Commit b61f840
committed
Update rack permitted hosts to permit all
Permitting all hosts. For PID application this is a low-risk setting.
1. Host header poisoning: Low-Medium risk
- Since you're directly looking up PIDs in your database before redirecting, manipulated host headers won't affect your core
redirection logic
2. Session hijacking: Low risk
- Your PID resolution service likely doesn't rely on complex session states for anonymous users
3. Response header poisoning: Low risk
- Without validation, response headers might include incorrect domains, but impact is minimal for redirections
4. Cache poisoning: Very low risk
- With no CDN and direct AWS ELB routing, cache poisoning vectors are minimal1 parent 2e69daf commit b61f840
2 files changed
+1
-2
lines changed| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
68 | 68 | | |
69 | 69 | | |
70 | 70 | | |
71 | | - | |
| 71 | + | |
72 | 72 | | |
73 | 73 | | |
74 | 74 | | |
| |||
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
5 | 5 | | |
6 | 6 | | |
7 | 7 | | |
8 | | - | |
9 | 8 | | |
10 | 9 | | |
11 | 10 | | |
| |||
0 commit comments