Content Spoofing or Text Injection in (403 forbidden page injection) and Nginx version disclosure via response header
Low
U
Ubiquiti Inc.
Submitted None
Actions:
Reported by
demo--hacker
Vulnerability Details
Technical details and impact analysis
### Hello there,
I know that this is Non-critical issue but i want you guys to be aware of it.
###1.) I have found a Content Spoofing or Text Injection in This url [http://dl-origin.ubnt.com/](http://dl-origin.ubnt.com/)
Go to this url [http://dl-origin.ubnt.com/has%20been%20changed%20by%20a%20new%20one%20https://www.ATTACKER.com%20so%20go%20to%20the%20new%20one%20since%20this%20one](http://dl-origin.ubnt.com/has%20been%20changed%20by%20a%20new%20one%20https://www.ATTACKER.com%20so%20go%20to%20the%20new%20one%20since%20this%20one)
See the text injection in the attached picture {F157352}
See text injection similar reports here #134388
###2.) I have noticed in the response header of [https://www.ubnt.com/](https://www.ubnt.com/) shows Ngnix server version!
As you can see in the attached picture {F157353}
### Impact
An attacker can be used this for further analyzation of the target application.
###-It is a good practice not to disclose your Ngnix server version.
See server version disclosure similar reports here #179217 #183245 #141125
Thanks for taking the time to read my reports.
Regards,
###Rey Mark
Report Details
Additional information and metadata
State
Closed
Substate
Informative
Submitted
Weakness
Violation of Secure Design Principles