Skip to content

Conversation

@Galaxy-sc
Copy link
Contributor

This PR covers issue #1307.

  • This PR handles the issue and requires no additional PRs.
  • You have validated the need for this change.

What did this PR accomplish?

  • Modernized & Decoupled WSTG-INPV-15: - Refactored section 4.7.15 to focus exclusively on HTTP Response Splitting (CRLF Injection).

    • Removed outdated legacy smuggling examples to ensure clear separation of concerns.
    • Updated the content to reflect modern attack scenarios and added a dedicated Remediation section.
  • Overhauled WSTG-INPV-16: - Renamed from "Testing for HTTP Incoming Requests" to "Testing for HTTP Request Smuggling".

    • Replaced the legacy proxy tooling guide (which was out of scope for Input Validation) with a comprehensive guide on HTTP Request Smuggling.
    • Added detailed testing methodologies for CL.TE, TE.CL, TE.TE, HTTP/2 Downgrade, and H2C Smuggling.

Thank you!

- Renamed 4.7.15 from 'HTTP Splitting Smuggling' to 'HTTP Response Splitting' to decouple it from Request Smuggling.
- Modernized the content of WSTG-INPV-15.
- Updated Table of Contents and all internal links throughout the project to point to the new filename.
- Replaced legacy 'Testing for HTTP Incoming Requests' (which was a proxy tooling guide) with a dedicated 'Testing for HTTP Request Smuggling' guide.
- Added methodologies for detecting CL.TE, TE.CL, TE.TE, H2C, and HTTP2 Downgrade Smuggling.
- Renamed file to reflect the new scope.
- Updated Table of Contents and all internal links throughout the project to point to the new filename.
- Closes OWASP#1307
@github-actions
Copy link

The following links are broken:
FILE:base/document/4-Web_Application_Security_Testing/07-Input_Validation_Testing/15-Testing_for_HTTP_Response_Splitting.md
[❌] https://web.archive.org/web/20210816212852/https://www.cgisecurity.com/lib/http-request-smuggling.pdf → Status: 0

@Galaxy-sc
Copy link
Contributor Author

@kingthorin The link checker failed on the Archive.org URL for "HTTP Request Smuggling" (cgisecurity.com), likely due to a timeout or bot protection. I've verified manually that the link is valid and accessible. This appears to be a false positive.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant