{"id":7462,"date":"2021-01-28T12:11:26","date_gmt":"2021-01-28T06:41:26","guid":{"rendered":"https:\/\/www.varutra.com\/?p=7462"},"modified":"2022-12-02T13:16:59","modified_gmt":"2022-12-02T07:46:59","slug":"http-request-smuggling","status":"publish","type":"post","link":"https:\/\/www.varutra.com\/varutravrt3\/http-request-smuggling\/","title":{"rendered":"HTTP Request Smuggling"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/varutra-1a3b6.kxcdn.com\/wp-content\/uploads\/2021\/01\/HTTP-1-1024x573.png\"  class=\"sh-overlay-item sh-table-cell ls-is-cached lazyloaded\" data-rel=\"lightcase\" title=\"HTTP 1 - Varutra Consulting\"><\/p>\n<h3><strong>What is HTTP Request Smuggling?<\/strong><\/h3>\n<p>HTTP Request Smuggling is a vulnerability that takes advantage of the misconfiguration in parsing one or more HTTP devices or entities that are in the data flow, between the user and the web server. Devices like cache server, proxy server, web application firewall, etc. are exploitable. In HRS attack multiple specially-crafted HTTP requests are delivered, which causes the two attacked entities to see two different sets of requests, allowing the hacker to smuggle a request to one device without the other device being aware of it. This opens multiple attack possibilities to exploit in an application like <a href=\"https:\/\/www.varutra.com\/web-cache-poisoning-through-host-header-injection\/\">web cache poisoning<\/a>, session hijacking, cross-site scripting, and web application firewall bypass.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>How does an HTTP Request Smuggling work?<\/strong><\/h3>\n<p>Web applications nowadays employ series of HTTP servers between users and the final application logic. Users send requests to a front-end server (like a proxy server, load balancer, or a WAF, etc.) and this server forwards requests to one or more back-end servers.<\/p>\n<p>When the front-end server forwards HTTP requests to a back-end server, it generally sends several requests over the same back-end network connection. The HTTP requests are sent one after another, and the receiving server parses the HTTP request headers to determine where one request ends and the next one begins.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-7463 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/01\/HTTP-Request-Smuggling-work.png\" alt=\"HTTP Request Smuggling work\" width=\"578\" height=\"327\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/01\/HTTP-Request-Smuggling-work.png 578w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/01\/HTTP-Request-Smuggling-work-300x170.png 300w\" sizes=\"(max-width: 578px) 100vw, 578px\" \/><\/p>\n<p style=\"text-align: center\">Fig.1<\/p>\n<p>In this scenario, it is important that the front-end and back-end systems agree about the boundaries between the requests. Or else an attacker might be able to send a malicious request that gets interpreted differently by the front-end and back-end systems.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-7464 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/01\/HTTP-Request-Smuggling-work-2.png\" alt=\"HTTP Request Smuggling work 2\" width=\"578\" height=\"342\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/01\/HTTP-Request-Smuggling-work-2.png 578w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/01\/HTTP-Request-Smuggling-work-2-300x178.png 300w\" sizes=\"(max-width: 578px) 100vw, 578px\" \/><\/p>\n<p style=\"text-align: center\">Fig.2<\/p>\n<p>This leads an attacker to cause part of their front-end request to be interpreted by the backend server as the start of the next request. The back-end server considers it to be the next request, and so thus the attacker interferes with the way the application processes the request.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Different Test Scenarios in HTTP Request Smuggling<\/strong><\/h3>\n<p>The HTTP Request Smuggling vulnerability gets exploited because the HTTP specification provides two different methods to specify where a request end.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>1. Content-Length Header<\/strong>: It\u2019s an HTTP header that specifies the length of the message body in bytes. For example-<\/p>\n<p>POST \/search HTTP\/1.1<\/p>\n<p>Host: example.com<\/p>\n<p>Content-Type: application\/json<\/p>\n<p>Content-Length: 11<\/p>\n<p>q=smuggling<\/p>\n<p>&nbsp;<\/p>\n<p><strong>2.Transfer-Encoding Header<\/strong>: The HTTP header uses chunked encoding to deliver the message body. This means chunks of data are included in the message body. Each chunk consists of the chunk size in bytes which is expressed in hexadecimal, followed by a newline, followed by the chunk contents. The message is terminated with a chunk of size zero. For example-<\/p>\n<p>POST \/search HTTP\/1.1<\/p>\n<p>Host: example.com<\/p>\n<p>Content-Type: application\/json<\/p>\n<p>Transfer-Encoding: chunked<\/p>\n<p>abcd<\/p>\n<p>q=smuggling<\/p>\n<p>0<\/p>\n<p>The above-mentioned HTTP methods specify the length of HTTP messages; however, both methods cannot be used in a single request. In such a case, the server will reject\/ ignore the instance of Content-Header to avoid ambiguity when only a single server is used. But in the case where multiple servers are chained together, it results in a problem in specifying the boundaries between the successive requests due to the below two reasons:<\/p>\n<p>* Some servers do not support the Transfer-Encoding header in requests.