This technique builds upon the scenario that user-supplied data is inserted into the headers of an HTTP response message.
GET /redirect%0aX-Test:%20foo_test HTTP/1.0
HTTP/1.1 302 Found Date: Fri, 05 Mar 2004 16:41:31 GMT Server: Apache/1.3.29 Location: http://foo.com/redirect X-Test-Header: foo_test
Here are the vulnerability requirements. 1) User-supplied data is inserted in the headers of an HTTP Response 2) User input is unescaped.
The results could have the ability to poison the cache in an intermediary device or a web browser.