WebKit contains a flaw that allows an attacker to conduct an HTTP response splitting attack. This flaw exists because window.location.href and similar needlessly decode URI-encoded characters. This could allow a remote attacker to insert arbitrary HTTP headers, which are included in a response sent to the server. If an application does not properly filter such a request, it could be used to inject additional headers that manipulate cookies, authentication status, or more.
Loss of Integrity
Patch / RCS
The vendor has released a patch to address this vulnerability. There are no known workarounds or upgrades to correct this issue. Check the vendor advisory, changelog, or solution in the references section for details.