Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') |
Weakness ID: 444 (Weakness Base) | Status: Incomplete |
Description Summary
When malformed or abnormal HTTP requests are interpreted by one or more entities in the data flow between the user and the web server, such as a proxy or firewall, they can be interpreted inconsistently, allowing the attacker to "smuggle" a request to one device without the other device being aware of it.
Reference | Description |
---|---|
CVE-2005-2088 | Web servers allow request smuggling via inconsistent Transfer-Encoding and Content-Length headers. |
CVE-2005-2089 | Web servers allow request smuggling via inconsistent Transfer-Encoding and Content-Length headers. |
CVE-2005-2090 | Web servers allow request smuggling via inconsistent Transfer-Encoding and Content-Length headers. |
CVE-2005-2091 | Web servers allow request smuggling via inconsistent Transfer-Encoding and Content-Length headers. |
CVE-2005-2092 | Web servers allow request smuggling via inconsistent Transfer-Encoding and Content-Length headers. |
CVE-2005-2093 | Web servers allow request smuggling via inconsistent Transfer-Encoding and Content-Length headers. |
CVE-2005-2094 | Web servers allow request smuggling via inconsistent Transfer-Encoding and Content-Length headers. |
Use a web server that employs a strict HTTP parsing procedure, such as Apache (See paper in reference). |
Use only SSL communication. |
Terminate the client session after each request. |
Turn all pages to non-cacheable. |
Request smuggling can be performed due to a multiple interpretation error, where the target is an intermediary or monitor, via a consistency manipulation (Transfer-Encoding and Content-Length headers). Resultant from CRLF injection. |
Nature | Type | ID | Name | View(s) this relationship pertains to |
---|---|---|---|---|
ChildOf | Weakness Base | 436 | Interpretation Conflict | Research Concepts (primary)1000 |
ChildOf | Category | 442 | Web Problems | Development Concepts (primary)699 |
Mapped Taxonomy Name | Node ID | Fit | Mapped Node Name |
---|---|---|---|
PLOVER | HTTP Request Smuggling | ||
WASC | 26 | HTTP Request Smuggling |
Chaim Linhart, Amit Klein, Ronen Heled and Steve Orrin. "HTTP Request Smuggling". <http://www.cgisecurity.com/lib/HTTP-Request-Smuggling.pdf>. |
Submissions | ||||
---|---|---|---|---|
Submission Date | Submitter | Organization | Source | |
PLOVER | Externally Mined | |||
Modifications | ||||
Modification Date | Modifier | Organization | Source | |
2008-07-01 | Eric Dalci | Cigital | External | |
updated Potential Mitigations, Time of Introduction | ||||
2008-09-08 | CWE Content Team | MITRE | Internal | |
updated Name, Relationships, Other Notes, Taxonomy Mappings | ||||
2009-05-27 | CWE Content Team | MITRE | Internal | |
updated Name, Related Attack Patterns | ||||
Previous Entry Names | ||||
Change Date | Previous Entry Name | |||
2008-04-11 | HTTP Request Smuggling | |||
2008-09-09 | Interpretation Conflict in Web Traffic (aka 'HTTP Request Smuggling') | |||
2009-05-27 | Inconsistent Interpretation of HTTP Requests (aka 'HTTP Request Smuggling') | |||