An external security vulnerability check tool reports the following issue:
Application using virtual host and load balancer identifies request by their host header. Server is assigned to single IP address that may host multiple websites. When request comes to server it will redirect to different websites by identifying request from host field. Thus, must validate host header before redirect to websites. In shared hosting environments, it is possible to use this attack to force your browser to grab resources from another virtual host on the same server. A client must include a Host header field in all HTTP/1.1 request messages. If the requested URI does not include an Internet host name for the service being requested, then the Host header field must be given with an empty value. Any HTTP/1.1 request without host header field must be responded by server with 400(bad request) status code.
AS Java all versions.
security vulnerability, icm/HTTP/allow_invalid_host_header=FALSE, icm/HTTP/allow_invalid_host_header=TRUE, allow_invalid_host_header, icm, kernel, kernel patch, RFC 7230, HTTP standard RFC 7230, host header, host header attack, 400(bad request) status code, 400(bad request), Unauthorized URL redirect, HTTP host poisoning, Unauthorized URL, instance profile , KBA , BC-JAS-WEB , Web Container, HTTP, JavaMail, Servlets , BC-CST-IC , Internet Communication Manager , BC-JAS-SEC , Security, User Management , BC-JAS-SEC-WSS , Web Services Security , Problem
About this pageThis is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).
Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.