![]() |
Http request smuggling
Hi,
I found a site vulnerable to http request smuggling it runs an apache server. I have been looking up information on this all day yet the stuff that i find doesent explain it verry well! i know that it has to be sent to the site through packets but what i dont understand is how could i use Код:
Code:sincerly Crimson-Jolt ps im using inet crack for spoofing [/code] |
$date put in cookie?
|
I dont understand either of your post's can you elaborate more........
thanks |
Sorry my English is bad))
So if $data take in cookie,then http request smuggling maybe done You can translate this Russian sentensis: Если переменная $data берется из cookies,то http request smuggling может получится. |
if variable $data you take from cookie, then.... =)
|
as i know this bug is very stupid=) i found one day this bug in one script, and i couldn`t do something except giving me cookie by server named as i wanted=) there in docs were something that we could set header location or something like that..
|
this bug is called HTTP Response splitting...
|
| Время: 02:28 |