How I Found the Worst ASP.NET Vulnerability — A $10K Bug (CV... #1567
+67
−3
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
CVE-2025-55315 is a high-severity (CVSS 9.9) HTTP/1.1 request-smuggling flaw in ASP.NET Core Kestrel caused by lenient parsing of chunked transfer-encoding extensions. Kestrel’s HTTP/1 chunk parser accepts a lone line feed (
\n) inside the chunk-extension field and continues scanning until it encounters\r\n, while many front-end proxies treat a lone\nas a line terminator. This front/back-end parsing d...🔧 Technical Details
Chunk-extension newline abuse (TERM.EXT): In HTTP/1.1 chunked requests, put a single
\ninside the chunk-extension (after;) so lenient back-ends keep scanning for\r\nwhile some proxies treat the\nas a line terminator. Place a second HTTP request after chunk framing; the proxy thinks these bytes are chunk data, but the back-end parses them as a pipelined request. This lets you tunnel restricted routes, capture victim requests, or poison caches across any stack where front/back-end extension parsing diverges.🤖 Agent Actions
I analyzed the repository and found the best place to add this content is the existing Pentesting Web → HTTP Request Smuggling page:
src/pentesting-web/http-request-smuggling/README.md
What I did:
Files modified:
No new files were created.
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.
📚 Repository Maintenance
All .md files have been checked for proper formatting (headers, includes, etc.).