
By exploiting these effects, an attacker may be able to bypass input validation, trigger application errors or modify internal variables values. Supplying multiple HTTP parameters with the same name may cause an application to interpret values in unanticipated ways.

HTTP Parameter Pollution tests the applications response to receiving multiple HTTP parameters with the same name for example, if the parameter username is included in the GET or POST parameters twice. Home > Latest > 4-Web Application Security Testing > 07-Input Validation Testing Testing for HTTP Parameter Pollution ID
