FINDING · EVALUATION

Of 4,488 total HTTP Request Smuggling test vectors, 2,015 (44.9%) were accepted by at least one web server. CL*/TE vectors had a 99.0% acceptance rate (1,103/1,114); TE*/CL had 76.0% (859/1,130); CL/TE* had only 4.7% (53/1,130); and TE/CL* had 0%. Nginx 1.25.2 accepted 1,315 vectors while Apache 2.4.57 accepted only 11, reflecting HRS countermeasures added in Apache 2.4.25 and 2.4.52.

From 2024-m-ller-turningTurning Attacks into Advantages: Evading HTTP Censorship with HTTP Request Smuggling · §5.1 / Table 1–4 · 2024 · Free and Open Communications on the Internet

Implications

Tags

censors
generic
techniques
dpimiddlebox-interference
defenses
geneva

Extracted by claude-sonnet-4-6 — review before relying.