TE.CL Vulnerabilities
Overview
Burp Suite Configuration
β οΈ Critical Setup Required
1. Disable Auto Content-Length Update
[Settings Icon] β β Update Content-Length2. Create Tab Group for Sequential Requests
Foundation
The Core Concept
Front-end Perspective (Uses TE)
Back-end Perspective (Uses CL)
Attack Scenario
Step 1: Attacker Sends Smuggling Request
Step 2: Victim/Probe Request
TCP Stream Analysis
Result
Identification
Test Requests
Testing Procedure
Confirmation
WAF Bypass Exploitation
Scenario
The Bypass Technique
Exploit Requests
Chunk Size Calculation
TCP Stream Analysis
WAF View (Uses TE)
Back-end View (Uses CL)
Response Mapping
Request Sent
WAF Sees
Back-end Processes
Response Received
Calculating Chunk Size
Method: Character Count
Example
Quick Method in Burp
Complete Attack Flow Diagram
TE.TE to TE.CL Conversion
Using Substring Match
Server Logs Evidence
Tips & Tricks
Content-Length Values
CL Value
Includes
Common Pitfalls
Verification
Differences from CL.TE
Aspect
CL.TE
TE.CL
Lab Walkthrough Summary
References
Last updated