Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:25517
HistoryMay 29, 2020 - 3:43 a.m.

HTTP Response Splitting

2020-05-2903:43:28
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
11

0.062 Low

EPSS

Percentile

93.6%

kallithea is vulnerable to HTTP Response Splitting. It is possible because it does not escape the user-provided input from GET ‘came_from’ parameter in the login instance, allowing an attacker to inject malicious HTTP headers to control the remaining headers and body of the response of the application and to create additional responses entirely under their control.

CPENameOperatorVersion
kallitheale0.2.99-pre