<\/p>\n<p>* Some servers that do support the Transfer-Encoding header can be induced not to process it if the header is obfuscated in some way.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>How to perform HTTP Request Smuggling in an attack scenario<\/strong><\/h3>\n<p>HTTP Request Smuggling through web cache server leads to poisoning the cache server. Consider a POST request with two conflicting \u201cContent-Length\u201d header values. Let Demo be the DNS name of the web server behind the proxy. Let \u201cexample.html\u201d be a static page on the web server. The HRS attack exploits the inconsistency between the two servers as below.<\/p>\n<ol>\n<li>POST <u>http:\/\/Demo\/example2.html<\/u> HTTP\/1.1\\r\\n<\/li>\n<li>Host: Demo\\r\\n<\/li>\n<li>Connection: Keep-Alive \\r\\n<\/li>\n<li>Content-Type: application\/x-www-form-urlencoded\\r\\n<\/li>\n<li>Content-Length: 0\\r\\n<\/li>\n<li>Content-Length: 44\\r\\n<\/li>\n<li>\\r\\n<\/li>\n<li>GET \/example1.html HTTP\/1.1\\r\\n<\/li>\n<li>Host: Demo\\r\\n<\/li>\n<li>Ola: [space after the &#8220;Ola:&#8221;, but no CRLF]<\/li>\n<li>GET<u> http:\/\/Demo\/page_to_example1.html<\/u> HTTP\/1.1\\r\\n<\/li>\n<li>Host: Demo\\r\\n<\/li>\n<li>Connection: Keep-Alive\\r\\n<\/li>\n<li>\\r\\n<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>When this request is sent to the web server via a proxy server, the proxy server parses the POST request in lines 1-7 (in blue) and encounters the two &#8220;Content-Length&#8221; headers. It ignores the first header and assumes the request has a body of length 44 bytes. Thus, it treats the data in lines 8-10 as the first request&#8217;s body. The proxy then parses lines 11-14 (in red) treating it as the client&#8217;s second request and forwards the request to a web server.<\/p>\n<p>Unlike the proxy, the Web server uses the first &#8220;Content-Length&#8221; header as the first POST request with nobody, and the second request is the GET in line 8, treating GET in line 11 as the value of the &#8220;Ola&#8221; header in line 10.<\/p>\n<p>The requests the Web server sees are &#8220;POST \/example2.html&#8221; (from line 1) and &#8220;GET \/example1.html&#8221; (from line 8), so it sends back two responses with the contents of the pages, respectively. The proxy matches these responses to the two requests it thinks were sent by the client &#8211; \u201cPOST \/example2.html\u201d (line 1) and \u201cGET \/page_to_example1.html\u201d (line11). Since the response is cacheable the proxy caches the contents of \u201cexample1.html\u201d under the URL \u201cpage_to_example1.html\u201d, and thus the cache is poisoned. Any client requesting \u201cpage_to_example1.html\u201d from the proxy would receive the \u201cexample1.html\u201d page.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Prevention of HTTP Request Smuggling Vulnerabilities<\/strong><\/h3>\n<p>HTTP request smuggling vulnerabilities are identified in scenarios where a front-end server forwards multiple requests to a back-end server over the same network connection. The protocol used for the back-end connections carries the risk that the two servers disagree about the boundaries between requests. The more layers you introduce between the user and the web server (Load balancers, CDNs, reverse proxies, etc.) the more likely you are to be vulnerable.<\/p>\n<p>HRS can be mitigated by implementing below mentioned security strategies-<\/p>\n<ol>\n<li>Disabling backend connection reuse completely. This makes it to transfer each back-end request sent over a separate network connection.<\/li>\n<li>Configuring to use HTTP\/2 in the back-end connections. The protocol will prevent uncertainty about the boundaries between the requests.<\/li>\n<li>All the front-end and back-end servers run the same web server software with the same configurations, agreeing on the boundaries between the requests.<\/li>\n<li>Normalize the ambiguous requests by reconfiguring the front-end server before routing them onward.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h3><strong>Conclusion<\/strong><\/h3>\n<p>HTTP request smuggling is an exploit in interfering with the way a web site processes sequences of HTTP requests that are received from one or more users. Request smuggling vulnerabilities are often critical in nature, allowing an attacker to bypass security controls, gain unauthorized access to sensitive data, and directly compromise other application users. It is a major threat to web applications, parsing security-critical functions and tolerating ambiguous messages thus leading the users expose to multiple security risks.