Cache Key Injection: Chaining Cache-Poisoning and CRLF Using an Unkeyed Parameter
文章探讨了缓存密钥注入这一隐蔽但强大的Web应用漏洞。该漏洞源于未验证的用户输入被纳入反向代理、CDN或其他缓存层使用的缓存密钥中。攻击者可借此注入恶意数据,导致大规模缓存中毒,对现代Web应用构成严重威胁。 2026-1-5 13:14:32 Author: infosecwriteups.com(查看原文) 阅读量:7 收藏

Bash Overflow

Learn how cache key injection works, why it leads to large-scale cache poisoning, and the real-world risks for modern web applications.

🔓 Free Link

Press enter or click to view image in full size

Cache Key Injection: Chaining Cache-Poisoning and CRLF Using an Unkeyed Parameter

Disclaimer:
The techniques described in this document are intended solely for ethical use and educational purposes. Unauthorized use of these methods outside approved environments is strictly prohibited, as it is illegal, unethical, and may lead to severe consequences.

It is crucial to act responsibly, comply with all applicable laws, and adhere to established ethical guidelines. Any activity that exploits security vulnerabilities or compromises the safety, privacy, or integrity of others is strictly forbidden.

Table of Contents

  1. Summary of the Vulnerability
  2. Steps to Reproduce & Proof of Concept (PoC)
  3. Impact

Summary of the Vulnerability

Cache key injection is a subtle but powerful web application flaw that arises when unvalidated input is incorporated into the cache key used by a reverse proxy, CDN, or other caching layer. In this lab scenario, the site’s caching mechanism mistakenly includes attacker-supplied header data (via the…


文章来源: https://infosecwriteups.com/cache-key-injection-chaining-cache-poisoning-and-crlf-using-an-unkeyed-parameter-b9e8b7be00a1?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh