Skip to main content
Solved

Question of the day 13/09, Cybersecurity Edition


marcofabbri
Forum|alt.badge.img+13

Day 11

What type of webserver attack adds more data to the response header sent to client browser?

  • DNS Poisoning
  • Cross Site Scripting
  • Path Traversal
  • SOAP attack
  • HTTP response splitting

Best answer by mkevenaar

HTTP response splitting

View original
Did this topic help you find an answer to your question?

6 comments

mkevenaar
Forum|alt.badge.img+15
  • Veeam Vanguard
  • 149 comments
  • Answer
  • September 14, 2022

HTTP response splitting


Mildur
Forum|alt.badge.img+12
  • Influencer
  • 1035 comments
  • September 14, 2022

I believe „Cross Site Scripting“.

The other names doesn‘t make sense to me :)


JMeixner
Forum|alt.badge.img+17
  • On the path to Greatness
  • 2650 comments
  • September 14, 2022

HTTP response splitting

With this more data is added to a HTTP response header


dips
Forum|alt.badge.img+7
  • Veeam Legend
  • 808 comments
  • September 14, 2022

HTTP Response Splitting


Chris.Childerhose
Forum|alt.badge.img+21
  • Veeam Legend, Veeam Vanguard
  • 8512 comments
  • September 14, 2022

HTTP Response Splitting


marcofabbri
Forum|alt.badge.img+13
  • Author
  • On the path to Greatness
  • 990 comments
  • September 14, 2022

HTTP response splitting is the good one!

By inserting, in the right place in the header of the HTTP response, some carriage return (\r) and a linefeed (\n), client will process the packet in a different way as it conceived.

Here’s an example: