Respons Splitting via CRLF
Response Splitting via CRLF
Overview of the Vulnerability
Response splitting via Carriage Return Line Feed (CRLF) is a vulnerability that exploits the way HTTP headers parse certain characters such as and . Appending these characters to HTTP headers can allow the insertion of payloads into a header which can result in the manipulation of cookies, server information, and status codes.
This application is vulnerable to response splitting, which an attacker can abuse to write data into the HTTP response body. From here, an attacker could insert their own session cookies to user session, append HTML to run code within a user's browser, or possibly cause a redirect to a website under their control.
Business Impact
Response splitting can lead to reputational damage for the business due to a loss in confidence and trust by users.
Steps to Reproduce
Enable a HTTP interception proxy, such as Burp Suite or OWASP ZAP
Use a browser to navigate to: {{URL}}
{{action}} and intercept the request in a the HTTP interception proxy
Insert the following payload to {{parameter}}: {{value}}
Proof of Concept (PoC)
The screenshot(s) below demonstrates the response splitting:
{{screenshot}}
Recommendation(s)
It is recommended to properly sanitize the Location header and deny characters such as and .
For more information, please see:
Last updated