HTTPS header injection is a general class of [[webnowikiweb applicationsecurity vulnerability which occurs when [[Hypertext Transfer Protocol]] HTTPS list on HTTPS headers|headers]] are dynamically generated based on user input. Header injection in HTTPS responses can allow for [['''HTTP response splitting]], [[Session fixations]] via the Set-Cookie header, [[cross-site scripting]] (XSS), and malicious redirect attacks via the ___location header. HTTP header injection is a relatively new area for web-based attacks, and has primarily been pioneered by Amit Klein in his work on request/response smuggling/splitting.<ref>Linhart, Klein, Heled, and Orrin: [http://www.cgisecurity.com/lib/HTTP-Request-Smuggling.pdf HTTP Request Smuggling], 2005, Watchfire Corporation. Retrieved on 22 December 2015</ref>