v1.2.0-security-fix
tagged this
07 Oct 15:44
Due to implementation of how the ip of the client is obtained it is very easy for an attacker to authenticate its ip by setting the ip in the 'Host' header or as first ip in the 'X-Forwarded-For' header