Cache Key Injection: Chaining Cache-Poisoning and CRLF Using an Unkeyed Parameter
缓存密钥注入是一种严重的Web应用漏洞,当未验证的用户输入被用于生成缓存密钥时发生。攻击者可利用此漏洞在反向代理或CDN中注入恶意数据,导致大规模缓存中毒,并结合CRLF注入发起进一步攻击,对现代Web应用构成重大威胁。 2026-1-5 13:14:32 Author: infosecwriteups.com(查看原文) 阅读量:8 收藏

Bash Overflow

Learn how cache key injection works, why it leads to large-scale cache poisoning, and the real-world risks for modern web applications.

🔓 Free Link

Press enter or click to view image in full size

Cache Key Injection: Chaining Cache-Poisoning and CRLF Using an Unkeyed Parameter

Disclaimer:
The techniques described in this document are intended solely for ethical use and educational purposes. Unauthorized use of these methods outside approved environments is strictly prohibited, as it is illegal, unethical, and may lead to severe consequences.

It is crucial to act responsibly, comply with all applicable laws, and adhere to established ethical guidelines. Any activity that exploits security vulnerabilities or compromises the safety, privacy, or integrity of others is strictly forbidden.

Table of Contents

  1. Summary of the Vulnerability
  2. Steps to Reproduce & Proof of Concept (PoC)
  3. Impact

Summary of the Vulnerability

Cache key injection is a subtle but powerful web application flaw that arises when unvalidated input is incorporated into the cache key used by a reverse proxy, CDN, or other caching layer. In this lab scenario, the site’s caching mechanism mistakenly includes attacker-supplied header data (via the…


文章来源: https://infosecwriteups.com/cache-key-injection-chaining-cache-poisoning-and-crlf-using-an-unkeyed-parameter-b9e8b7be00a1?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh