DETECTION OVERVIEW
Risk Factors
Websites often rely on load balancers, content delivery networks (CDNs), or reverse proxies to manage incoming HTTP requests over a single connection. These systems increase the risk of an HTTP Desync attack, which is similar to an HTTP Request Smuggling attack. A remote, unauthenticated attacker can manipulate HTTP headers to push unexpected content to website visitors. Website visitors can be exposed to phishing attacks, stolen cookies, cross-site scripting attacks, and malware.
Category

HTTP Request Smuggling is an attack technique that leverages weaknesses in how back-end systems interpret specially designed HTTP requests. HTTP Desync leverages weaknesses in how front-end systems, such as load balancers, interpret multiple HTTP requests. An attacker creates a specially designed HTTP POST request with headers that contain chunked encoded messages (a Content-Length and Transfer-Encoding parameter with content). These chunked messages can desynchronize how front-end and back-end systems for a website distinguish the beginning and end of consecutive incoming HTTP requests. First, the attacker sends the malicious POST request to a website (1). The front-end load balancer stops parsing the request after the Content-Length is reached, and the malicious Transfer-Encoding content remains in the connection (2). This malicious content is prepended to the next legitimate HTTP request sent through the shared connection, and then pushed to the back-end web server (3). Depending on how the web server processes the malicious content, the website user who sent the legitimate request then receives the malicious content instead of, or in addition to, the web page they requested.
Configure front-end servers to communicate with back-end servers over HTTP/2
Disable HTTP persistent connection on back-end systems unless required
Network analysis and visibility solutions remain underrepresented in enterprises. Find out why in this preview of a new Wave report.
ExtraHop® Named a Leader in First-Ever Gartner® Magic Quadrant™ for Network Detection and Response
Visit this resource for more information.
This analysis exposes the critical link between an organization's lack of internal visibility and the escalating cost of compromise, demanding an urgent re-evaluation of how core business assets are protected.
Learn why you need to be wary of the claims certain network detection and response providers make about their coverage against the MITRE ATT&CK framework.
Learn how NDR from RevealX helps security teams detect and investigate more adversary TTPs in the MITRE ATT&CK framework than rule-based tools.
