<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Request Smuggling — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/request-smuggling/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 15 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/request-smuggling/feed.xml" rel="self" type="application/rss+xml"/><item><title>Jetty HTTP Request Smuggling via Chunked Extension Quoted-String Parsing</title><link>https://feed.craftedsignal.io/briefs/2026-04-jetty-request-smuggling/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-jetty-request-smuggling/</guid><description>Jetty is vulnerable to HTTP request smuggling due to improper parsing of quoted strings in HTTP/1.1 chunked transfer encoding extension values, potentially allowing attackers to inject arbitrary HTTP requests, poison caches, and bypass security controls.</description><content:encoded><![CDATA[<p>Jetty versions 9.4.0 through 12.1.6 are vulnerable to HTTP request smuggling due to incorrect parsing of quoted strings in HTTP/1.1 chunked transfer encoding extensions. This flaw stems from Jetty&rsquo;s premature termination of chunk header parsing upon encountering a carriage return and line feed (CRLF) sequence within a quoted string, violating RFC 9112 specifications. An attacker can exploit this vulnerability to inject malicious HTTP requests into the application&rsquo;s request stream, potentially bypassing security controls, poisoning caches, and even hijacking user sessions. This issue, identified as CVE-2026-2332, poses a significant risk to applications using affected Jetty versions. The vulnerability was discovered during research into &ldquo;Funky Chunks&rdquo; HTTP request smuggling techniques and highlights the importance of rigorous adherence to RFC specifications in HTTP server implementations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a crafted HTTP POST request with chunked transfer encoding to a vulnerable Jetty server.</li>
<li>The chunk header includes a quoted string within the chunk extension, containing a CRLF sequence. For example: <code>Chunk: 1;a=&quot;\r\n</code>.</li>
<li>Jetty incorrectly parses the chunk header, terminating parsing at the CRLF within the quoted string.</li>
<li>The remaining portion of the intended chunk extension and subsequent data are interpreted as the beginning of a new HTTP request.</li>
<li>The attacker injects a malicious HTTP GET request intended to be smuggled, such as <code>GET /smuggled HTTP/1.1</code>.</li>
<li>The smuggled request is processed by the server, potentially bypassing frontend security checks.</li>
<li>The server responds to the smuggled request.</li>
<li>The attacker may use the smuggled request to poison the cache, bypass access controls, or potentially hijack user sessions by intercepting sensitive data in the smuggled response.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to inject arbitrary HTTP requests into the application&rsquo;s request stream. This can lead to several severe consequences, including: cache poisoning, where malicious content is served to legitimate users; access control bypass, enabling unauthorized access to sensitive resources; and session hijacking, allowing attackers to impersonate other users. The vulnerability impacts Jetty versions 9.4.0 through 12.1.6. The number of affected installations is currently unknown. The primary target is any web application utilizing a vulnerable version of Jetty.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a patched version of Jetty that addresses CVE-2026-2332.</li>
<li>Deploy the Sigma rule <code>Detect Jetty HTTP Request Smuggling</code> to your SIEM and tune for your environment to detect exploitation attempts.</li>
<li>Inspect web server logs for malformed chunk headers containing CRLF sequences within quoted strings, as this indicates a potential exploitation attempt.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>request-smuggling</category><category>jetty</category><category>CVE-2026-2332</category><category>webserver</category></item><item><title>Eclipse Jetty HTTP/1.1 Request Smuggling via Chunk Extensions (CVE-2026-2332)</title><link>https://feed.craftedsignal.io/briefs/2026-04-jetty-smuggling/</link><pubDate>Tue, 14 Apr 2026 12:16:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-jetty-smuggling/</guid><description>Eclipse Jetty's HTTP/1.1 parser is vulnerable to request smuggling due to improper handling of chunk extensions, allowing attackers to inject malicious requests.</description><content:encoded><![CDATA[<p>Eclipse Jetty is susceptible to request smuggling attacks (CVE-2026-2332) due to a flaw in its HTTP/1.1 parser. The vulnerability stems from the parser&rsquo;s failure to properly handle chunk extensions within chunked transfer encoding. Specifically, Jetty incorrectly terminates chunk extension parsing at a carriage return and line feed (\r\n) sequence inside quoted strings, rather than treating it as an error. This behavior allows attackers to inject arbitrary HTTP requests by crafting malformed chunk extensions, potentially bypassing security controls and gaining unauthorized access to resources. The &ldquo;funky chunks&rdquo; research highlights similar attack vectors, underscoring the severity of this vulnerability. This issue impacts all Jetty users and requires immediate attention from security teams.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker sends an HTTP POST request to the targeted Jetty server.</li>
<li>The request includes the <code>Transfer-Encoding: chunked</code> header to enable chunked transfer encoding.</li>
<li>The attacker crafts a malformed chunk extension that includes an unclosed quoted string containing a newline (<code>\r\n</code>). Example: <code>1;ext=&quot;val\r\nX</code>.</li>
<li>Jetty&rsquo;s HTTP/1.1 parser incorrectly terminates the chunk extension parsing at the newline within the quoted string.</li>
