SiteShadow
Back to vulnerability library

CWE-113 HTTP Response Splitting

What this means

SiteShadow flagged untrusted input being used in HTTP headers or redirect locations without proper sanitization. Attackers can inject CRLF sequences (\r\n) and potentially add/modify headers.

Why it matters

Attackers can inject CRLF sequences to split responses or set malicious headers.

Safer examples

1) Never put raw user input into headers

Use server-generated values or allowlists.

2) Validate and sanitize header values

Reject values containing \r or \n and enforce allowed character sets.

3) Use framework helpers

Framework response APIs often normalize headers safely; avoid manual header concatenation.

How SiteShadow detects it (high level)

References

---

← Back to Vulnerability Library

Request access View coverage