Skip to content

wrbrand/minimal_web_cache_poisoning_example

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 

Repository files navigation

Minimal example of a web cache poisoning attack

Consider:

  1. Attacker visits http://localhost:3000/random/299?tracking_id='><script>alert("XSS")</script>

    Note: tracking_id must be XSSable, included in the cached data, and excluded from the cache key; the cache for 299 must be empty (as, in practice, it often is)

  2. Victim visits http://localhost:3000/random/299 and is served stored XSS

    Note: Browser protections don't help (since stored). No requirement that attacker communicate the URL to the victim.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published