<li>The parser then interprets the subsequent data (e.g., <code>0\r\n\r\nGET /smuggled HTTP/1.1\r\n...</code>) as a new, smuggled HTTP request.</li>
<li>Jetty processes the smuggled request as if it were a legitimate request from the client.</li>
<li>The smuggled request can be used to access restricted resources, modify data, or perform other malicious actions.</li>
<li>The attacker gains unauthorized access or control over the application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this request smuggling vulnerability (CVE-2026-2332) can lead to severe consequences, including unauthorized access to sensitive data, modification of application functionality, and complete compromise of the web application. The number of potential victims is extensive, as Jetty is a widely used web server and servlet container. Sectors at risk include any organization that uses Jetty, such as finance, healthcare, and e-commerce. The CVSS v3.1 base score for this vulnerability is 7.4, indicating a high level of severity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the official patch or upgrade to a version of Jetty that addresses CVE-2026-2332 as soon as possible.</li>
<li>Deploy the Sigma rule &ldquo;Detect Jetty Request Smuggling via Malformed Chunk Extensions&rdquo; to identify and alert on exploitation attempts (see rules).</li>
<li>Inspect web server access logs for unusual patterns in chunked requests, particularly those with long or malformed chunk extensions (see &ldquo;webserver&rdquo; log source).</li>
<li>Block access to the malicious URLs <code>https://w4ke.info/2025/06/18/funky-chunks.html</code> and <code>https://w4ke.info/2025/10/29/funky-chunks-2.html</code> at your web proxy or firewall as these are related to the attack techniques (see IOCs).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>request-smuggling</category><category>jetty</category><category>cve-2026-2332</category><category>funky-chunks</category></item><item><title>Apache Traffic Server Vulnerabilities Leading to Denial of Service</title><link>https://feed.craftedsignal.io/briefs/2026-04-apache-traffic-server-dos/</link><pubDate>Tue, 07 Apr 2026 11:24:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-apache-traffic-server-dos/</guid><description>A remote attacker can exploit multiple vulnerabilities in Apache Traffic Server to conduct a denial of service or request smuggling attack.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities exist within Apache Traffic Server that could allow a remote attacker to conduct denial-of-service (DoS) or request smuggling attacks. While specific CVEs aren&rsquo;t provided in the advisory, the potential impact on service availability and data integrity is significant. Apache Traffic Server is a high-performance caching proxy server. Successful exploitation of these vulnerabilities can disrupt or completely halt services relying on the Traffic Server, leading to financial losses, reputational damage, and operational disruption. Defenders should prioritize identifying and mitigating potential exploitation attempts targeting their Traffic Server instances. The broad nature of the advisory necessitates a proactive approach to monitoring and detection.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Apache Traffic Server instance accessible over the network.</li>
<li>The attacker crafts malicious HTTP requests designed to exploit the identified vulnerabilities (e.g., by triggering excessive resource consumption).</li>
<li>The attacker sends the crafted requests to the Traffic Server, potentially exploiting parsing flaws.</li>
<li>The Traffic Server processes the malicious requests, leading to resource exhaustion (CPU, memory).</li>
<li>As resources become depleted, the Traffic Server&rsquo;s performance degrades significantly.</li>
<li>Legitimate user requests are delayed or dropped due to the server&rsquo;s overload.</li>
<li>The Traffic Server eventually becomes unresponsive, resulting in a denial-of-service condition.</li>
<li>Alternatively, the attacker crafts requests that exploit request smuggling vulnerabilities to potentially bypass security controls or poison the cache.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities can lead to a complete denial-of-service condition, rendering web services unavailable. This can result in significant financial losses, reputational damage, and disruption to business operations. The impact is amplified for organizations heavily reliant on their web infrastructure, where even brief outages can have severe consequences. The advisory lacks specific victim numbers, but the risk extends to any organization utilizing a vulnerable version of Apache Traffic Server. The request smuggling vulnerability may also lead to cache poisoning, impacting downstream clients.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for unusual patterns indicative of request smuggling or denial of service attempts, using the provided Sigma rules for guidance (logsource: webserver).</li>
<li>Investigate and analyze any spikes in resource consumption (CPU, memory, network) on servers running Apache Traffic Server to identify potential DoS attacks.</li>
<li>Implement rate limiting and traffic shaping to mitigate the impact of potential denial of service attacks, based on the recommendations for webserver configurations.</li>
