HTTP header injection
Appearance
From Wikipedia, the free encyclopedia
Web application security vulnerability
This article has an unclear citation style . The references used may be made clearer with a different or consistent style of citation and footnoting. (March 2024) (Learn how and when to remove this message)
| HTTP |
|---|
| Request methods |
| Header fields |
| Response status codes |
| Security access control methods |
| Security vulnerabilities |
HTTP header injection is a general class of web application security vulnerability which occurs when Hypertext Transfer Protocol (HTTP) headers are dynamically generated based on user input. Header injection in HTTP responses can allow for HTTP response splitting, session fixation via the Set-Cookie header, cross-site scripting (XSS), and malicious redirect attacks via the location header. XSS attacks can be blocked with the use of an extension such as NoScript or Malwarebytes Browser Guard on your browser.
Sources
[edit ]- File Download Injection
- OWASP HTTP request Splitting
- OWASP Testing for HTTP Splitting/Smuggling
- HTTP Smuggling in 2015
- NoScript Official Website
See also
[edit ]References
[edit ]
Stub icon
This World Wide Web–related article is a stub. You can help Wikipedia by expanding it.