The Burp Suite User Forum was discontinued on the 1st November 2024.

Burp Suite User Forum

For support requests, go to the Support Center. To discuss with other Burp users, head to our Discord page.

SUPPORT CENTER DISCORD

HTTP request smuggling, basic TE.CL vulnerability

Ashish | Last updated: May 19, 2020 12:53PM UTC

i did the lab as mentioned in the solution but when i submit the request in repeater it says "bad request" followimg is the reuest i sent: POST / HTTP/1.1 Host: your-lab-id.web-security-academy.net Content-Type: application/x-www-form-urlencoded Content-length: 4 Transfer-Encoding: chunked 5c GPOST / HTTP/1.1 Content-Type: application/x-www-form-urlencoded Content-Length: 15 x=1 0 and also tried adding \r\n\r\n after the zero.

Michelle, PortSwigger Agent | Last updated: May 20, 2020 11:37AM UTC

We're taking a look into this, could you send us a copy of the request you used with the \r\n\r\n added, please?

Ashish | Last updated: May 20, 2020 01:02PM UTC