Content deleted Content added
fix spacing, double-period |
m spelling - occured->occurred, typo(s) fixed: occurence → occurrence (10) |
||
Line 1:
{{short description|Web security vulnerability}}
{{HTTP}}
'''HTTP Parameter Pollution''' or HPP in short is a vulnerability that occurs due to passing of multiple parameters having same name. There is no [[
==Behaviour==
Line 14:
| ASP/IIS || All occurrences concatenated with a comma || param=val1,val2
|-
| PHP/Apache || Last
|-
| PHP/Zeus || Last
|-
| JSP, Servlet/Apache Tomcat || First
|-
| JSP, Servlet/Oracle Application Server || First
|-
| JSP, Servlet/Jetty || First
|-
| IBM Lotus Domino ||Last occurrence only || param=val2
|-
| IBM HTTP Server || First
|-
| mod_perl,libapreq2/Apache|| First
|-
| Perl CGI/Apache || First
|-
| mod_wsgi (Python)/Apache || First
|-
| Python/Zope || All
|}
<ref name="owasp_hpp" />
|