'''HTTP header injection''' is a general class of [[web application]] [[security vulnerability]] which occurs when [[Hypertext Transfer Protocol]] ([[HTTP]]) [[list of HTTP headers|headers]] are dynamically generated based on user input. [[Header (computing)|Header]] injection in HTTP responses can allow for [[HTTP response splitting]], [[Sessionsession fixation]] via the Set-[[HTTP cookie|Cookie]] header, [[cross-site scripting]] (XSS), and malicious redirect attacks via the ___location header. HTTP[[XSS]] headerattacks injectioncan isbe ablocked relativelywith newthe areause forof web-basedan attacks,[[Browser andextension|extension]] hassuch primarilyas been[[NoScript]] pioneeredor byMalwarebytes AmitBrowser Klein in his workGuard on request/response smuggling/splitting.<ref>Linhart, Klein, Heled, and Orrin:your [http://www.cgisecurity.com/lib/HTTP-Request-Smuggling.pdf[Web HTTP Request Smugglingbrowser|browser]], 2005, Watchfire Corporation. Retrieved on 22 December 2015</ref>