Hello @CodeAutoEngineer,
Welcome to Microsoft Q&A Platform. Thank you for reaching out & hope you are doing well.
I understand your question about the Client-Side Desync (CSD) Reported. Thank you for providing the detailed background and analysis of the CSD findings. After reviewing your Azure Front Door and Azure Storage Static Website configuration, we have determined that this is a false positive and not an exploitable vulnerability.
No Actual Desync Risk
- Azure Storage Static Websites support only GET and HEAD requests. Any POST, PUT, or other HTTP methods will be rejected with a 405 (Method Not Allowed) or 400 (Bad Request) response before body parsing or persistent connection handling occurs.
- Azure Front Door ends client connections at the edge and manages malformed requests by returning 302 or 400 responses as appropriate.
- Desync or request smuggling attacks rely on stateful backend connections and incomplete HTTP parsing, which are not present in your configuration.
Known False Positive Automated scanners such as Burp Suite may flag static sites that reject POST requests as “CSD” because of their general detection methods. This is recognized as a known false positive when using Front Door with Azure Storage static website setups
Next Steps
- Indicate this as a false positive in your vulnerability management report.
- You may choose to set up Burp Suite to exclude static paths from CSD scans.
- No further configuration changes are needed for Azure Front Door or Storage
Kindly let us know if the above helps or you need further assistance on this issue.
Please do not forget to "Accept the answer” and “up-vote it” wherever the information provided helps you, this can be beneficial to other community members__.__ It would be greatly appreciated and helpful to others.