KEMBAR78
Request Desync 1 | PDF | Finance & Money Management
0% found this document useful (0 votes)
30 views1 page

Request Desync 1

The document discusses how to craft browser-compatible HTTP requests that can trigger desynchronization vulnerabilities and enable request smuggling attacks even on single-server sites and intranet sites that are otherwise immune. It covers techniques like client-side desync using paused requests and CL.0 request smuggling that ignores Content-Length headers.

Uploaded by

Sarath Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views1 page

Request Desync 1

The document discusses how to craft browser-compatible HTTP requests that can trigger desynchronization vulnerabilities and enable request smuggling attacks even on single-server sites and intranet sites that are otherwise immune. It covers techniques like client-side desync using paused requests and CL.0 request smuggling that ignores Content-Length headers.

Uploaded by

Sarath Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 1

Browser-powered request smuggling

In this section, you'll learn how you can craft high-severity exploits without
relying on malformed requests that browsers will never send. Not only does this
expose a whole new range of websites to server-side request smuggling, it enables
you to perform client-side variations of these attacks by inducing a victim's
browser to poison its own connection to a vulnerable web server.

Client-side desync
Request smuggling is traditionally considered a server-side issue because it can
only be exploited using specialist tools like Burp Repeater - standard browsers
simply won't send the kinds of requests needed to trigger the desync. However,
building on the lessons learned from CL.0 attacks, it's sometimes possible to cause
a desync using fully browser-compatible HTTP/1 requests.

You can use these browser-compatible requests to trigger a client-side desync (CSD)
between a browser and vulnerable web server, enabling attacks on single-server
sites, which are otherwise immune to request smuggling, and intranet sites that you
can't access directly.

Pause-based desync
Seemingly secure websites may contain hidden desync vulnerabilities that only
reveal themselves if you pause mid-request. By sending the headers, promising a
body, and then just waiting, you can sometimes find additional desync
vulnerabilities that can be used for both server-side and client-side exploits.

CL.0 request smuggling


Back-end servers can sometimes be persuaded to ignore the Content-Length header,
which effectively means they ignore the body of incoming requests. This paves the
way for request smuggling attacks that don't rely on chunked transfer encoding or
HTTP/2 downgrading.

You might also like