
Product
Rust Support Now in Beta
Socket's Rust support is moving to Beta: all users can scan Cargo projects and generate SBOMs, including Cargo.toml-only crates, with Rust-aware supply chain checks.
host-validation-middleware
Advanced tools
Middleware for validating host headers in requests to protect against DNS rebinding attacks.
Middleware for validating host headers in requests to protect against DNS rebinding attacks.
[!NOTE] DNS rebinding attacks are not effective against HTTPS sites. Since HTTPS is now commonly used for production environments, this middleware is generally unnecessary for production sites.
npm i -D host-validation-middleware # pnpm add -D host-validation-middleware
hostValidationMiddleware
This middleware is compatible with Connect and frameworks like Express that support Connect-style middleware.
import connect from 'connect'
import { hostValidationMiddleware } from 'host-validation-middleware'
const app = connect()
app.use(
hostValidationMiddleware({
// Values starting with `.` will allow all the subdomains under that domain
allowedHosts: ['example.com', '.mydomain.com'],
// Optionally customize the error message:
generateErrorMessage: hostname => `Access denied for host: ${hostname}`,
// Optionally set the error response content type:
errorResponseContentType: 'text/plain'
})
)
app.use((req, res) => {
res.end('Hello, world!')
})
app.listen(3000, () => {
console.log('Server running on http://localhost:3000')
})
isHostAllowed
You can also use the core host validation logic directly:
import { isHostAllowed } from 'host-validation-middleware'
const allowedHosts = ['example.com', '.mydomain.com']
console.log(isHostAllowed('example.com', allowedHosts)) // true
console.log(isHostAllowed('sub.mydomain.com', allowedHosts)) // true
console.log(isHostAllowed('evil.com', allowedHosts)) // false
The host names listed in the allowedHosts
options will be allowed.
If the host name starts with a dot, the domain without the dot and any subdomain of it will be allowed.
allowedHosts: ['example.com', '.mydomain.com']
:
example.com
are allowed.mydomain.com
, foo.mydomain.com
, bar.foo.mydomain.com
are also allowed.Also the following hosts that cannot be used for DNS rebinding attacks are always allowed:
localhost
or subdomain of localhost
(e.g., localhost
, foo.localhost
)127.0.0.1
, [::1]
)file:
or browser extension protocolFAQs
Middleware for validating host headers in requests to protect against DNS rebinding attacks.
The npm package host-validation-middleware receives a total of 4,529 weekly downloads. As such, host-validation-middleware popularity was classified as popular.
We found that host-validation-middleware demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Product
Socket's Rust support is moving to Beta: all users can scan Cargo projects and generate SBOMs, including Cargo.toml-only crates, with Rust-aware supply chain checks.
Product
Socket Fix 2.0 brings targeted CVE remediation, smarter upgrade planning, and broader ecosystem support to help developers get to zero alerts.
Security News
Socket CEO Feross Aboukhadijeh joins Risky Business Weekly to unpack recent npm phishing attacks, their limited impact, and the risks if attackers get smarter.