Exploiting a CRLF Injection in the `Location` header

We discussed this vulnerability during Episode 195 on 13 March 2023

A nice use of the a CRLF Injection to exploit a seemingly unexploitable injection because the browser wouldn’t render the page when a Location header was present. Basically just used the CRLF injection ot inject a Connection: Location header, telling the proxy to treat the Location header as a hop-by-hop header and drop it before passing it on to the end-user. Without the location header present even though it was a HTTP 302 response the browser would render the page with attacker controlled content.