Loading HuntDB...

http request smuggling in twitter.com

High
X
X (Formerly Twitter)
Submitted None
Reported by protostar0

Vulnerability Details

Technical details and impact analysis

HTTP Request Smuggling
**Summary:** the same vulnerability reported in other domain , see this report [here](https://hackerone.com/reports/713285) **Description:** the Description of HTTP request smuggling attacks : [here](https://portswigger.net/web-security/request-smuggling) ##Detect HTTP request smuggling attack (subdomains vulnerable): -to detect HTTP request smuggling attack with add header `Transfer-Encoding: chunked` and encode the body of request with chunked encode. 1. send request with a valid chunked encode and you will get response means that the **back-end server accept chunked encode** 2. send a large value in hex of chunked encode , if get ** delay of response** means its vulnerable. resource: https://portswigger.net/web-security/request-smuggling/finding ## CONFIRMATION: ##POC: in this POC i will use TWEET request as second request (payload) ,means that if the HTTP request smuggling attack success, will get a new TWEET in my account F609847 ## Steps To Reproduce: ps : i use chrome browser,with burp 1- choose any valid POST request (or change GET to POST) from twitter.com and send it to repeater 2- delete this header (Connection: close ,Accept-Encoding: gzip, deflate) 3- add this header <Transfer-Encoding: chunked> 4- add chunked encode put a valid chunked code or [ put just 0 with two CRLFs] 5-put the second request [i use a TWEET request ] 6- send the attacker request ## Impact impact of http request smuggling - https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn - https://portswigger.net/web-security/request-smuggling/exploiting

Report Details

Additional information and metadata

State

Closed

Substate

Duplicate

Submitted

Weakness

HTTP Request Smuggling