",
+ host: rhost,
+ port: rport,
+ proto: 'tcp',
+ sname: (ssl ? 'https' : 'http'),
+ info: "Vulnerable to HTTP Host-Header Injection",
62
)
63
else
64
vprint_error("#{peer} returned #{res.code} #{res.message}")
0 commit comments