<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Qlikvew Webserver - CRLF injection/HTTP response splitting in QlikView</title>
    <link>https://community.qlik.com/t5/QlikView/Qlikvew-Webserver-CRLF-injection-HTTP-response-splitting/m-p/705146#M1263376</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From my understanding the CRLF characters are not integrated by the server in the response, and is never understood by the browser as a header.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bill&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 26 May 2015 11:53:04 GMT</pubDate>
    <dc:creator>Bill_Britt</dc:creator>
    <dc:date>2015-05-26T11:53:04Z</dc:date>
    <item>
      <title>Qlikvew Webserver - CRLF injection/HTTP response splitting</title>
      <link>https://community.qlik.com/t5/QlikView/Qlikvew-Webserver-CRLF-injection-HTTP-response-splitting/m-p/705142#M1263370</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've tried to look for a solution for this issue, but my experience is limited.&lt;/P&gt;&lt;P&gt;I'm -still- using QV 11.0.11282.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help would be appreciated&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Jan 2026 18:19:17 GMT</pubDate>
      <guid>https://community.qlik.com/t5/QlikView/Qlikvew-Webserver-CRLF-injection-HTTP-response-splitting/m-p/705142#M1263370</guid>
      <dc:creator />
      <dc:date>2026-01-26T18:19:17Z</dc:date>
    </item>
    <item>
      <title>Re: Qlikvew Webserver - CRLF injection/HTTP response splitting</title>
      <link>https://community.qlik.com/t5/QlikView/Qlikvew-Webserver-CRLF-injection-HTTP-response-splitting/m-p/705143#M1263373</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hugo,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is reported in bug # 64659 and close as "obsolete" for the following reason( according R&amp;amp;D):&lt;/P&gt;&lt;P&gt;" The reported security vulnerability is a false-positive. It is true that the test string “SomeCustomInjectedHeader: injected” is returned by the server, but the CRLF characters are not integrated by the server in the response, and as a consequence the test string is never interpreted by the receiving browser as a header."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As always to be safe, implement SSL and V11.00 SR1 is really old and not longer patchable for that upgrade to V11.20 SR7. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Jul 2014 18:47:39 GMT</pubDate>
      <guid>https://community.qlik.com/t5/QlikView/Qlikvew-Webserver-CRLF-injection-HTTP-response-splitting/m-p/705143#M1263373</guid>
      <dc:creator>Giuseppe_Novello</dc:creator>
      <dc:date>2014-07-18T18:47:39Z</dc:date>
    </item>
    <item>
      <title>Re: Qlikvew Webserver - CRLF injection/HTTP response splitting</title>
      <link>https://community.qlik.com/t5/QlikView/Qlikvew-Webserver-CRLF-injection-HTTP-response-splitting/m-p/705144#M1263374</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Grazie Giuseppe!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Exactly the answer I was hoping for. I'll work now with my superiors to upgrade my QV&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Jul 2014 20:16:30 GMT</pubDate>
      <guid>https://community.qlik.com/t5/QlikView/Qlikvew-Webserver-CRLF-injection-HTTP-response-splitting/m-p/705144#M1263374</guid>
      <dc:creator />
      <dc:date>2014-07-18T20:16:30Z</dc:date>
    </item>
    <item>
      <title>Re: Qlikvew Webserver - CRLF injection/HTTP response splitting</title>
      <link>https://community.qlik.com/t5/QlikView/Qlikvew-Webserver-CRLF-injection-HTTP-response-splitting/m-p/705145#M1263375</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Giuseppe,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;May I ask something about security vulnerability caused by HTTP header injection?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I'd like to ask you is whether &lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;we can avoid any security vulnerability caused by HTTP header injection because QlikView doesn't integrate the CRLF characters in the response.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks,&lt;/P&gt;&lt;P&gt;Miki Eto&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 May 2015 06:23:08 GMT</pubDate>
      <guid>https://community.qlik.com/t5/QlikView/Qlikvew-Webserver-CRLF-injection-HTTP-response-splitting/m-p/705145#M1263375</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2015-05-25T06:23:08Z</dc:date>
    </item>
    <item>
      <title>Re: Qlikvew Webserver - CRLF injection/HTTP response splitting</title>
      <link>https://community.qlik.com/t5/QlikView/Qlikvew-Webserver-CRLF-injection-HTTP-response-splitting/m-p/705146#M1263376</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From my understanding the CRLF characters are not integrated by the server in the response, and is never understood by the browser as a header.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bill&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 May 2015 11:53:04 GMT</pubDate>
      <guid>https://community.qlik.com/t5/QlikView/Qlikvew-Webserver-CRLF-injection-HTTP-response-splitting/m-p/705146#M1263376</guid>
      <dc:creator>Bill_Britt</dc:creator>
      <dc:date>2015-05-26T11:53:04Z</dc:date>
    </item>
    <item>
      <title>Re: Qlikvew Webserver - CRLF injection/HTTP response splitting</title>
      <link>https://community.qlik.com/t5/QlikView/Qlikvew-Webserver-CRLF-injection-HTTP-response-splitting/m-p/705147#M1263377</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks, Bill.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 May 2015 03:13:56 GMT</pubDate>
      <guid>https://community.qlik.com/t5/QlikView/Qlikvew-Webserver-CRLF-injection-HTTP-response-splitting/m-p/705147#M1263377</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2015-05-27T03:13:56Z</dc:date>
    </item>
  </channel>
</rss>

