Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CAPEC-105:HTTP Request Splitting
Attack Pattern ID:105
Version:v3.9
Attack Pattern Name:HTTP Request Splitting
Abstraction:Detailed
Status:Stable
Likelihood of Attack:Medium
Typical Severity:High
DetailsContent HistoryRelated WeaknessesReports
4Weaknesses found

CWE-113
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')
ShareView Details
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')
Likelihood of Exploit-Not Available
Mapping-Allowed
Abstraction-Variant
Found in66CVEs

The product receives data from an HTTP agent/component (e.g., web server, proxy, browser, etc.), but it does not neutralize or incorrectly neutralizes CR and LF characters before the data is included in outgoing HTTP headers.

Impacts-
Gain Privileges or Assume IdentityModify Application Data
Tags-
Input ValidationOutput EncodingWeb Based (technology class)Modify Application Data (impact)Gain Privileges or Assume Identity (impact)
As Seen In-
CWE Cross-section
CWE-138
Improper Neutralization of Special Elements
ShareView Details
Improper Neutralization of Special Elements
Likelihood of Exploit-Not Available
Mapping-Discouraged
Abstraction-Class
Found in10CVEs

The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as control elements or syntactic markers when they are sent to a downstream component.

Impacts-
Alter Execution LogicDoS: Crash, Exit, or RestartExecute Unauthorized Code or Commands
Tags-
Input ValidationOutput EncodingExecute Unauthorized Code or Commands (impact)DoS: Crash, Exit, or Restart (impact)Alter Execution Logic (impact)
As Seen In-
Not Available
CWE-436
Interpretation Conflict
ShareView Details
Interpretation Conflict
Likelihood of Exploit-Not Available
Mapping-Allowed-with-Review
Abstraction-Class
Found in76CVEs

Product A handles inputs or steps differently than Product B, which causes A to perform incorrect actions based on its perception of B's state.

Impacts-
Unexpected StateVaries by Context
Tags-
Unexpected State (impact)Varies by Context (impact)
As Seen In-
Simplified Mapping of Published Vulnerabilities
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
ShareView Details
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Likelihood of Exploit-High
Mapping-Discouraged
Abstraction-Class
Found in2961CVEs

The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.

Impacts-
Read Application DataOtherAlter Execution LogicBypass Protection MechanismHide Activities
Tags-
High exploitOther (impact)Bypass Protection Mechanism (impact)Hide Activities (impact)Read Application Data (impact)Alter Execution Logic (impact)
As Seen In-
Simplified Mapping of Published Vulnerabilities