A malicious user could use this issue to access internal HTTP(s) servers and in the worst case (ie: aws instance) it could be abuse to get a remote code execution on the victim machine.
This Cyber News was published on www.tenable.com. Publication date: Wed, 20 Dec 2023 08:41:03 +0000