HTTP header injection: Difference between revisions

Content deleted Content added
HTTPS
Tags: Reverted Mobile edit Mobile web edit
avoid redirect
 
(20 intermediate revisions by 13 users not shown)
Line 1:
{{Short description|Web application security vulnerability}}
HTTPS header injection is a general class of [[web applicationsecurity vulnerability which occurs when [[Hypertext Transfer Protocol]] HTTPS list on HTTPS headers|headers]] are dynamically generated based on user input. Header injection in HTTPS responses can allow for [[HTTP response splitting]], [[Session fixation]] via the Set-Cookie header, [[cross-site scripting]] (XSS), and malicious redirect attacks via the ___location header. HTTP header injection is a relatively new area for web-based attacks, and has primarily been pioneered by Amit Klein in his work on request/response smuggling/splitting.<ref>Linhart, Klein, Heled, and Orrin: [http://www.cgisecurity.com/lib/HTTP-Request-Smuggling.pdf HTTP Request Smuggling], 2005, Watchfire Corporation. Retrieved on 22 December 2015</ref>
{{Citation style|date=March 2024}}
{{HTTP}}
HTTPS '''HTTP header injection''' is a general class of [[web applicationsecurityapplication]] [[security vulnerability]] which occurs when [[Hypertext Transfer Protocol]] HTTPS([[HTTP]]) [[list onof HTTPSHTTP headers|headers]] are dynamically generated based on user input. [[Header (computing)|Header]] injection in HTTPSHTTP responses can allow for [[HTTP response splitting]], [[Sessionsession fixation]] via the Set-[[HTTP cookie|Cookie]] header, [[cross-site scripting]] (XSS), and malicious redirect attacks via the ___location header. HTTP header injection is a relatively new area for web-based[[XSS]] attacks, andcan hasbe primarilyblocked beenwith pioneeredthe byuse Amitof Kleinan in[[Browser hisextension|extension]] worksuch on request/response smuggling/splitting.<ref>Linhart, Klein, Heled, and Orrin:as [http://www.cgisecurity.com/lib/HTTP-Request-Smuggling.pdf HTTP Request Smuggling[NoScript]], 2005,or WatchfireMalwarebytes Corporation.Browser RetrievedGuard on 22your December[[Web 2015</ref>browser|browser]].
 
== Sources ==
* [httphttps://listsdl.webappsecpacketstormsecurity.orgnet/pipermailpapers/websecurity_lists.webappsec.org/2008-Aprilattack/003692Aspect_File_Download_Injection.htmlpdf File Download Injection]
* [https://www.owasp.org/index.php/HTTP_Response_Splitting OWASP HTTP request Splitting]
* [https://www.owasp.org/index.phpwww-project-web-security-testing-guide/Testing_for_HTTP_Splittinglatest/Smuggling_%28OTG4-INPVALWeb_Application_Security_Testing/07-Input_Validation_Testing/15-016%29Testing_for_HTTP_Splitting_Smuggling OWASP Testing for HTTP Splitting/Smuggling]
* [https://regilero.github.io/security/english/2015/10/04/http_smuggling_in_2015_part_one/ HTTP Smuggling in 2015]
* [https://noscript.net NoScript Official Website]
 
== See also ==