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>References<\/strong><\/h3>\n<ul>\n<li><a href=\"https:\/\/www.cgisecurity.com\/lib\/HTTP-Request-Smuggling.pdf\">https:\/\/www.cgisecurity.com\/lib\/HTTP-Request-Smuggling.pdf<\/a><\/li>\n<li><a href=\"https:\/\/regilero.github.io\/english\/security\/2019\/04\/24\/security_jetty_http_smuggling\/\">https:\/\/regilero.github.io\/english\/security\/2019\/04\/24\/security_jetty_http_smuggling\/<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/portswigger\/http-request-smuggler\">https:\/\/github.com\/portswigger\/http-request-smuggler<\/a><\/li>\n<li><a href=\"https:\/\/portswigger.net\/web-security\/request-smuggling\">https:\/\/portswigger.net\/web-security\/request-smuggling<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Author,<\/p>\n<p><strong>Sankalp Mahajan<\/strong><\/p>\n<p>Attack &amp; Pen Test Team<\/p>\n<p>Varutra Consulting Pvt. Ltd.<\/p>","protected":false},"excerpt":{"rendered":"<p>What is HTTP Request Smuggling? HTTP Request Smuggling is a vulnerability that takes advantage of the misconfiguration in parsing one or more HTTP devices or&#8230;<\/p>\n","protected":false},"author":4,"featured_media":7465,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[272],"tags":[339,340,341],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.6.3 - aioseo.com -->\n\t\t<meta name=\"description\" content=\"HTTP request smuggling is vulnerability type that has gained popularity over the last year. Learn what is HTTP Request Smuggling and Prevention Measures.\" \/>\n\t\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t\t<link rel=\"canonical\" href=\"https:\/\/www.varutra.com\/varutravrt3\/http-request-smuggling\/\" \/>\n\t\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.6.3\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Varutra Consulting\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"HTTP Request Smuggling and Prevention Measures\" \/>\n\t\t<meta property=\"og:description\" content=\"HTTP request smuggling is vulnerability type that has gained popularity over the last year. Learn what is HTTP Request Smuggling and Prevention Measures.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.varutra.com\/varutravrt3\/http-request-smuggling\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/01\/HTTP-1.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/01\/HTTP-1.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"1060\" \/>\n\t\t<meta property=\"og:image:height\" content=\"593\" \/>\n\t\t<meta property=\"article:section\" content=\"Web Application Security\" \/>\n\t\t<meta property=\"article:tag\" content=\"http\" \/>\n\t\t<meta property=\"article:tag\" content=\"vulnerabilities\" \/>\n\t\t<meta property=\"article:tag\" content=\"web application security\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2021-01-28T06:41:26+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2022-12-02T07:46:59+00:00\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:title\" content=\"HTTP Request Smuggling and Prevention Measures\" \/>\n\t\t<meta name=\"twitter:description\" content=\"HTTP request smuggling is vulnerability type that has gained popularity over the last year. Learn what is HTTP Request Smuggling and Prevention Measures.\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/01\/HTTP-1.png\" \/>\n\t\t<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t\t<meta name=\"twitter:data1\" content=\"kalpblogger\" \/>\n\t\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/http-request-smuggling\\\/#article\",\"name\":\"HTTP Request Smuggling and Prevention Measures\",\"headline\":\"HTTP Request Smuggling\",\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/HTTP-1.png\",\"width\":1060,\"height\":593,\"caption\":\"HTTP (1)\"},\"datePublished\":\"2021-01-28T12:11:26+05:30\",\"dateModified\":\"2022-12-02T13:16:59+05:30\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/http-request-smuggling\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/http-request-smuggling\\\/#webpage\"},\"articleSection\":\"Web Application Security, HTTP, vulnerabilities, web application security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/http-request-smuggling\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"nextItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/http-request-smuggling\\\/#listItem\"},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/http-request-smuggling\\\/#listItem\",\"position\":2,\"name\":\"HTTP Request Smuggling\",\"previousItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\"}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\",\"name\":\"Varutra\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Varutra-Found-e1612984024606.jpg\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/http-request-smuggling\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/http-request-smuggling\\\/#organizationLogo\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/\",\"name\":\"kalpblogger\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/http-request-smuggling\\\/#authorImage\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5e96a9b330da7c941c1e39217a2fbe38?s=96&d=mm&r=g\",\"width\":96,\"height\":96,\"caption\":\"kalpblogger\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/http-request-smuggling\\\/#webpage\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/http-request-smuggling\\\/\",\"name\":\"HTTP Request Smuggling and Prevention Measures\",\"description\":\"HTTP request smuggling is vulnerability type that has gained popularity over the last year. Learn what is HTTP Request Smuggling and Prevention Measures.