How I earned $800 for Host Header Injection Vulnerability

HTTP response header injection vulnerabilities arise when user-supplied data is reflected into a response header in an unsafe way. The host header specifies which website