HTTP Header Injection
IntermediateThis redirect endpoint places user input directly into the Location header without sanitizing newlines. Exploit CRLF injection to add a malicious Set-Cookie header, then learn how to prevent it.
Progress:
1
CRLF Header Injection2
Apply Sanitizationapp.example.com/redirect
Redirect Endpoint
The server takes the next parameter and places it into a Location header for a 302 redirect.
HTTP Response
HTTP/1.1 302 Found
Location: /dashboard?next=...
Content-Type: text/html