FixVibe

// 프로브 / 스포트라이트

HTTP 리퀘스트 스머글링

프런트 프록시와 백엔드가 한 요청의 끝을 다르게 해석하면, 공격자가 그 틈을 타요.

핵심

Request smuggling is the bug James Kettle made famous and that defenders are still catching up to. It exploits a simple structural fact: any time HTTP traffic flows through two parsers in series — CDN to origin, load balancer to app server, reverse proxy to upstream — those two parsers must agree on where one request ends and the next begins. When they disagree by even one byte, the attacker rides the seam. The bug is invisible from logs (the proxy sees one well-formed request; the origin sees two) and the consequences are unbounded: cache poisoning, session theft, WAF bypass, internal-header injection. It's the rare web vulnerability where the network layer itself is what's broken.

어떻게 동작하나요

HTTP request smuggling appears when intermediaries disagree about request boundaries. That parser mismatch can desynchronize traffic and expose users or internal routes to cross-request impact.

피해 범위

Cache poisoning across CDN edges — one malicious request taints the cached response for every later visitor of that URL. Session hijacking via prepended requests that read responses meant for the next user. WAF bypass — the WAF sees the harmless outer request and forwards bytes that the origin parses as a privileged inner request. Authentication header injection: smuggle a request with `X-Authenticated-User: admin` past a WAF that strips that header on the outer request. Internal-network probing when origin trusts proxy-supplied headers.

// what fixvibe checks

What FixVibe checks

FixVibe checks this class with verified-domain active testing that is bounded, non-destructive, and evidence-driven. Public reports describe the affected surface and remediation. For check-specific questions about exact detection heuristics, active payload details, or source-code rule patterns, contact support@fixvibe.app.

확실한 방어

Use HTTP/2 end-to-end where possible — its frame-based wire format eliminates the CL/TE ambiguity entirely. When HTTP/1.1 traffic is unavoidable, ensure proxy and origin use the same parser implementation (or at least same conformance posture) and configure both to reject ambiguous requests outright: requests with both Content-Length and Transfer-Encoding headers, requests with malformed chunked encoding, requests with duplicate or whitespace-padded TE headers. Modern load balancers (HAProxy 2.x, nginx 1.21+, AWS ALB) have flags for strict parsing — turn them on. Disable HTTP keep-alive between proxy and origin if you can't otherwise solve it (closes the persistent-connection vector that smuggling exploits, at the cost of latency). Run a tool like Burp's smuggling scanner or HTTP Request Smuggler periodically against your stack — the bug is hard to notice without active probing.

// 내 앱에서 직접 실행해보세요

FixVibe가 지켜보는 동안 계속 배포하세요.

FixVibe는 공격자가 보는 것처럼 앱의 공개 영역을 압박 테스트합니다 — 에이전트도, 설치도, 카드도 필요 없어요. 새로운 취약점 패턴을 계속 연구해 실용적인 체크와 Cursor, Claude, Copilot에 바로 붙여넣을 수 있는 수정안으로 바꿉니다.

능동 프로브
103
이 카테고리에서 실행되는 테스트
모듈
27
전용 능동 프로브 검사
매 스캔
384+
모든 카테고리 합계 테스트
  • 무료 — 카드 없이, 설치 없이, Slack 알림 없이
  • URL만 붙여넣으세요 — 크롤, 탐지, 보고는 저희가
  • 심각도별 분류, 중복 제거된 신호만
  • 최신 AI 수정 프롬프트를 Cursor, Claude, Copilot에 바로 붙여넣기
무료 스캔 실행

// 최신 체크 · 실용적인 수정 · 자신 있게 배포

HTTP 리퀘스트 스머글링 — 취약점 스포트라이트 | FixVibe · FixVibe