Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Details ASP.NET Vulnerability That Enables Attackers To Smuggle HTTP Requests

Microsoft Details ASP.NET Vulnerability That Enables Attackers To Smuggle HTTP Requests

Posted on October 29, 2025October 29, 2025 By CWS

Microsoft has issued a crucial safety replace for ASP.NET Core to handle CVE-2025-55315, a high-severity flaw that allows HTTP request smuggling and will permit attackers to bypass key safety controls.

Disclosed on October 14, 2025, this vulnerability has a CVSS v3.1 rating of 9.9, making it one of the crucial extreme points ever reported within the ASP.NET ecosystem.

The flaw stems from inconsistent dealing with of HTTP requests within the Kestrel internet server element, which may let authenticated attackers inject hidden requests to escalate privileges or entry delicate information.

Whereas HTTP request smuggling is a well known assault vector, this particular implementation in ASP.NET Core amplifies dangers for internet functions counting on the framework for authentication and authorization.

Attackers exploit discrepancies between how proxies and servers parse headers like Content material-Size and Switch-Encoding, smuggling malicious payloads that evade regular processing.

For example, a crafted POST request may embed a hid GET to an admin endpoint, tricking the system into executing unauthorized actions with out detection.

Understanding HTTP Request Smuggling

At its core, HTTP request smuggling leverages parsing inconsistencies throughout community elements, corresponding to front-end proxies and back-end servers.

An attacker sends a request with ambiguous headers, like combining Content material-Size and Switch-Encoding, inflicting the proxy to interpret it a technique whereas the server sees the smuggled content material in a different way.

This may end up in the second request bypassing fee limits, CSRF protections, and even authentication checks, resulting in extreme outcomes in multi-tiered environments.

Within the CVE-2025-55315 case, the Kestrel server’s failure to validate request boundaries below sure situations permits smuggled requests to succeed in utility logic intact.

This impacts all supported ASP.NET Core variations, together with 8.0, 9.0, and 10.0 previews, notably in setups with reverse proxies like NGINX or Azure Entrance Door.

Exploitation requires community entry and sometimes low privileges, however the scope can prolong to confidential information publicity or server crashes in worst-case situations.

The vulnerability’s excessive rating underscores its potential for chained assaults, from session hijacking to server-side request forgery.

Not all functions are equally uncovered; dangers heighten if customized request parsing, header-based choices, or skipped validations are in play.

For regulated sectors dealing with delicate information, unpatched methods may face compliance violations alongside direct threats like privilege escalation.

Assault VectorPotential ImpactDepends OnSmuggled login requestElevation of privilegeApp logic trusting headersSmuggled inner API callSSRFApp routing and endpointsSmuggled CSRF bypassSession hijackingCSRF token validationSmuggled injection payloadCode executionInput sanitization gaps

Mitigations

Microsoft urges fast patching through the newest .NET updates for affected variations, adopted by utility restarts.

Builders ought to audit request-handling code, particularly round auth and enter validation, whereas making certain proxies normalize site visitors to dam smuggling makes an attempt.

Monitoring logs for anomalous patterns and testing with instruments like these simulating HRS can additional harden defenses. By making use of these measures, organizations can safeguard ASP.NET functions towards this pervasive menace panorama.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:ASP.NET, Attackers, Details, Enables, HTTP, Microsoft, Requests, Smuggle, Vulnerability

Post navigation

Previous Post: New Android Malware Herodotus Mimic Human Behaviour to Bypass Biometrics Detection
Next Post: Active Exploits Hit Dassault and XWiki — CISA Confirms Critical Flaws Under Attack

Related Posts

New Research Unmask DPRK IT Workers Email Address and Hiring Patterns New Research Unmask DPRK IT Workers Email Address and Hiring Patterns Cyber Security News
Remcos RAT C2 Activity Mapped Along with The Ports Used for Communications Remcos RAT C2 Activity Mapped Along with The Ports Used for Communications Cyber Security News
Cisco Hacked – Attackers Stolen Profile Details of users Registered on Cisco.com Cisco Hacked – Attackers Stolen Profile Details of users Registered on Cisco.com Cyber Security News
Researchers Detailed r1z Initial Access Broker OPSEC Failures Researchers Detailed r1z Initial Access Broker OPSEC Failures Cyber Security News
Gootloader with Low Detection Rate Bypasses Most Security Tools Gootloader with Low Detection Rate Bypasses Most Security Tools Cyber Security News
New BruteForceAI Tool Automatically Detects Login Pages and Executes Smart Brute-Force Attacks New BruteForceAI Tool Automatically Detects Login Pages and Executes Smart Brute-Force Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News