Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

MNT-20202 Improper Neutralization of CRLF Sequences in HTTP Headers #5

Open
wants to merge 1 commit into
base: develop
Choose a base branch
from

Conversation

LMRob
Copy link

@LMRob LMRob commented Jan 31, 2019

('HTTP Response Splitting') CWE ID 113

A function call contains an HTTP response splitting flaw. Writing untrusted input into an HTTP header allows an attacker to manipulate the HTTP response rendered by the browser, leading to cache poisoning and cross-site scripting attacks.

  • encode cookie with ESAPI lib
  • encode header with ESAPI lib
  • created a java class with a static method to remove all invalid characters (CRLF)

…'HTTP Response Splitting') CWE ID 113

A function call contains an HTTP response splitting flaw. Writing untrusted input into an HTTP header allows an attacker to manipulate the HTTP response rendered by the browser, leading to cache poisoning and cross-site scripting attacks.

- encode cookie with ESAPI lib
- encode header with ESAPI lib
- created a java class with a static method to remove all invalid characters (CRLF)
@LMRob LMRob changed the title MNT-20202 Improper Neutralization of CRLF Sequences in HTTP Headers (… MNT-20202 Improper Neutralization of CRLF Sequences in HTTP Headers Jan 31, 2019
@astrachan astrachan requested a review from alexbalmus February 25, 2019 10:42
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant