← Back to BrewedIntel
vulnerabilitymediumHTTP Request SmugglingWeb Application Attack

Sep 18, 2025 • PortSwigger Research

How to join the desync endgame: Practical tips from pentester Tom Stacey

This article features insights from pentester Tom Stacey regarding HTTP Request Smuggling, a vulnerability class persisting for over two decades. Despite its...

Source
PortSwigger Research
Category
vulnerability
Severity
medium

Executive Summary

This article features insights from pentester Tom Stacey regarding HTTP Request Smuggling, a vulnerability class persisting for over two decades. Despite its age, the technique remains exploitable within modern web infrastructures, posing significant risks to server security. The post aims to provide practical tips for understanding and potentially testing these desync vulnerabilities. While specific campaign details or malicious actors are not identified, the persistence of this issue highlights ongoing weaknesses in HTTP parsing implementations. Organizations should prioritize reviewing web server configurations and implementing robust input validation to mitigate risks associated with request smuggling attacks. Security teams are encouraged to understand the mechanics of desync endgames to better defend against potential exploitation vectors that bypass standard security controls. Continued research into these legacy vulnerabilities is essential for maintaining robust application security postures against evolving web threats.

Summary

Note: This is a guest post by pentester and researcher, Tom Stacey (@t0xodile). You'd think that after almost 21 years since its initial public discovery, HTTP Request Smuggling would be barely exploi

Published Analysis

This article features insights from pentester Tom Stacey regarding HTTP Request Smuggling, a vulnerability class persisting for over two decades. Despite its age, the technique remains exploitable within modern web infrastructures, posing significant risks to server security. The post aims to provide practical tips for understanding and potentially testing these desync vulnerabilities. While specific campaign details or malicious actors are not identified, the persistence of this issue highlights ongoing weaknesses in HTTP parsing implementations. Organizations should prioritize reviewing web server configurations and implementing robust input validation to mitigate risks associated with request smuggling attacks. Security teams are encouraged to understand the mechanics of desync endgames to better defend against potential exploitation vectors that bypass standard security controls. Continued research into these legacy vulnerabilities is essential for maintaining robust application security postures against evolving web threats. Note: This is a guest post by pentester and researcher, Tom Stacey (@t0xodile). You'd think that after almost 21 years since its initial public discovery, HTTP Request Smuggling would be barely exploi Note: This is a guest post by pentester and researcher, Tom Stacey (@t0xodile). You'd think that after almost 21 years since its initial public discovery, HTTP Request Smuggling would be barely exploi