HTTP header injection

This is an old revision of this page, as edited by 2806:103e:e:4ec4:59ac:6927:8a7d:dbc0 (talk) at 05:02, 5 May 2021. The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

HTTPS header injection is a general class of nowikiweb applicationsecurity vulnerability which occurs when Hypertext Transfer Protocol HTTPS list on HTTPS are dynamically generated based on user input. Header injection in HTTPS responses can allow for HTTP response s]] via the Set-Cookie header, malicious redirect attacks via the ___location header. HTTP header injection is a relatively new area for web-based attacks, and has primarily been pioneered by Amit Klein in his work on request/response smuggling/splitting.[1]

Sources

See also

References

  1. ^ Linhart, Klein, Heled, and Orrin: HTTP Request Smuggling, 2005, Watchfire Corporation. Retrieved on 22 December 2015