HTTP header injection

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by Materialscientist (talk | contribs) at 09:12, 25 July 2016 (Reverted 1 edit by 36.253.255.241 identified as test/vandalism using STiki). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

HTTP header injection is a general class of web application security vulnerability which occurs when Hypertext Transfer Protocol (HTTP) headers are dynamically generated based on user input. Header injection in HTTP responses can allow for HTTP response splitting, Session fixation via the Set-Cookie header, cross-site scripting (XSS), and malicious redirect attacks via the location header. HTTP header injection is a relatively new area for web-based attacks, and has primarily been pioneered by Amit Klein in his work on request/response smuggling/splitting.[1]

Sources

Tools

References

  1. ^ Linhart, Klein, Heled, and Orrin: HTTP Request Smuggling, 2005, Watchfire Corporation. Retrieved on 22 December 2015