CAPEC-34: HTTP Response Splitting

An adversary manipulates and injects malicious content, in the form of secret unauthorized HTTP responses, into a single HTTP response from a vulnerable or compromised back-end HTTP agent (e.g., web server) or into an already spoofed HTTP response from an adversary controlled domain/site. See CanPrecede relationships for possible consequences.

Severity
High
Likelihood
Medium
5
/ 100
low-risk
Active Threat 4/50 · Minimal
Exploit Availability 1/50 · Minimal