[fix] #659 : Add Host Header Manipulation Test #37
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description
Closes #659
This pull request addresses Issue #659, which involves the addition of a new security test for Host Header Manipulation. The test checks whether an attacker can create or update an entity using this method, and it focuses on specific requirements:
🎯 Requirements:
Filters: Applicable to APIs with GET query parameters or JSON body parameters.
Execution: The test adds or replaces values in HTTP headers:
Validation: If the application responds with an exception trace or error response strings, it is considered a vulnerability.
The new test is structured and designed to verify security against Host Header Manipulation in various scenarios. It aligns with the objectives of Issue #659.
Please review this PR and provide feedback or merge it as appropriate.