The Burp Suite User Forum was discontinued on the 1st November 2024.

Burp Suite User Forum

For support requests, go to the Support Center. To discuss with other Burp users, head to our Discord page.

SUPPORT CENTER DISCORD

HTTP Request Smuggling

mlhblbl | Last updated: Feb 11, 2022 02:41PM UTC

I don't understand how the content-length of the smuggler request is calculated in the lab that works as te.cl in request smuggling Can you help me 15 where does it come from? (It accepts limits between 10-15, I get an invalid request error for values ​​less than 9 and 9.).The solution given by portwigger: POST / HTTP/1.1 Host: your-lab-id.web-security-academy.net Content-Type: application/x-www-form-urlencoded Content-length: 4 Transfer-Encoding: chunked 5c GPOST / HTTP/1.1 Content-Type: application/x-www-form-urlencoded Content-Length: 15 x=1 0

[ | Last updated: Feb 11, 2022 02:59PM UTC

it is also my question that why we should enter two lines spacing and then adding something like : x=1 0 and if we use just POST instead of GPOST what is the difference between them! Is there some prerequisites that should we learn to analyze these http requests?

mlhblbl | Last updated: Feb 11, 2022 03:09PM UTC

two line spacing was a point that I didn't understand either. I can reference this article to you "https://medium.com/nerd-for-tech/http-request-smuggling-part-1-concepts-b89bfe17b210#9ea9". In short, the "chunked" feature needs one blank line after the 0 sign in order to understand that the request has ended. As for GPOST, since the lab only accepts GET and POST requests, we understand that this security measure has been bypassed by the GPOST method going to the server.

Ben, PortSwigger Agent | Last updated: Feb 14, 2022 06:43PM UTC