Home Internet Uncover the Secret Hack: How HTTP Request Smuggling Can Break the Internet

Uncover the Secret Hack: How HTTP Request Smuggling Can Break the Internet

0
Uncover the Secret Hack: How HTTP Request Smuggling Can Break the Internet

Researchers argue HTTP Request Smuggling is under-researched and propose two methods for finding new vulnerabilities: fuzzing tools like http-garden for public servers and bug bounty/VDP programs for undisclosed stacks.

Fuzzing isn’t ideal for cloud providers’ custom tech stacks, so researchers recommend sending payloads to bug bounty programs that offer legal hacking opportunities and a broad attack surface. The bbscope tool can be used to automate fetching bug bounty program scopes for efficient target identification. 

The experimentation with HTTP/1.1 smuggling techniques revealed a gap in documented attack methods. Existing techniques exploit discrepancies between how front-end and back-end servers interpret Content-Length and Transfer-Encoding headers (CL.TE, TE.CL, TE.TE, CL.0). 

A potential new attack vector (TE.0) has been identified where the back-end server ignores the Transfer-Encoding header entirely, similar to how some back-ends disregard Content-Length (CL.0), which could be a novel way to manipulate request parsing and potentially bypass security controls. 

Request

Security researchers identified a TE.0 smuggling vulnerability in a major bank’s main API. By sending a malicious payload with null values through Burp Suite Intruder, they were able to redirect logged-in users to a collaborator server. 

This redirection process also leaked the users’ session tokens as a side effect, which allowed them to achieve a mass 0-click account takeover, compromising user accounts without any user interaction required.

Sending request

A new HTTP request smuggling vulnerability through a bug bounty program allows attackers to bypass authentication and potentially access sensitive data. 

Further investigation revealed that the vulnerability resided within the Google Cloud Load Balancer, specifically configured to use HTTP/1.1 by default. While not all GCP hosts were vulnerable, a significant number using the outdated HTTP protocol were impacted.  

Request and Response

Google Cloud Platform’s Identity-Aware Proxy (IAP) enforces Zero Trust principles by authenticating users, authorizing access based on identity and group membership, and controlling access to web applications and resources. IAP acts as a gatekeeper, verifying user credentials and permissions before granting access. 

When IAP is deployed behind a Google Load Balancer vulnerable to request smuggling, attackers can bypass IAP’s authorization process altogether, rendering its security measures ineffective and potentially exposing sensitive data. 

 Zero Trust principles 

Researchers at BugCrowd discovered a new HTTP request smuggling vulnerability (TE.0) that could be exploited to achieve critical impacts like site-wide redirection by leveraging application-specific gadgets and techniques used in other smuggling attacks. 

To exploit TE.0, researchers recommend setting the chunk length in hex format, adding two empty lines after the final chunk, disabling automatic content-length adjustments, and experimenting with different HTTP methods. 

When they notified Google of the vulnerability, the search engine giant acknowledged it and paid the researchers a bounty after some back and forth. 

Also Read:

NO COMMENTS

LEAVE A REPLY

Please enter your comment!
Please enter your name here