The system uses one or more entities, such as a proxy or a firewall, to process requests between the client and the server. These entities do not process HTTP requests consistently, thus making it possible to post malformed requests to get one of the entities to process a request without the other ones noticing it. The reason the entities do not process the requests consistently is that the web server software each one uses delimits requests differently.
Allow an attacker to send an ambiguous HTTP request between front-end and back-end system.
Use the same web servers software on the front-end and back-end servers, making the delimiters among the requests coincide each other.
Unauthorized attacker from the Internet.
⌚ 45 minutes.
Default score using CVSS 3.1. It may change depending on the context of the src.
Default score using CVSS 4.0. It may change depending on the context of the src.