Web Cache Poisoning via Fat GET Requests: Exploiting Cache Key Flaws
文章探讨了包含消息体的GET请求如何导致Web缓存中毒。攻击者利用服务器对这类请求的处理漏洞,在缓存中注入恶意内容,引发跨站脚本(XSS)和基于缓存的攻击。 2025-9-9 05:4:51 Author: infosecwriteups.com(查看原文) 阅读量:12 收藏

Bash Overflow

Learn how fat GET requests enable web cache poisoning by exploiting mismatched cache key handling, and why this vulnerability can escalate into widespread XSS and cache-based attacks.

🔓 Free Link

Press enter or click to view image in full size

Web Cache Poisoning via Fat GET Requests: Exploiting Cache Key Flaws

Disclaimer:
The techniques described in this document are intended solely for ethical use and educational purposes. Unauthorized use of these methods outside approved environments is strictly prohibited, as it is illegal, unethical, and may lead to severe consequences.

It is crucial to act responsibly, comply with all applicable laws, and adhere to established ethical guidelines. Any activity that exploits security vulnerabilities or compromises the safety, privacy, or integrity of others is strictly forbidden.

Table of Contents

  1. Summary of the Vulnerability
  2. Steps to Reproduce & Proof of Concept (PoC)
  3. Impact

Summary of the Vulnerability

In this scenario, the application accepts GET requests that contain a message body. While GET requests are traditionally expected to be body-less, some servers and frameworks still allow them. The critical flaw lies in how the cache mechanism processes these requests: it…


文章来源: https://infosecwriteups.com/web-cache-poisoning-via-fat-get-requests-exploiting-cache-key-flaws-37e8d5030a2d?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh