Arbitrary query parameter reflected in server response header. Is it exploitable?
SCENARIO:
If I send requests like these:
http://site.com/page?safe_param=1?my_arbitrary_param=2
The server responds with a normal HTTP response but within common headers it includes also the arbitrary param:
[…]
my_arbitrary_param: 2
[…. Continue reading Arbitrary query parameter reflected in server response header. Is it exploitable?