Potential header injection vulnerabilities can be detected in a similar way to
XSS vulnerabilities, since you are looking for cases where user-controllable
input reappears anywhere within the HTTP headers returned by the applica-
tion. Hence, in the course of probing the application for XSS vulnerabilities, 434 Chapter 12
■ Attacking Other Users
70779c12.qxd:WileyRed 9/14/07 3:14 PM Page 434
ble to header injection.
■