image Get the whitepaper, toolkits & remediation guides → http1mustdie.com

HTTP/1.1 Must Die: What This Means for In-House Pentesters

Andrzej Matykiewicz | 06 August 2025 at 22:23 UTC


At Black Hat USA and DEFCON 2025, PortSwigger's Director of Research, James Kettle, issued a stark warning: request smuggling isn't dying out, it's evolving and thriving.

Despite years of defensive efforts, new research unveiled by Kettle proves that HTTP request smuggling (or "desync" attacks) remain not only rampant but dangerously underestimated, compromising tens of millions of supposedly well-secured websites worldwide.

In his groundbreaking new research, HTTP/1.1 Must Die: The Desync Endgame, Kettle challenges the security community to completely rethink its approach to request smuggling. He argues that, in practical terms, it's nigh on impossible to consistently and reliably determine the boundaries between HTTP/1.1 requests, especially when implemented across the chains of interconnected systems that comprise modern web architectures. Mistakes such as parsing discrepancies are inevitable, and when using upstream HTTP/1.1, even the tiniest of bugs often have critical security impact, including complete site takeover.

This research demonstrates unequivocally that patching individual implementations will never be enough to eliminate the threat of request smuggling. Using upstream HTTP/2 offers a robust solution.

If we are serious about securing the modern web, it's time to retire HTTP/1.1 for good.

Buried Bugs, Broken Assumptions

Request smuggling lives in the cracks between systems, whether that be proxies, CDNs, or distributed backends. HTTP/1.1 is full of ways for those systems to disagree about request boundaries.

PortSwigger's latest research has confirmed an uncomfortable truth: not only are request smuggling vulnerabilities still extremely prevalent, attempts to mitigate them have in fact just made them harder to spot. In many cases, these mitigations have in fact just compounded the problem by adding yet more complexity to how systems are supposed to determine where each request starts and ends.

Several major CDNs were found to be vulnerable to new desync vectors and subtle variations on well-known exploits, exposing over 24 million of their customers' websites.

This isn't an academic risk; after bypassing supposedly battle-hardened mitigations entirely, the researchers were awarded over $200,000 in bug bounties from these techniques, highlighting both the prevalence and severity of the problem.

If your stack uses HTTP/1.1, anywhere, you're relying on brittle defenses and dangerous assumptions that simply don't stand up to scrutiny.

What This Means for Your Testing

If you're the in-house pentester responsible for securing a sprawling web estate, you already know the job is never done. But some threats are so foundational, they demand a shift in strategy, not just another test case for your checklist.

If you're focused on the usual application logic, input validation, or authentication flaws, you're probably missing critical threats lurking in your stack. Desync bugs stem from infrastructure-level flaws. That's why they evade scanners and manual tests conducted using subpar tooling.

What You Can Do Right Now

As a pentester, you're tasked with continuously assessing and challenging your organization's defenses. Here's how you can take the lead:

Don't Just Patch: Push for Change

"You've got the illusion of security thanks to toy mitigations and selective hardening that only serves to break the established detection methodology. In truth, HTTP/1.1 is so densely packed with critical vulnerabilities, you can literally find them by mistake." Kettle writes.

Protecting your systems now means acknowledging that the protocol itself is broken.

This demands a shift in mindset:

PortSwigger Has Your Back

PortSwigger isn't just raising the alarm; we're arming you with the tools to act:

Burp Suite offers unmatched desync detection and exploration capabilities, thanks to rich HTTP/1 and HTTP/2 support, HTTP Request Smuggler and the new HTTP Hacker extensions. This ensures you aren't shackled by subpar tooling with superficial support for testing anything beyond simple, application-level issues.

DAST at scale: Burp Suite DAST identifies request smuggling vectors across your estate using reliable, primitive-level detection techniques that bypass flawed defences and reveal the true extent of your exposure to desync attacks.

Education-first: Our free labs and industry-defining research translate cutting-edge insights into actionable training.

Join the Desync Endgame

Test your systems. Prove the risk. Drive internal change.

And above all, join us in declaring: HTTP/1.1 must die.