This vulnerability occurs when an application fails to properly sanitize or escape user-controlled data placed within HTTP response headers. Malicious scripting syntax can then be injected and executed by client-side components like Flash that process raw headers.
Attackers can exploit this weakness to launch cross-site scripting (XSS) attacks against users. When a browser or plugin processes a tainted HTTP header, embedded scripts run within the victim's browser context, potentially stealing session cookies, defacing websites, or performing actions on the user's behalf. Preventing this requires strict validation and encoding of all data before it is inserted into any HTTP response header, not just the body. Developers must account for various encoding schemes attackers might use to bypass filters. This control is essential for blocking both XSS and related HTTP response splitting attacks.
Impact: Execute Unauthorized Code or Commands
Run arbitrary code.
Impact: Read Application Data
Attackers may be able to obtain sensitive information.
javaHigh