HTTP Request Smuggling in web application

  • Unique Paper ID: 149855
  • Volume: 7
  • Issue: 1
  • PageNo: 820-824
  • Abstract:
  • Now a day's cyber-attacks are increasing extremely on a web application, mobile apps, networks that are more vulnerable for a web application. HTTP requests are common viewed as remote, unaccompanied entities. Attackers simply modified requests and by the response of that request perform exploitation. Unauthenticated attackers delicately amend victims' requests to route them into the malicious territory, invoke harmful responses, and lure credentials into the open network. HTTP request smuggling attacks is one of the kinds of attack that triggered the back-end server through bypassing front-end server. In this paper, I'll show you how HTTP request smuggling attack performs in the real-time using website. By researching some of the articles and papers about this attack I'll figure out some methods of these attacks.

Copyright & License

Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{149855,
        author = {Kaushik Joshi and Mr. Chandresh Parekh},
        title = {HTTP Request Smuggling in web application},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {7},
        number = {1},
        pages = {820-824},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=149855},
        abstract = {Now a day's cyber-attacks are increasing extremely on a web application, mobile apps, networks that are more vulnerable for a web application. HTTP requests are common viewed as remote, unaccompanied entities. Attackers simply modified requests and by the response of that request perform exploitation. Unauthenticated attackers delicately amend victims' requests to route them into the malicious territory, invoke harmful responses, and lure credentials into the open network. HTTP request smuggling attacks is one of the kinds of attack that triggered the back-end server through bypassing front-end server. In this paper, I'll show you how HTTP request smuggling attack performs in the real-time using website. By researching some of the articles and papers about this attack I'll figure out some methods of these attacks. },
        keywords = {HTTP request smuggling, HTTP request smuggling in a web app, HTTP request smuggling attack, HTTP request smuggling vulnerability, Methods of HTTP request smuggling attack HTTP request spitting.},
        month = {},
        }

Cite This Article

  • ISSN: 2349-6002
  • Volume: 7
  • Issue: 1
  • PageNo: 820-824

HTTP Request Smuggling in web application

Related Articles