Hi team, I am trying to exploit the HTTP request smuggling vulnerability, but there is an issue with handling chunked data, CRLF is not included correctly. This is evident when I debug through the output tab.
in the body of the request, it should look like this:
0\r\n
\r\n
G\r\n
\r\n
but, in the debug output, the request sent does not match, this may be the reason why the HRS exploitation I am attempting always fails.
after 0, \r not included.
Is it possible to create something to control CRLF characters to see if they are correct (perhaps something like what exists in Burp), or is there another solution that is easier to implement?
Thanks for reading this message.