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/http-request-smuggling\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/HTTP-1.png\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/http-request-smuggling\\\/#mainImage\",\"width\":1060,\"height\":593,\"caption\":\"HTTP (1)\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/http-request-smuggling\\\/#mainImage\"},\"datePublished\":\"2021-01-28T12:11:26+05:30\",\"dateModified\":\"2022-12-02T13:16:59+05:30\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"name\":\"Varutra Consulting\",\"description\":\"Secure your digital world with our Cybersecurity services.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>HTTP Request Smuggling and Prevention Measures<\/title>\n\n","aioseo_head_json":{"title":"HTTP Request Smuggling and Prevention Measures","description":"HTTP request smuggling is vulnerability type that has gained popularity over the last year. Learn what is HTTP Request Smuggling and Prevention Measures.","canonical_url":"https:\/\/www.varutra.com\/varutravrt3\/http-request-smuggling\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"og:locale":"en_US","og:site_name":"Varutra Consulting","og:type":"article","og:title":"HTTP Request Smuggling and Prevention Measures","og:description":"HTTP request smuggling is vulnerability type that has gained popularity over the last year. Learn what is HTTP Request Smuggling and Prevention Measures.","og:url":"https:\/\/www.varutra.com\/varutravrt3\/http-request-smuggling\/","og:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/01\/HTTP-1.png","og:image:secure_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/01\/HTTP-1.png","og:image:width":"1060","og:image:height":"593","article:section":"Web Application Security","article:tag":["http","vulnerabilities","web application security"],"article:published_time":"2021-01-28T06:41:26+00:00","article:modified_time":"2022-12-02T07:46:59+00:00","twitter:card":"summary_large_image","twitter:title":"HTTP Request Smuggling and Prevention Measures","twitter:description":"HTTP request smuggling is vulnerability type that has gained popularity over the last year. Learn what is HTTP Request Smuggling and Prevention Measures.","twitter:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/01\/HTTP-1.png","twitter:label1":"Written by","twitter:data1":"kalpblogger","twitter:label2":"Est. reading time","twitter:data2":"6 minutes","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.varutra.com\/varutravrt3\/http-request-smuggling\/#article","name":"HTTP Request Smuggling and Prevention Measures","headline":"HTTP Request Smuggling","author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/01\/HTTP-1.png","width":1060,"height":593,"caption":"HTTP (1)"},"datePublished":"2021-01-28T12:11:26+05:30","dateModified":"2022-12-02T13:16:59+05:30","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/http-request-smuggling\/#webpage"},"isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/http-request-smuggling\/#webpage"},"articleSection":"Web Application Security, HTTP, vulnerabilities, web application security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.varutra.com\/varutravrt3\/http-request-smuggling\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/#listItem","position":1,"name":"Home","item":"https:\/\/www.varutra.com\/varutravrt3\/","nextItem":"https:\/\/www.varutra.com\/varutravrt3\/http-request-smuggling\/#listItem"},{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/http-request-smuggling\/#listItem","position":2,"name":"HTTP Request Smuggling","previousItem":"https:\/\/www.varutra.com\/varutravrt3\/#listItem"}]},{"@type":"Organization","@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization","name":"Varutra","url":"https:\/\/www.varutra.com\/varutravrt3\/","logo":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Varutra-Found-e1612984024606.jpg","@id":"https:\/\/www.varutra.com\/varutravrt3\/http-request-smuggling\/#organizationLogo"},"image":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/http-request-smuggling\/#organizationLogo"}},{"@type":"Person","@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author","url":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/","name":"kalpblogger","image":{"@type":"ImageObject","@id":"https:\/\/www.varutra.com\/varutravrt3\/http-request-smuggling\/#authorImage","url":"https:\/\/secure.gravatar.com\/avatar\/5e96a9b330da7c941c1e39217a2fbe38?s=96&d=mm&r=g","width":96,"height":96,"caption":"kalpblogger"}},{"@type":"WebPage","@id":"https:\/\/www.varutra.com\/varutravrt3\/http-request-smuggling\/#webpage","url":"https:\/\/www.varutra.com\/varutravrt3\/http-request-smuggling\/","name":"HTTP Request Smuggling and Prevention Measures","description":"HTTP request smuggling is vulnerability type that has gained popularity over the last year. Learn what is HTTP Request Smuggling and Prevention Measures.