Downgrading Attacks
What Is HTTP/2 Downgrading?
ββββββββββ HTTP/2 βββββββββββββββββ HTTP/1.1 ββββββββββββββ
β Client β ββββββββ> β Reverse Proxy β βββββββββ> β Web Server β
ββββββββββ βββββββββββββββββ ββββββββββββββWhy Does This Happen?
Reason
Description
H2.CL Vulnerability
The Problem
Attack Mechanism
Result
Proxy Sees
Backend Sees
H2.TE Vulnerability
The Problem
Attack Mechanism
Result
Practical Exploitation - H2.CL
Scenario
Exploit Request
Burp Configuration
With Header Absorption
Forcing Admin Action
Payload
Execution
TCP Stream After Downgrade
Attack Flow Diagram
Key Differences from HTTP/1.1 Smuggling
Aspect
HTTP/1.1 Smuggling
HTTP/2 Downgrading
References
Last updated