To inject newlines into HTTP/2 headers, use the Inspector to drill down into the header, then press the Shift + Return
keys. Note that this feature is not available when you double-click on the header.
Lab: HTTP/2 request splitting via CRLF injection
This lab is vulnerable to request smuggling because the front-end server downgrades HTTP/2 requests and fails to adequately sanitize incoming headers.
To solve the lab, delete the user carlos
by using response queue poisoning to break into the admin panel at /admin
. An admin user will log in approximately every 10 seconds.
The connection to the back-end is reset every 10 requests, so don't worry if you get it into a bad state - just send a few normal requests to get a fresh connection.