Skip to content
This repository was archived by the owner on Jan 22, 2024. It is now read-only.

MNT-20202 Improper Neutralization of CRLF Sequences in HTTP Headers#87

Open
LMRob wants to merge 1 commit intoAlfresco:developfrom
LMRob:MNT-20202
Open

MNT-20202 Improper Neutralization of CRLF Sequences in HTTP Headers#87
LMRob wants to merge 1 commit intoAlfresco:developfrom
LMRob:MNT-20202

Conversation

@LMRob
Copy link
Copy Markdown

@LMRob LMRob commented Jan 31, 2019

A function call contains an HTTP response splitting flaw. Writing untrusted input into an HTTP header allows an attacker to manipulate the HTTP response rendered by the browser, leading to cache poisoning and cross-site scripting attacks.

  • encoded user input in site-index.jsp with encodeForURL method from ESAPI

*NOTE: java class is created in alfresco/surf project, branch MNT-20202

A function call contains an HTTP response splitting flaw. Writing untrusted input into an HTTP header allows an attacker to manipulate the HTTP response rendered by the browser, leading to cache poisoning and cross-site scripting attacks.

- encoded user input in site-index.jsp with encodeForURL method from ESAPI

*NOTE: java class is created in alfresco/surf project, branch MNT-20202
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant