Analysis of 9 Advanced Cache Poisoning Chains (Glassdoor, Next.js, DoD) - Part 2
Hey everyone, Following up 2025-11-27 13:7:19 Author: www.reddit.com(查看原文) 阅读量:2 收藏

r/netsecstudents - Analysis of 9 Advanced Cache Poisoning Chains (Glassdoor, Next.js, DoD) - Part 2

Hey everyone,

Following up on Part 1 (Historical attacks), I just finished analyzing Part 2, which focuses on modern cache poisoning vectors involving cloud platforms and frameworks.

The Case Studies analyzed:

  • Glassdoor: CSRF Token Leak → Stored XSS chain.

  • Next.js: RSC (React Server Components) & SSR cache confusion.

  • U.S. DoD: Sustained DoS via cache busting.

  • Shopify: Backslash/Forward slash normalization DoS.

  • Mozilla: 404 Error poisoning.

The Next.js finding is particularly interesting for anyone running Vercel/SSR setups, as it shows how 'smart' caching headers can introduce conflicts.

Full technical breakdown is here: [Link]

Let me know in the comments if you've seen the Next.js RSC issues in the wild yet.


文章来源: https://www.reddit.com/r/netsecstudents/comments/1p81rxx/analysis_of_9_advanced_cache_poisoning_chains/
如有侵权请联系:admin#unsafe.sh