<li>Continuously monitor for new advisories and security patches related to Apache Traffic Server, and apply updates promptly.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>apache</category><category>traffic server</category><category>denial of service</category><category>request smuggling</category></item><item><title>Undertow Request Smuggling Vulnerability (CVE-2026-28368)</title><link>https://feed.craftedsignal.io/briefs/2026-03-undertow-request-smuggling/</link><pubDate>Sat, 28 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-undertow-request-smuggling/</guid><description>CVE-2026-28368 is a vulnerability in Undertow that allows a remote attacker to construct specially crafted requests, leading to request smuggling attacks and potential bypass of security controls, resulting in unauthorized resource access.</description><content:encoded>&lt;p>CVE-2026-28368 is a critical vulnerability found in the Undertow web server. This flaw enables a remote attacker to craft specialized HTTP requests that Undertow parses differently compared to upstream proxies. This discrepancy allows attackers to conduct request smuggling attacks, effectively bypassing security measures and potentially gaining unauthorized access to sensitive resources. The vulnerability stems from inconsistent interpretation of HTTP requests, which is a common issue in web…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>undertow</category><category>request-smuggling</category><category>cve-2026-28368</category></item><item><title>Undertow HTTP Request Smuggling Vulnerability (CVE-2026-28367)</title><link>https://feed.craftedsignal.io/briefs/2026-03-undertow-smuggling/</link><pubDate>Fri, 27 Mar 2026 17:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-undertow-smuggling/</guid><description>A remote attacker can exploit CVE-2026-28367 in Undertow by sending '\r\r\r' as a header block terminator, leading to request smuggling on vulnerable proxy servers.</description><content:encoded>&lt;p>CVE-2026-28367 is a request smuggling vulnerability found in Undertow, a flexible performant server-side Java web server. The vulnerability arises from improper handling of HTTP header block terminators. Specifically, a remote attacker can send &lt;code>\r\r\r&lt;/code> as a header block terminator, which can be misinterpreted by certain proxy servers. This allows the attacker to potentially smuggle malicious requests, bypassing security controls and gaining unauthorized access to resources or manipulating…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>request-smuggling</category><category>undertow</category><category>webserver</category></item><item><title>Netty HTTP Request Smuggling via Chunked Extension Quoted-String Parsing</title><link>https://feed.craftedsignal.io/briefs/2026-04-netty-chunked-smuggling/</link><pubDate>Thu, 26 Mar 2026 18:51:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-netty-chunked-smuggling/</guid><description>Netty incorrectly parses quoted strings in HTTP/1.1 chunked transfer encoding extension values, enabling request smuggling attacks by terminating chunk header parsing at \r\n inside quoted strings instead of rejecting the malformed request.</description><content:encoded><![CDATA[<p>A vulnerability exists in Netty&rsquo;s HTTP/1.1 chunked transfer encoding extension parsing, specifically in how it handles quoted strings. This flaw, discovered during research into &ldquo;Funky Chunks&rdquo; HTTP request smuggling techniques, stems from Netty terminating chunk header parsing at <code>\r\n</code> inside quoted strings, instead of rejecting the request as malformed. This behavior deviates from RFC 9110, which mandates that CR (<code>%x0D</code>) and LF (<code>%x0A</code>) bytes are not permitted inside chunk extensions. This parsing differential allows attackers to smuggle HTTP requests. Versions affected include netty-codec-http &lt; 4.1.132.Final and netty-codec-http versions &gt;= 4.2.0.Alpha1 and &lt; 4.2.10.Final. This matters for defenders because successful exploitation can lead to severe consequences, including cache poisoning and session hijacking.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a crafted HTTP request with chunked transfer encoding.</li>
<li>The request includes a chunk extension containing a quoted string with embedded <code>\r\n</code> characters. For example: <code>1;a=&quot;\r\n</code>.</li>
<li>Netty&rsquo;s HTTP parser incorrectly terminates the chunk header parsing at the embedded <code>\r\n</code>.</li>
<li>The remaining portion of the intended chunk extension and the subsequent chunk data are interpreted as the beginning of a new HTTP request.</li>
<li>The attacker injects a smuggled HTTP request, such as <code>GET /smuggled HTTP/1.1</code>.</li>
<li>The vulnerable server processes both the initial and smuggled requests on the same connection.</li>
<li>The smuggled request is executed, potentially bypassing security controls or accessing sensitive data.</li>
<li>The server returns responses for both requests, potentially leading to cache poisoning or other malicious outcomes.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to request smuggling, allowing attackers to inject arbitrary HTTP requests into a connection. This can result in cache poisoning, where smuggled responses may poison shared caches. Additionally, access control bypasses can occur, where smuggled requests circumvent frontend security controls. Session hijacking is also possible, where smuggled requests may intercept responses intended for other users. The impact is significant as it can compromise the confidentiality, integrity, and availability of web applications and services using vulnerable Netty versions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Netty version 4.1.132.Final or 4.2.10.Final or later to remediate CVE-2026-33870.</li>
<li>Deploy the Sigma rule &ldquo;Detect Netty Chunked Transfer Encoding Request Smuggling&rdquo; to identify potentially malicious requests exploiting this vulnerability.</li>
<li>Inspect web server logs for HTTP requests with chunked transfer encoding and chunk extensions containing quoted strings with embedded carriage returns and line feeds (<code>\r\n</code>) to identify exploitation attempts.</li>
<li>Monitor network traffic for connections to 127.0.0.1 on port 8080 which is used in the proof of concept for request smuggling.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>netty</category><category>request-smuggling</category><category>http</category></item></channel></rss>