HTTP request smuggling, basic CL.TE vulnerability
Hint: Manually fixing the length fields in request smuggling attacks can be tricky. Our HTTP Request Smuggler Burp extension was designed to help. You can install it via the BApp Store.
intercept with burp and this is what we got.
So, the front-end server uses the Content-Length header and the back-end server uses the Transfer-Encoding header.
so the actual content length is 6 but we smuggle in 10? I'm a little confused tbh. Becuase I tried differnet content length with more text but...