CL.TE Vulnerabilities
Overview
Foundation
The Core Concept
POST / HTTP/1.1
Host: clte.htb
Content-Length: 10
Transfer-Encoding: chunked
0
HELLOFront-end Perspective (Uses CL)
Back-end Perspective (Uses TE)
The Desync
Attack Scenario
Step 1: Attacker Sends Smuggling Request
Step 2: Victim Sends Normal Request
TCP Stream Analysis
Result
Identification
Test Requests
Testing Procedure
Confirmation
Exploitation
Goal: Force Admin to Perform Action
Crafted Smuggling Request
What Happens
Result
Content-Length Calculation
Important: Calculate CL Accurately
Counting Bytes
Component
Bytes
Practical Example: Reveal Flag
Scenario
Smuggling Request
Content-Length Breakdown
Execution
Tips & Tricks
Timing is Critical
Header Absorption Technique
Burp Suite Settings
Common Indicators
Response
Meaning
Diagram: CL.TE Attack Flow
References
Last updated