HIGHLIGHTS
SUMMARY
The attack forges an extra HTTP request inside a normal HTTP request, which is due to the differences in HTTP request interpretation between a front-end server and a back-end server. HTTP request smuggling can be combined with other attack vectors and make a low-impact vulnerability request dangerous or make a non-vulnerability request vulnerable. For HTTP request smuggling attacks, an attacker must send specially made HTTP requests that cause different servers to diverge in parsing the requests, and the malicious requests can be passed to the target server without the knowledge . . .
If you want to have access to all the content you need to log in!
Thanks :)
If you don't have an account, you can create one here.