<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Http — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/http/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 01 Apr 2026 09:21:36 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/http/feed.xml" rel="self" type="application/rss+xml"/><item><title>HTTP/2 Implementations Vulnerability Enables Denial of Service</title><link>https://feed.craftedsignal.io/briefs/2026-04-http2-dos/</link><pubDate>Wed, 01 Apr 2026 09:21:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-http2-dos/</guid><description>A remote, anonymous attacker can exploit a vulnerability in various HTTP/2 implementations to perform a denial-of-service attack.</description><content:encoded><![CDATA[<p>A vulnerability exists in multiple HTTP/2 implementations that can be exploited by an unauthenticated, remote attacker to conduct a denial-of-service (DoS) attack. The specific details of the vulnerability aren&rsquo;t disclosed in this brief, but the generic nature of the vulnerability means a wide array of servers are possibly vulnerable. Defenders need to focus on detecting anomalous HTTP/2 traffic patterns, given the lack of a specific CVE or patch information in the original source.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker establishes an HTTP/2 connection with a vulnerable server.</li>
<li>The attacker sends a series of specially crafted HTTP/2 requests. Due to the vulnerability, these requests consume excessive server resources.</li>
<li>The server begins to experience performance degradation due to resource exhaustion (CPU, memory, or network bandwidth).</li>
<li>Legitimate user requests are delayed or dropped as the server struggles to process the malicious traffic.</li>
<li>The attacker continues to send malicious HTTP/2 requests, sustaining the resource exhaustion.</li>
<li>The server becomes unresponsive, resulting in a denial-of-service condition for legitimate users.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability leads to a denial-of-service condition, rendering affected servers and services unavailable. The number of potential victims is broad, encompassing any system utilizing a vulnerable HTTP/2 implementation. The impact ranges from temporary service outages to prolonged periods of unavailability, causing business disruption and potential financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for anomalous HTTP/2 traffic patterns, specifically focusing on request rates and resource consumption (CPU, memory, network) using the provided Sigma rule.</li>
<li>Implement rate limiting for HTTP/2 connections to mitigate the impact of excessive requests.</li>
<li>Consider deploying a Web Application Firewall (WAF) to inspect and filter HTTP/2 traffic for known malicious patterns.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>http/2</category><category>denial-of-service</category><category>webserver</category></item><item><title>Netty HTTP Request Smuggling via Chunked Extension Quoted-String Parsing</title><link>https://feed.craftedsignal.io/briefs/2026-04-netty-chunked-smuggling/</link><pubDate>Thu, 26 Mar 2026 18:51:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-netty-chunked-smuggling/</guid><description>Netty incorrectly parses quoted strings in HTTP/1.1 chunked transfer encoding extension values, enabling request smuggling attacks by terminating chunk header parsing at \r\n inside quoted strings instead of rejecting the malformed request.</description><content:encoded><![CDATA[<p>A vulnerability exists in Netty&rsquo;s HTTP/1.1 chunked transfer encoding extension parsing, specifically in how it handles quoted strings. This flaw, discovered during research into &ldquo;Funky Chunks&rdquo; HTTP request smuggling techniques, stems from Netty terminating chunk header parsing at <code>\r\n</code> inside quoted strings, instead of rejecting the request as malformed. This behavior deviates from RFC 9110, which mandates that CR (<code>%x0D</code>) and LF (<code>%x0A</code>) bytes are not permitted inside chunk extensions. This parsing differential allows attackers to smuggle HTTP requests. Versions affected include netty-codec-http &lt; 4.1.132.Final and netty-codec-http versions &gt;= 4.2.0.Alpha1 and &lt; 4.2.10.Final. This matters for defenders because successful exploitation can lead to severe consequences, including cache poisoning and session hijacking.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a crafted HTTP request with chunked transfer encoding.</li>
<li>The request includes a chunk extension containing a quoted string with embedded <code>\r\n</code> characters. For example: <code>1;a=&quot;\r\n</code>.</li>
<li>Netty&rsquo;s HTTP parser incorrectly terminates the chunk header parsing at the embedded <code>\r\n</code>.</li>
<li>The remaining portion of the intended chunk extension and the subsequent chunk data are interpreted as the beginning of a new HTTP request.</li>
<li>The attacker injects a smuggled HTTP request, such as <code>GET /smuggled HTTP/1.1</code>.</li>
<li>The vulnerable server processes both the initial and smuggled requests on the same connection.</li>
<li>The smuggled request is executed, potentially bypassing security controls or accessing sensitive data.</li>
<li>The server returns responses for both requests, potentially leading to cache poisoning or other malicious outcomes.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to request smuggling, allowing attackers to inject arbitrary HTTP requests into a connection. This can result in cache poisoning, where smuggled responses may poison shared caches. Additionally, access control bypasses can occur, where smuggled requests circumvent frontend security controls. Session hijacking is also possible, where smuggled requests may intercept responses intended for other users. The impact is significant as it can compromise the confidentiality, integrity, and availability of web applications and services using vulnerable Netty versions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Netty version 4.1.132.Final or 4.2.10.Final or later to remediate CVE-2026-33870.</li>
<li>Deploy the Sigma rule &ldquo;Detect Netty Chunked Transfer Encoding Request Smuggling&rdquo; to identify potentially malicious requests exploiting this vulnerability.</li>
<li>Inspect web server logs for HTTP requests with chunked transfer encoding and chunk extensions containing quoted strings with embedded carriage returns and line feeds (<code>\r\n</code>) to identify exploitation attempts.</li>
<li>Monitor network traffic for connections to 127.0.0.1 on port 8080 which is used in the proof of concept for request smuggling.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>netty</category><category>request-smuggling</category><category>http</category></item></channel></rss>