Le 18/01/2026 à 9:23 PM, Rajat Raghav a écrit :

## Vulnerability

## Attack Scenario

```
┌──────────┐         ┌─────────────┐         ┌─────────────┐
│ Attacker │ ──1──▶  │ [PROXY]     │ ──2──▶  │ Backend     │
│          │         │ (VULNERABLE)│         │ (nginx)     │
└──────────┘         └─────────────┘         └─────────────┘

Hi,
With this setup, the extensions are just dropped during the parsing. Nginx will never see them. Now, as Willy said, these extensions are not parsed at all by HAProxy. However, I don't see any way to exploit it (at least, it is not obvious). HAProxy will see 2 requests and NGinx will reply to these both requests. So there is no smuggling. And any control that should be performed on the first request will be properly done. The same on the second request.

So now, we can argue the chunk extensions should be parsed to reply 400-bad-request in that case. But honestly I don't see the point.

--
Christopher Faulet


Reply via email to