diff --git a/src/main/java/org/sasanlabs/service/vulnerability/jwt/JWTVulnerability.java b/src/main/java/org/sasanlabs/service/vulnerability/jwt/JWTVulnerability.java index 575f6e0e..82000799 100644 --- a/src/main/java/org/sasanlabs/service/vulnerability/jwt/JWTVulnerability.java +++ b/src/main/java/org/sasanlabs/service/vulnerability/jwt/JWTVulnerability.java @@ -673,8 +673,7 @@ private ResponseEntity> getJWTResponseB value = LevelConstants.LEVEL_13, htmlTemplate = "LEVEL_13/HeaderInjection_Level13" ) - public ResponseEntity> getHeaderInjectionVulnerability( - HttpServletRequest request) { + public ResponseEntity> getHeaderInjectionVulnerability(HttpServletRequest request) { String headerValue = request.getHeader("User-Defined-Header"); if (headerValue != null && headerValue.contains("malicious")) { return new ResponseEntity<>( @@ -688,4 +687,5 @@ public ResponseEntity> getHeaderInjecti ); } + }