I am new to this field and would like to know how the flow happens in a host header injection attacks.
I believe it's as below:
Client generates the request.
Attacker manipulates the request and changes the host header (to say example.com).
Server (abc.com) receives the request and resolves to the manipulated host(here example.com).
If the above were true, does this mean that SSRF is possible using host header as example.com would think request coming from abc.com?
Could you please clarify?