CodeAnt AI home pagelight logodark logo
  • Dashboard
  • Dashboard
  • Documentation
  • Demo Call with CEO
  • Blog
  • Slack
  • Get Started
    • CodeAnt AI
    • Setup
    • Control Center
    • Pull Request Review
    • IDE
    • Compliance
    • Anti-Patterns
    • Code Governance
    • Infrastructure Security Database
    • Application Security Database
      • Apex
      • Bash
      • C
      • Clojure
      • Cpp
      • Csharp
        • Dotnet-core
        • Dotnet
        • Jwt-dotnet
        • Lang
          • Audit
          • Best practice
          • Correctness
          • Security
          • Security
            • Ad
            • Cryptography
            • Filesystem
            • Http
            • Injections
            • Insecure deserialization
            • Memory
            • Regular expression dos
            • Sqli
            • Ssrf
            • System
            • Xxe
        • Mongo
        • Postgres
        • Razor
      • Dockerfile
      • Elixir
      • Fingerprints
      • Generic
      • Go
      • Html
      • Java
      • Javascript
      • Json
      • Kotlin
      • Ocaml
      • Php
      • Problem-based-packs
      • Python
      • Ruby
      • Rust
      • Scala
      • Solidity
      • Swift
      • Terraform
      • Typescript
      • Yaml
    Security

    Http

    The top level wildcard bindings $PREFIX leaves your application open to security vulnerabilities and give attackers more control over where traffic is routed. If you must use wildcards, consider using subdomain wildcard binding. For example, you can use “*.asdf.gov” if you own all of “asdf.gov”.
    Likelihood: LOW
    Confidence: MEDIUM
    CWE:
    - CWE-706: Use of Incorrectly-Resolved Name or Reference
    OWASP:
    - A01:2021 - Broken Access Control

    FilesystemInjections
    twitterlinkedin
    Powered by Mintlify