You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We already validate request targets and headers to prevent this kind of nonsense, but AFAICT we don't actually validate request methods.
It seems very unlikely that most people are allowing attacker-controlled input into their HTTP methods. Methods are hard-coded like 99.999% of the time. But given that we're already validating everything else, we might as well validate this too just to make sure.
The text was updated successfully, but these errors were encountered:
Twisted recently did a CVE fix for CRLF injection in methods and request targets: https://twistedmatrix.com/trac/ticket/9647
We already validate request targets and headers to prevent this kind of nonsense, but AFAICT we don't actually validate request methods.
It seems very unlikely that most people are allowing attacker-controlled input into their HTTP methods. Methods are hard-coded like 99.999% of the time. But given that we're already validating everything else, we might as well validate this too just to make sure.
The text was updated successfully, but these errors were encountered: