CAPEC 34 HTTP Response Splitting

Stable Detailed Medium Risk
Severity High

Description

{'xhtml:p': ['An adversary manipulates and injects malicious content, in the form of secret unauthorized HTTP responses, into a single HTTP response from a vulnerable or compromised back-end HTTP agent (e.g., web server) or into an already spoofed HTTP response from an adversary controlled domain/site.', 'See CanPrecede relationships for possible consequences.']}

Attack Execution Flow

4

Mitigations

10

Consequences

Indicators

1

Relationships

Resources Required

1