Jump to content

HTTP header injection

From Wikipedia, the free encyclopedia
This is the current revision of this page, as edited by Palmiped (talk | contribs) at 10:05, 17 May 2025 (avoid redirect). The present address (URL) is a permanent link to this version.
(diff) ← Previous revision | Latest revision (diff) | Newer revision → (diff)

HTTP header injection is a general class of web application security vulnerability which occurs when Hypertext Transfer Protocol (HTTP) headers are dynamically generated based on user input. Header injection in HTTP responses can allow for HTTP response splitting, session fixation via the Set-Cookie header, cross-site scripting (XSS), and malicious redirect attacks via the location header. XSS attacks can be blocked with the use of an extension such as NoScript or Malwarebytes Browser Guard on your browser.

Sources

[edit]

See also

[edit]

References

[edit]