SAP Knowledge Base Article - Preview

2570820 - AS Java Security Vulnerability - Unauthorized URL redirect via HTTP host poisoning


An external security vulnerability check tool reports the following issue:

Application using virtual host and load balancer identifies request by their host header. Server is assigned to single IP address that may host multiple websites. When request comes to server it will redirect to different websites by identifying request from host field. Thus, must validate host header before redirect to websites. In shared hosting environments, it is possible to use this attack to force your browser to grab resources from another virtual host on the same server. A client must include a Host header field in all HTTP/1.1 request messages. If the requested URI does not include an Internet host name for the service being requested, then the Host header field must be given with an empty value. Any HTTP/1.1 request without host header field must be responded by server with 400(bad request) status code.



AS Java all versions.


SAP NetWeaver Application Server for Java all versions ; SAP NetWeaver all versions


security vulnerability, icm/HTTP/allow_invalid_host_header=FALSE, icm/HTTP/allow_invalid_host_header=TRUE, allow_invalid_host_header, icm, kernel, kernel patch, RFC 7230, HTTP standard RFC 7230, host header, host header attack, Host header poisoning, 400(bad request) status code, 400(bad request), Unauthorized URL redirect, HTTP host poisoning, Unauthorized URL, instance profile , KBA , BC-CST-IC , Internet Communication Manager , BC-JAS-SEC , Security, User Management , BC-JAS-SEC-WSS , Web Services Security , BC-JAS-WEB , Web Container, HTTP, JavaMail, Servlets , Problem

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.