CRLF
Description
CRLF occurs when an attacker can abuse the carriage return character (\r) and a newline character (\n) in an HTTP request in order to inject new headers or a new body for the HTTP request. This attack is a very dangerous attack as it can give the attacker the ability to create whatever request he wants.
Remediation
The only way to prevent CRLF attacks is to carefully sanitize every message that is sent by the client.
Configuration
CheckId:
http/crlf
Examples
Ignoring this check
{
"checks": {
"http/crlf": {
"skip": true
}
}
}
Score
- Escape Severity: MEDIUM
- OWASP: A08:2019
- PCI DSS: 6.5.1
- CWE
- 93
- 113
CVSS
- CVSS_VECTOR: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
- CVSS_SCORE: 5.1
References
http://www.watchfire.com/resources/HTTPResponseSplitting.pdf