Skip to content

Proposal: HTTP Request Smuggling via Conflicting Content-Length and Transfer-Encoding Headers (CL.TE / TE.CL attack patterns) #72

@yukta31

Description

@yukta31

As part of our coursework in ISA-681, my teammate and I would like to work on a case study focused on HTTP Request Smuggling, particularly attacks that take advantage of inconsistencies in how systems interpret the Content-Length and Transfer-Encoding headers.
This vulnerability is interesting because it doesn’t rely on a single system being broken. Instead, it happens when different components in a request chain, such as a front-end proxy and a back-end server interpret the same HTTP request differently. This mismatch can allow an attacker to sneak in an extra request that bypasses normal security checks.
In our case study, we plan to explain how these attacks work in practice, including common patterns like CL.TE and TE.CL. We will also look at how attackers use these techniques to interfere with request handling, and what kind of impact this can have in real-world systems.
A major focus of our work will be on prevention. We want to clearly show what developers and system designers can do to avoid this class of vulnerability, such as enforcing consistent request parsing, rejecting ambiguous inputs, and configuring servers and proxies to handle headers in a predictable way.
After reviewing the existing case studies and the current issue tracker, we did not find this topic already covered or proposed. We plan to proceed with this case study unless there are any concerns.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions