NUL

Test IDCOOK-NUL
CategoryCookies
ScoredNo
RFC LevelN/A
Expected400 (rejected) or 2xx without NUL

What it sends

NUL byte in cookie value — dangerous if preserved by parser.

GET /echo HTTP/1.1\r\n
Host: localhost:8080\r\n
Cookie: foo=\0bar\r\n
\r\n

The cookie value contains a NUL byte (0x00).

Why it matters

NUL bytes in cookie values can truncate strings in C-based parsers, cause log injection, or enable header injection if the NUL terminates a string boundary check.

Verdicts

  • Pass — 400 rejected, or 2xx with NUL stripped
  • Fail — 2xx with NUL byte preserved in output (dangerous), or 500

Sources