2022
DOI: 10.1155/2022/3121177
|View full text |Cite
|
Sign up to set email alerts
|

Attacking Websites: Detecting and Preventing HTTP Request Smuggling Attacks

Abstract: Until the development of HTTP request smuggling in 2005, individual HTTP requests were considered as independent entities and could not be split or merged. This is a security problem caused by inconsistent content length interpretation approach between web servers, or the web server is not fully implemented in accordance with the RFC standard. It is especially dangerous for web services with complex web architectures. It can route the victims to receive malicious responses, amplify the impact of certain low-th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…A research article titled "Attacking Websites: Detecting and Preventing HTTP Request Smuggling Attacks " explained that inconsistent content length interpretation between web servers is specifically dangerous for web services with complex web architectures. It can route the victims to receive malicious responses, steal user credentials, or bypass network devices' defenses [25].…”
Section: Browser Powered Desync As a Variant Of Http Request Smugglingmentioning
confidence: 99%
“…A research article titled "Attacking Websites: Detecting and Preventing HTTP Request Smuggling Attacks " explained that inconsistent content length interpretation between web servers is specifically dangerous for web services with complex web architectures. It can route the victims to receive malicious responses, steal user credentials, or bypass network devices' defenses [25].…”
Section: Browser Powered Desync As a Variant Of Http Request Smugglingmentioning
confidence: 99%