CAPEC-34: HTTP Response Splitting
An adversary manipulates and injects malicious content, in the form of secret unauthorized HTTP responses, into a single HTTP response from a vulnerable or compromised back-end HTTP agent (e.g., web server) or into an already spoofed HTTP response from an adversary controlled domain/site. See CanPrecede relationships for possible consequences.
Severity
High
Likelihood
Medium
5
/ 100
low-risk
Active Threat
4/50 · Minimal
Exploit Availability
1/50 · Minimal