mirror of
https://github.com/carlospolop/hacktricks
synced 2025-02-26 20:37:29 +00:00
GitBook: [master] one page and 3 assets modified
This commit is contained in:
parent
b37bc52e68
commit
bf817b3e5b
4 changed files with 9 additions and 1 deletions
BIN
.gitbook/assets/image (442).png
Normal file
BIN
.gitbook/assets/image (442).png
Normal file
Binary file not shown.
After Width: | Height: | Size: 27 KiB |
BIN
.gitbook/assets/image (443).png
Normal file
BIN
.gitbook/assets/image (443).png
Normal file
Binary file not shown.
After Width: | Height: | Size: 23 KiB |
BIN
.gitbook/assets/image (444).png
Normal file
BIN
.gitbook/assets/image (444).png
Normal file
Binary file not shown.
After Width: | Height: | Size: 27 KiB |
|
@ -124,10 +124,18 @@ Content-Length: 4
|
||||||
|
|
||||||
1
|
1
|
||||||
A
|
A
|
||||||
X`
|
0`
|
||||||
|
|
||||||
Since the front-end server uses the `Content-Length` header, it will forward only part of this request, omitting the `X`. The back-end server uses the `Transfer-Encoding` header, processes the first chunk, and then waits for the next chunk to arrive. This will cause an observable time delay.
|
Since the front-end server uses the `Content-Length` header, it will forward only part of this request, omitting the `X`. The back-end server uses the `Transfer-Encoding` header, processes the first chunk, and then waits for the next chunk to arrive. This will cause an observable time delay.
|
||||||
|
|
||||||
|
Sometimes, instead of getting a timeout you receive a 400 bad request from the final host like in the following scenario, where a CL.TE payload is sent:
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
And the response is a redirect containing an error inside the body with even the version of the haproxy used:
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
### Finding TE.CL vulnerabilities using timing techniques
|
### Finding TE.CL vulnerabilities using timing techniques
|
||||||
|
|
||||||
If an application is vulnerable to the TE.CL variant of request smuggling, then sending a request like the following will often cause a time delay:
|
If an application is vulnerable to the TE.CL variant of request smuggling, then sending a request like the following will often cause a time delay:
|
||||||
|
|
Loading…
Add table
Reference in a new issue