File tree Expand file tree Collapse file tree 1 file changed +26
-0
lines changed
python/ql/src/experimental/Security/CWE-113 Expand file tree Collapse file tree 1 file changed +26
-0
lines changed Original file line number Diff line number Diff line change
1
+ <!DOCTYPE qhelp PUBLIC
2
+ "-//Semmle//qhelp//EN"
3
+ "qhelp.dtd">
4
+ <qhelp >
5
+ <overview >
6
+ <p >If an HTTP Header is built using string concatenation or string formatting, and the
7
+ components of the concatenation include user input, a user
8
+ is likely to be able to manipulate the response.</p >
9
+ </overview >
10
+
11
+ <recommendation >
12
+ <p >User input should not be included in an HTTP Header.</p >
13
+ </recommendation >
14
+
15
+ <example >
16
+ <p >In the following example, the code appends a user-provided value into a header.</p >
17
+
18
+ <sample src =" header_injection.py" />
19
+ </example >
20
+
21
+ <references >
22
+ <li >OWASP: <a href =" https://owasp.org/www-community/attacks/HTTP_Response_Splitting" >HTTP Response Splitting</a >.</li >
23
+ <li >Python Security: <a href =" https://python-security.readthedocs.io/vuln/http-header-injection.html" >HTTP header injection</a >.</li >
24
+ <li >SonarSource: <a href =" https://rules.sonarsource.com/python/RSPEC-5167" >RSPEC-5167</a >.</li >
25
+ </references >
26
+ </qhelp >
You can’t perform that action at this time.
0 commit comments