Cache Crash: How I Poisoned CDN Responses and Became Every User Simultaneously
文章描述了一次通过CDN配置错误发现缓存中毒、会话劫持和数据泄露等安全漏洞的过程,并展示了如何利用这些漏洞实现账户接管的攻击过程。 2025-10-4 07:23:32 Author: infosecwriteups.com(查看原文) 阅读量:29 收藏

Iski

Free link 🎈

Hey there!😁

Press enter or click to view image in full size

Image by AI

From discovering cache poisoning vulnerabilities to session hijacking, data leakage, and full account takeover. Join my journey of exploiting CDN misconfigurations with advanced techniques. Full PoC included. ☕

My grandma always said “Don’t eat food that’s been sitting out too long!” but she never warned me about cached responses that serve everyone’s private data! 😂 There I was, like Ben 10 discovering a new alien… “It’s hero time! Cache poisoning transformation!” 🦸♂️

It all started when I was testing cdn.enterprise-app.com and noticed something weird - the same URL was showing different users' data! "Whoa! This is like when the Omnitrix glitches and mixes aliens!"

🎯 Phase 1: The Cache Key Discovery

Ben 10 mode: “Gwen, I need to figure out how this caching system works!”


文章来源: https://infosecwriteups.com/cache-crash-how-i-poisoned-cdn-responses-and-became-every-user-simultaneously-6261a2e966b4?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh