It is a technique of interfering with a website processing a sequence of HTTP requests.
DIfference between http1 and http2
Most of today’s web application frequently uses a chain of HTTP servers between the user and the application. users usually send requests to frontend servers such as load balancers or reverse proxies and the requests are processed by various backend servers
This vulnerability arises as the frontend server sends several requests over the same backend network connection. HTTP requests are sent one after the other and receiving server parses the HTTP request headers to identify where the headers begin and ends
how does HTTP request vulnerability arise??
HTTP provides 2 ways to specify the end of the request by content length ..
Support the originator by clicking the read the rest link below.