Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New HTTP Smuggling Attack Technique Let Hackers Inject Malicious Requests

Posted on August 22, 2025August 22, 2025 By CWS

A classy HTTP request smuggling assault that exploits inconsistent parsing behaviors between front-end proxy servers and back-end software servers. 

This newly found method leverages malformed chunked switch encoding extensions to bypass established safety controls and inject unauthorized secondary requests into internet functions.

Key Takeaways1. Exploits malformed HTTP chunked encoding to create front-end/back-end parsing discrepancies.2. Bypasses safety controls by injecting hidden secondary requests.3. Apply patches and migrate to the HTTP/2 protocol.

The assault targets a basic vulnerability in HTTP/1.1 protocol implementation, the place totally different servers interpret ambiguous request formatting inconsistently. 

Attackers can exploit these parsing discrepancies to bypass Net Utility Firewalls (WAFs), Content material Supply Networks (CDNs), and cargo balancers, doubtlessly gaining unauthorized entry to delicate backend sources.

HTTP Smuggling Vulnerability

Imperva reviews that the assault mechanism facilities on HTTP/1.1’s chunked switch encoding function, which permits message our bodies to be transmitted in segments utilizing the Switch-Encoding: chunked header. 

Switch-Encoding: chunked header

In line with RFC 9112 specs, every chunk features a header containing the scale in hexadecimal format, adopted by elective chunk extensions prefixed with semicolons.

Researchers found that attackers can manipulate chunk extension parsing by sending malformed headers containing naked semicolons with out correct extension names. 

This creates a essential parsing discrepancy the place front-end programs interpret the malformed syntax otherwise than backend servers.

The assault sequence follows this sample: the attacker sends a piece measurement line ending with a semicolon however no extension identify, inflicting the front-end parser to deal with your entire sequence as a single request whereas the back-end parser interprets the newline after the semicolon as marking the top of the chunk header. 

Smuggled request

This permits attackers to embed secondary HTTP requests after zero-length chunks, which backend programs course of as respectable separate requests, successfully bypassing front-end safety validation.

The vulnerability stems from HTTP/1.1’s inherent design weaknesses, significantly its reliance on text-based parsing and a number of strategies for expressing message boundaries by way of Content material-Size headers, Switch-Encoding specs, or delimiters. 

Many server implementations prioritize compatibility over strict RFC compliance, resulting in lenient parsing of malformed requests that create exploitable inconsistencies.

Safety specialists emphasize that complete patches have been deployed throughout affected programs, with organizations sustaining present software program variations receiving full safety in opposition to this assault vector. 

Nevertheless, the best long-term mitigation entails migrating to HTTP/2, which employs binary framing mechanisms that get rid of the ambiguous parsing eventualities, enabling request smuggling assaults.

This reinforces the essential significance of protocol-level safety concerns and highlights HTTP/1.1’s basic vulnerabilities that proceed enabling refined bypass methods regardless of current protecting measures.

Safely detonate suspicious recordsdata to uncover threats, enrich your investigations, and reduce incident response time. Begin with an ANYRUN sandbox trial → 

Cyber Security News Tags:Attack, Hackers, HTTP, Inject, Malicious, Requests, Smuggling, Technique

Post navigation

Previous Post: New Cryptojacking Attack Exploits Redis Servers to Install Miners and Disable Defenses
Next Post: CISA Warns of Apple iOS, iPadOS, and macOS 0-day Vulnerability Exploited in Attacks

Related Posts

Iranian APTs Hackers Actively Attacking Transportation and Manufacturing Sectors Cyber Security News
Vulnerabilities in Preinstalled Android Apps Expose PIN Codes and Allow Command Injection Cyber Security News
BlackSuit Ransomware’s Data Leak and Negotiation Portal Seized Cyber Security News
Surveillance Company Using SS7 Bypass Attack to Track the User’s Location Information Cyber Security News
PupkinStealer Attacks Windows System to Steal Login Credentials & Desktop Files Cyber Security News
New Streamlit Vulnerability Allows Hackers to Launch Cloud Account Takeover Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft to Limit Onmicrosoft Domain Usage for Sending Emails
  • Hackers Can Exfiltrate Windows Secrets and Credentials Silently by Evading EDR Detection
  • How to Test Website Security Using Free Tools
  • Large Interpol Cybercrime Crackdown in Africa Leads to the Arrest of Over 1,200 Suspects
  • Chinese MURKY PANDA Attacking Government and Professional Services Entities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft to Limit Onmicrosoft Domain Usage for Sending Emails
  • Hackers Can Exfiltrate Windows Secrets and Credentials Silently by Evading EDR Detection
  • How to Test Website Security Using Free Tools
  • Large Interpol Cybercrime Crackdown in Africa Leads to the Arrest of Over 1,200 Suspects
  • Chinese MURKY PANDA Attacking Government and Professional Services Entities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News