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#website"},"breadcrumb":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/http-request-smuggling\/#breadcrumblist"},"author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"creator":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/01\/HTTP-1.png","@id":"https:\/\/www.varutra.com\/varutravrt3\/http-request-smuggling\/#mainImage","width":1060,"height":593,"caption":"HTTP (1)"},"primaryImageOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/http-request-smuggling\/#mainImage"},"datePublished":"2021-01-28T12:11:26+05:30","dateModified":"2022-12-02T13:16:59+05:30"},{"@type":"WebSite","@id":"https:\/\/www.varutra.com\/varutravrt3\/#website","url":"https:\/\/www.varutra.com\/varutravrt3\/","name":"Varutra Consulting","description":"Secure your digital world with our Cybersecurity services.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"}}]}},"aioseo_meta_data":{"post_id":"7462","title":"HTTP Request Smuggling and Prevention Measures","description":"HTTP request smuggling is vulnerability type that has gained popularity over the last year. Learn what is HTTP Request Smuggling and Prevention Measures.","keywords":[],"keyphrases":"{\"focus\":{\"keyphrase\":\"HTTP Request Smuggling\",\"analysis\":{\"keyphraseInTitle\":{\"title\":\"Focus keyphrase in SEO title\",\"description\":\"Focus keyphrase found in SEO title.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInDescription\":{\"title\":\"Focus keyphrase in meta description\",\"description\":\"Focus keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Focus keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":3},\"keyphraseInURL\":{\"title\":\"Focus keyphrase in URL\",\"description\":\"Focus keyphrase used in the URL.\",\"score\":5,\"maxScore\":5,\"error\":0},\"keyphraseInIntroduction\":{\"title\":\"Focus keyphrase in introduction\",\"description\":\"Your Focus keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInSubHeadings\":{\"title\":\"Focus keyphrase in Subheadings\",\"description\":\"Your H2 and H3 subheadings reflects the topic of your copy. Good job!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInImageAlt\":{\"title\":\"Focus keyphrase in image alt attributes\",\"description\":\"Focus keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}},\"score\":90},\"additional\":[{\"keyphrase\":\"HTTP Request\",\"score\":83,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}}]}","primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"featured","og_image_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/01\/HTTP-1.png","og_image_width":"1060","og_image_height":"593","og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":"Web Application Security","og_article_tags":[],"twitter_use_og":true,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":"{\"article\":{\"articleType\":\"BlogPosting\"},\"course\":{\"name\":\"\",\"description\":\"\",\"provider\":\"\"},\"faq\":{\"pages\":[]},\"product\":{\"reviews\":[]},\"recipe\":{\"ingredients\":[],\"instructions\":[],\"keywords\":[]},\"software\":{\"reviews\":[],\"operatingSystems\":[]},\"webPage\":{\"webPageType\":\"WebPage\"}}","pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"limit_modified_date":false,"open_ai":null,"created":"2021-10-27 15:12:11","updated":"2022-12-02 07:49:24"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\/category\/web-application-security\/\" title=\"Web Application Security\">Web Application Security<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\tHTTP Request Smuggling\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.varutra.com\/varutravrt3"},{"label":"Web Application Security","link":"https:\/\/www.varutra.com\/varutravrt3\/category\/web-application-security\/"},{"label":"HTTP Request Smuggling","link":"https:\/\/www.varutra.com\/varutravrt3\/http-request-smuggling\/"}],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/7462"}],"collection":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/comments?post=7462"}],"version-history":[{"count":5,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/7462\/revisions"}],"predecessor-version":[{"id":20317,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/7462\/revisions\/20317"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media\/7465"}],"wp:attachment":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media?parent=7462"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/categories?post=7462"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/tags?post=7462"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}