HTTP Request Smuggling—a web-security vulnerability that exploits CL/TE header parsing ambiguities between a front-end (censor) and back-end (web server)—can be systematically repurposed as a censorship circumvention technique. By hiding a censored Host in the body of a benign outer request, the censor parses only the uncensored outer request while the destination server processes both, successfully bypassing HTTP censorship in China (19 vectors), Iran (254 vectors), and Russia (all 2,015 vectors) from the evaluated vantage points.
From 2024-m-ller-turning — Turning Attacks into Advantages: Evading HTTP Censorship with HTTP Request Smuggling
· §3 / §8
· 2024
· Free and Open Communications on the Internet
Implications
Incorporate HRS vector generation into tools like Geneva as an HTTP-layer evasion module; the technique requires no elevated privileges and works at the application layer, making it deployable on constrained devices where TCP-layer manipulations are not feasible.
Treat the HRS approach as a template: other web-security vulnerabilities that introduce parser ambiguities between a middlebox and an origin server are candidate sources for new circumvention primitives—systematically mining CVE databases for such ambiguities is a viable research direction.