URL Normalization Turns a Harmless Request into a Cache-Poisoned XSS Attack
文章探讨了URL规范化漏洞如何导致缓存中毒和跨站脚本(XSS)攻击。浏览器自动编码阻止直接执行payload,但缓存服务器在存储前对URL进行规范化处理,使无害请求变为带有缓存中毒的XSS攻击。 2025-9-12 05:20:40 Author: infosecwriteups.com(查看原文) 阅读量:3 收藏

Bash Overflow

Learn how URL normalization flaws can lead to cache poisoning and cross-site scripting (XSS).

🔓 Free Link

Press enter or click to view image in full size

URL Normalization Turns a Harmless Request into a Cache-Poisoned XSS Attack

Disclaimer:
The techniques described in this document are intended solely for ethical use and educational purposes. Unauthorized use of these methods outside approved environments is strictly prohibited, as it is illegal, unethical, and may lead to severe consequences.

It is crucial to act responsibly, comply with all applicable laws, and adhere to established ethical guidelines. Any activity that exploits security vulnerabilities or compromises the safety, privacy, or integrity of others is strictly forbidden.

Table of Contents

  1. Summary of the Vulnerability
  2. Steps to Reproduce & Proof of Concept (PoC)
  3. Impact

Summary of the Vulnerability

In this lab, the core weakness lies in how the web cache and browser handle URLs differently. The application contains an XSS vulnerability, but browsers automatically apply URL-encoding, which prevents the payload from executing directly. However, the cache performs normalization of the URL before storing and serving it.


文章来源: https://infosecwriteups.com/url-normalization-turns-a-harmless-request-into-a-cache-poisoned-xss-attack-57d1a68f08d2?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh