Request Smuggling
Summary
Tools
CL.TE vulnerabilities
TE.CL vulnerabilities
TE.TE behavior: obfuscating the TE header
References
Tools
CL.TE vulnerabilities
The front-end server uses the Content-Length header and the back-end server uses the Transfer-Encoding header.
Example:
Challenge: https://portswigger.net/web-security/request-smuggling/lab-basic-cl-te
TE.CL vulnerabilities
The front-end server uses the Transfer-Encoding header and the back-end server uses the Content-Length header.
Example:
Challenge: https://portswigger.net/web-security/request-smuggling/lab-basic-te-cl
TE.TE behavior: obfuscating the TE header
The front-end and back-end servers both support the Transfer-Encoding header, but one of the servers can be induced not to process it by obfuscating the header in some way.
Challenge: https://portswigger.net/web-security/request-smuggling/lab-ofuscating-te-header
References
Last updated