Security Activity Bulletin

HTTP Response Splitting Attacks

 
Threat Type:IntelliShield: Applied Mitigation Bulletin
IntelliShield ID:16491
Version:2
First Published:2008 August 20 19:33 GMT
Last Published:2008 October 28 22:06 GMT
Port: Not available
Urgency:Unlikely Use
Credibility:Confirmed
Severity:Mild Damage
 
Version Summary:

Additional information is available to describe the HTTP response splitting attacks.

 

Description
 

HTTP response splitting can occur due to the failure of applications to properly sanitize Carriage Return/Line Feed (CRLF) sequences in HTTP headers.  HTTP response splitting allows an attacker to send a single HTTP request that causes the affected web server to form an output response stream that is interpreted by the client as two separate HTTP responses.  The attacker has little control over the first HTTP response, but may fully control the second HTTP response.  The server fails to properly validate the initial request, creating the malformed response as a result.  Hence, applications that are affected by this type of vulnerability do not properly validate these malformed HTTP responses.  This attack method allows for numerous other exploits against web applications.

Exploitation requires the attacker to identify user-controllable input that causes arbitrary HTTP header injections.  The attacker must also have the ability to submit malicious input that contains data to terminate the original HTTP response and initiate a second attacker-controlled response.  This causes the targeted application to send two responses to the web client: one that contains the attacker-supplied response and one that is a nonmalicious response.

HTTP response splitting attacks could allow attackers to perform cross-site scripting attacks.  A cross-site scripting attack could allow an attacker to include and render HTML or execute arbitrary script code in a user's browser in the security context of a vulnerable web application.  The attacker could obtain sensitive information associated with the browser session, such as authentication cookies or recently submitted data.

Attacks could also include cross-user defacement, which is a temporary defacement that causes a website to appear defaced to the targeted user.  Attackers could hijack web pages to obtain sensitive information, which is a common phishing technique.  Attackers could also poison web caches, including individual browser caches or multiuser caching proxy systems, which may aid in spoofing or phishing attacks against multiple users.

To mitigate HTTP response splitting attacks, administrators should implement positive input sanitization in which only those characters that are specifically expected and permitted are allowed.  In situations in which positive filtering is not possible, negative input sanitization techniques should filter CRLF sequences except where they are expected.


Signatures
 
Cisco Intrusion Prevention System (IPS) 6.0
Signature IDSignature NameReleaseLatest Release Date
7212/0Web Application Security Test/AttackS3602008 Oct 08 
 
Alert History
 

Version 1, August 20, 2008, 3:33 PM: HTTP response splitting attacks are a popular method of attacking web applications.  Attackers can use HTTP response splitting to perform cross-site scripting attacks, web cache poisoning, browser cache poisoning, hijacking, and other similar exploits.



Product Sets
 
The security vulnerability applies to the following combinations of products.

Primary Products:
IntelliShieldSecurity Activity Bulletin Original Release Base

Associated Products:
N/A




Alerts and bulletins on the Cisco Security Intelligence Operations Portal are highlighted by analysts in the Cisco Threat Operations Center and represent a subset of the comprehensive content that is available through Cisco Security IntelliShield Alert Manager Service. This customizable threat and vulnerability alert service provides security staff with access to timely, accurate, and credible information about threats and vulnerabilities that may affect their environment.


LEGAL DISCLAIMER
The urgency and severity ratings of this alert are not tailored to individual users; users may value alerts differently based upon their network configurations and circumstances. THE ALERT, AND INFORMATION CONTAINED THEREIN, ARE PROVIDED ON AN "AS IS" BASIS AND DO NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE ALERT, AND INFORMATION CONTAINED THEREIN, OR MATERIALS LINKED FROM THE ALERT, IS AT YOUR OWN RISK. INFORMATION IN THIS ALERT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.
Powered by  IntelliShield