-
Notifications
You must be signed in to change notification settings - Fork 193
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CLRF : Web Vulnerability #652
Comments
@Ankita28g - CRLF blog |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
CRLF injection is a web application security vulnerability that allows an attacker to inject carriage return (CR) and line feed (LF) characters into an HTTP request or response. This can be used to modify the request or response in unexpected ways, which can lead to a variety of security attacks, including:
How to find CRLF vulnerabilities:
There are a number of ways to find CRLF vulnerabilities, including:
Here are some specific steps you can follow to test for CRLF vulnerabilities:
If you find a CRLF vulnerability in a web application, you should report it to the application's developers so that they can fix it.
How to prevent CRLF vulnerabilities:
There are a number of things that web application developers can do to prevent CRLF vulnerabilities, including:
By following these steps, web application developers can help to protect their applications from CRLF injection attacks.
The text was updated successfully, but these errors were encountered: