Home / Vulnerability Database / Python : HTTP header manipulation (cookies)
Python
Python : HTTP header manipulation (cookies)
Classification
OWASP Top 10 2013
OWASP Top 10 2017
OWASP Top 10 2021
PCI DSS 4.0
Overview
The application includes data from an untrusted source into cookie. This leads to cache poisoning, XSS, page hijacking, and other types of attacks.
In conjunction with the cross-site scripting vulnerability allows an attacker to modify, extend, and even rewrite the user’s cookie. Since cookies are set in the header of HTTP response, absence of validation of data included into the cookie can also lead to HTTP response splitting attack.
Client side code injection attacks take the first place in the “OWASP Top 10 2017” web application vulnerabilities ranking. The level of potential damage from such an attack depends on the user input validation performance and file protection mechanisms.
References
- OWASP Top 10 2017-A1-Injection
- OWASP Top 10 2017-A6-Security Misconfiguration
- OWASP Top 10 2013-A1-Injection
- CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers (‘HTTP Response Splitting’)
- OWASP: HTTP Response Splitting
- Cookie - HTTP state management
- http.cookies - HTTP state management
- CWE-20
- CWE CATEGORY: OWASP Top Ten 2017 Category A1 - Injection
MEDIUM
DerScanner Severity Score
Do you want to fix Python : HTTP header manipulation (cookies) in your application?
See also
Python
Python : Debug mode on
Python
Python : Web3: Deprecated method
Python
