Recently, there were two security issues discovered in Bugzilla that would fall under the category of
HTTP Response Splitting attacks. Although this is a common issue in web applications, many developers are unaware of it, its consequences, or how to protect their applications from it.
In short, here's what you need to know:
Never allow
(
Read more... )
Comments 8
I am going to blog on a bunch of security issues I found in Google pages - and HTTP response splitting will make an appearance as well. But I am going to write something about how HTTP response splitting can be exploited in redirects.
I was actually pretty surprised to see this kind of vulnerability on google.com - unlike XSS it is easily solved on the API level, so it is typically only seen where web developers are simply ignorant. But ignorance is never the issue when we are talking about Google.
Reply
Yeah, honestly I think that it's just that a large number of developers really are ignorant about it. It's funny, people are aware of the problem when they put together RFC2822 emails, but for some reason they never think about it with HTTP headers--I think because they assume that their HTTP framework will "do the right thing" and convert or forbid the newlines. Even I wasn't aware of the problem until it was reported to us--I thought that CGI.pm would simply handle the situation properly instead of just allowing through all sorts of dangerous input.
-Max
Reply
Reply
I think that overall, what this vuln needs is a LOT more awareness in the developer community.
-Max
Reply
Reply
Reply
Reply
-Max
Reply
Leave a comment