HTTP header injection: Difference between revisions

Content deleted Content added
No edit summary
avoid redirect
 
(45 intermediate revisions by 34 users not shown)
Line 1:
{{Short description|Web application security vulnerability}}
{{Citation style|date=March 2024}}
{{HTTP}}
'''HTTP header injection''' is a general class of [[web application]] [[security vulnerability]] which occurs when [[Hypertext Transfer Protocol]] ([[HTTP]]) [[list of HTTP headers|headers]] are dynamically generated based on user input. [[Header (computing)|Header]] injection in HTTP responses can allow for [[HTTP response splitting]] (also known as CRLF – Carriage Return Line Feed), [[Sessionsession fixation]] via the Set-[[HTTP cookie|Cookie]] header, [[cross-site scripting]] (XSS), and malicious redirect attacks via the ___location header. HTTP header injection is a relatively new area for web-based[[XSS]] attacks, andcan hasbe primarilyblocked beenwith pioneeredthe byuse Amitof Kleinan in[[Browser his work on request/response smuggling/splitting. Vulnerabilities due to HTTP header injectionsextension|extension]] such as CRLF[[NoScript]] areor noMalwarebytes longerBrowser feasibleGuard dueon toyour the[[Web fact that multiple header requests are not possiblebrowser|browser]].
'''By Maotora Manyama'''
 
== Sources ==
* [https://dl.packetstormsecurity.net/papers/attack/Aspect_File_Download_Injection.pdf File Download Injection]
* [http://lists.grok.org.uk/pipermail/full-disclosure/2006-February/042358.html HTTP Response Smuggling]{{Citation broken|date=June 2014}}
* [https://www.owasp.org/index.php/HTTP_Response_Splitting OWASP HTTP request Splitting]
* [http://palisade.plynt.com/issues/2006Sep/http-request-smuggling/ HTTP Request Smuggling]
* [https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/07-Input_Validation_Testing/15-Testing_for_HTTP_Splitting_Smuggling OWASP Testing for HTTP Splitting/Smuggling]
* [http://www.webappsec.org/lists/websecurity/archive/2008-04/msg00003.html File Download Injection]
* [https://regilero.github.io/security/english/2015/10/04/http_smuggling_in_2015_part_one/ HTTP Smuggling in 2015]
* [https://noscript.net NoScript Official Website]
 
== ToolsSee also ==
* [[HTTP request smuggling]]
* [http://wapiti.sf.net Wapiti Open Source Header, XSS, SQL and LDAP injection scanner]
 
==References==
{{Reflist}}
 
[[Category:Web security exploits]]
[[Category:Hypertext Transfer Protocol]]
[[Category:Hypertext Transfer Protocol headers]]