HTTP Parameter Pollution (HPP) is a vulnerability that occurs when an attacker manipulates HTTP request parameters by injecting multiple instances of the same parameter with different values. This can lead to unexpected behavior in the web application, such as bypassing input validation or manipulating server-side logic.
To prevent HTTP Parameter Pollution vulnerabilities, ensure that your application only processes a single instance of each parameter or clearly defines how multiple instances should be handled. Validate and sanitize all input parameters, and consider using a web application firewall (WAF) to detect and block suspicious requests.
Code: A03:2021
Category: Injection
5.4
5.4