Content deleted Content added
Fixed violation Tags: Mobile edit Mobile web edit |
avoid redirect |
||
(34 intermediate revisions by 24 users not shown) | |||
Line 1:
{{Short description|Web application security vulnerability}}
{{Citation style|date=March 2024}}
{{HTTP}}
'''HTTP header injection''' is a general class of [[web application]] [[security vulnerability]] which occurs when [[Hypertext Transfer Protocol]] ([[HTTP]]) [[list of HTTP headers|headers]] are dynamically generated based on user input. [[Header (computing)|Header]] injection in HTTP responses can allow for [[HTTP response splitting]], [[session fixation]] via the Set-[[HTTP cookie|Cookie]] header, [[cross-site scripting]] (XSS), and malicious redirect attacks via the ___location header. [[XSS]] attacks can be blocked with the use of an [[Browser extension|extension]] such as [[NoScript]] or Malwarebytes Browser Guard on your [[Web browser|browser]].
== Sources ==
* [
* [https://www.owasp.org/index.php/
* [https://
* [
* [https://noscript.net NoScript Official Website]
==
* [[HTTP request smuggling]]
==References==
Line 14 ⟶ 18:
[[Category:Web security exploits]]
[[Category:Hypertext Transfer Protocol headers]]
|