![]() If header values from a malicious client are passed to the backend server unchecked and unchanged, the client may be able to subvert security checks done by the backend server. |
||
---|---|---|
.. | ||
web.nginx-proxy.tld.crt | ||
web.nginx-proxy.tld.key |
![]() If header values from a malicious client are passed to the backend server unchecked and unchanged, the client may be able to subvert security checks done by the backend server. |
||
---|---|---|
.. | ||
web.nginx-proxy.tld.crt | ||
web.nginx-proxy.tld.key |