Injection: CRLF Injection¶
Identifier:
frontend_crlf
Scanner(s) Support¶
| GraphQL Scanner | REST Scanner | WebApp Scanner | ASM Scanner |
|---|---|---|---|
Description¶
CRLF injection vulnerabilities occur when attackers can inject carriage return and newline characters into HTTP headers, potentially allowing them to craft malicious headers or split responses.
How we test: We inject CRLF sequences (\r\n) into request parameters that may be reflected in HTTP headers or responses. We analyze responses to detect if CRLF injection can be used to manipulate headers or split HTTP responses, which could lead to response splitting attacks.
References:
Configuration¶
Example¶
Example configuration:
Reference¶
skip¶
Type : boolean
Skip the test if true.