Cache Poisoning using Nuclei
Discovering cache poisoning vulnerabilities using nuclei.
HTTP Headers
In this lab, we are going to use nuclei tool for discovering cache poisoning vulnerabilities on web applications.
To do this, we need to use common unkeyed inputs headers such as:
In detail, to trigger cache poisoning vulnerabilities we need two requests:
The first that causes the server to cache the poisoned response
The second will retrieve the poisoned response from the server-side.
Building the Nuclei template
To carry out this scenario, we can build our nuclei template as presented below.
We can test this template using the PortSwigger Lab here.
And yeah, we got it 😎
Bug Bounty tip
You can use this strategy to find vulnerabilities like these in bug bounty programs. To start, you can use bbscope tool to get your scope from your public and private programs (HackerOne, Bugcrowd, and Intigriti).
References
Last updated