Content deleted Content added
→See also: Move link tags to correct ___location Tags: Manual revert Mobile edit Mobile web edit |
avoid redirect |
||
(21 intermediate revisions by 13 users not shown) | |||
Line 1:
{{Short description|Web application security vulnerability}}
{{Citation style|date=March 2024}}
{{HTTP}}
'''HTTP header injection''' is a general class of [[web application]] [[security vulnerability]] which occurs when [[Hypertext Transfer Protocol]] ([[HTTP]]) [[list of HTTP headers|headers]] are dynamically generated based on user input. [[Header (computing)|Header]] injection in HTTP responses can allow for [[HTTP response splitting]], [[
== Sources ==
* [
* [https://www.owasp.org/index.php/HTTP_Response_Splitting OWASP HTTP request Splitting]
* [https://
* [https://regilero.github.io/security/english/2015/10/04/http_smuggling_in_2015_part_one/ HTTP Smuggling in 2015]
* [https://noscript.net NoScript Official Website]
== See also ==
|