Skip to content

Injection: CRLF Injection

Identifier: frontend_crlf

Scanner(s) Support

GraphQL Scanner REST Scanner WebApp Scanner ASM Scanner

Description

CRLF injection vulnerabilities occur when attackers can inject carriage return and newline characters into HTTP headers, potentially allowing them to craft malicious headers or split responses.

How we test: We inject CRLF sequences (\r\n) into request parameters that may be reflected in HTTP headers or responses. We analyze responses to detect if CRLF injection can be used to manipulate headers or split HTTP responses, which could lead to response splitting attacks.

References:

Configuration

Example

Example configuration:

---
security_tests:
  frontend_crlf:
    skip: false

Reference

skip

Type : boolean

Skip the test if true.