Property
Languagegeneric
Severitymedium
CWECWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers (‘HTTP Request/Response Splitting’)
OWASPA03:2021 - Injection
Confidence LevelMedium
Impact LevelMedium
Likelihood LevelLow

Description#

User input from a path parameter is being directly added as an HTTP response header without proper validation. This allows attackers to inject special characters, potentially creating new headers or altering the response.

Impact#

If exploited, attackers can perform HTTP response splitting, leading to security issues like cache poisoning, cross-site scripting, or session hijacking. This can compromise user data, allow phishing, or disrupt normal application behavior.