-
Notifications
You must be signed in to change notification settings - Fork 53
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Host header attack #11
Comments
Yes! you are right. However, give me some time to dig into this issue. |
np, cool ;) |
for little help, the request must come from the server origin, not from the host it selfs, thats the trick. host can be faked, server not |
After digging into this issue, If found that, Frameworks like Symphony check first if |
- Exposed(public instead of private) request and response objects of app object. - Update the sequence of loading components in index.php - Assign PUBLIC_ROOT to a more trusted host value to avoid host header attack #11
After this commit 1900ff0, Now, |
I found a secure issue, in index.php line 35 'http://' . Environment::get('HTTP_HOST')
better would be 'http://' . Environment::get('SERVER_NAME') to prevent host header attack
http://www.skeletonscribe.net/2013/05/practical-http-host-header-attacks.html
The text was updated successfully, but these errors were encountered: