HTTP Request Smuggling Strikes Again: Akamai and Cloudflare in the Hot Seat!
HTTP request smuggling strikes again, as new variants wreak havoc on major content delivery networks. James Kettle and his team exposed vulnerabilities at Black Hat, prompting Akamai and Cloudflare to scramble for fixes and dish out bug bounties. Who knew smuggling requests could cause such a digital ruckus?

Hot Take:
Ah, HTTP request smuggling—a timeless classic for hackers, but with a modern twist! Just when you thought your data was safe behind a content delivery network, it turns out those sneaky attackers are still finding ways to hitch a ride on your HTTP requests like uninvited guests at a digital party. Someone grab the virtual bouncer!
Key Points:
- HTTP request smuggling has been around for over 20 years, but new variants keep popping up like unwanted software updates.
- James Kettle of PortSwigger unveiled a new attack variant at the Black Hat conference, targeting major content delivery networks.
- These attacks exploit inconsistencies in how web servers process requests, leaving room for malicious requests to sneak in.
- The latest variant affected giants like Akamai and Cloudflare, leading to significant bug bounties and speedy security patches.
- Kettle suggests migrating to HTTP/2+ to avoid these pesky smuggling shenanigans.
Already a member? Log in here