============================================================================================================================================= | # Title : HTTP Request Smuggling (TE.CL) via Edge Cache Misconfiguration (Varnish ↔ Styx) | | # Author : indoushka | | # Tested on : windows 11 Fr(Pro) / browser : Mozilla firefox 145.0.2 (64 bits) | | # Vendor : https://pantheon.io/ | ============================================================================================================================================= [+] References : [+] Summary : A critical HTTP Request Smuggling (TE.CL) vulnerability exists due to inconsistent HTTP request parsing between the Pantheon edge caching layer (Varnish) and the backend routing layer (Styx / Nginx). The edge layer accepts ambiguous requests containing both Content-Length and Transfer-Encoding, while the backend correctly prioritizes Transfer-Encoding: chunked. This discrepancy allows an attacker to smuggle arbitrary HTTP requests, resulting in response queue poisoning and potential web cache poisoning. [+] Technical Details : Frontend (Varnish Edge Cache) Parses requests using Content-Length Does not reject dual-header ambiguity (CL + TE) Backend (Pantheon Styx / Nginx) [+] Prioritizes Transfer-Encoding: chunked Leaves smuggled payload queued for the next request [+] Vulnerability Class : Desynchronization → Response Queue Poisoning → Cache Poisoning [+] Proof of Concept (PoC) The following PoC demonstrates request smuggling by injecting a benign smuggled request and observing its response being returned for a subsequent legitimate request. [+] PoC : poc_final.php Greetings to :===================================================================================== jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * Malvuln (John Page aka hyp3rlinx)| ===================================================================================================