HTTP header injection

Web application security vulnerability
HTTP
  • Persistence
  • Compression
  • HTTPS
  • QUIC
Request methods
  • OPTIONS
  • GET
  • HEAD
  • POST
  • PUT
  • DELETE
  • TRACE
  • CONNECT
  • PATCH
Header fields
  • Cookie
  • ETag
  • Location
  • HTTP referer
  • DNT
  • X-Forwarded-For
Response status codes
Security access control methods
Security vulnerabilities
  • v
  • t
  • e

HTTP header injection is a general class of web application security vulnerability which occurs when Hypertext Transfer Protocol (HTTP) headers are dynamically generated based on user input. Header injection in HTTP responses can allow for HTTP response splitting, session fixation via the Set-Cookie header, cross-site scripting (XSS), and malicious redirect attacks via the location header.

Sources

  • File Download Injection
  • OWASP HTTP request Splitting
  • OWASP Testing for HTTP Splitting/Smuggling
  • HTTP Smuggling in 2015

See also

References


Stub icon

This World Wide Web–related article is a stub. You can help Wikipedia by expanding it.

  • v
  • t
  • e