DEV Community

Gincy Mol A G
Gincy Mol A G

Posted on • Edited on

2 1

Web Cache Poisoning

Web cache poisoning attacks target the intermediate storage points such as POP servers, load balancers, proxies etc which reside between web servers and client devices.

Instead of passing to the server a request that the CDN already knows its response to (static file), it can return a response immediately to the client and reduce both server load and response time when the cache responds.

The response caches to avoid wasting time processing requests frequently send to Servers and CDNs (Content delivery networks, Cloudflare for example).

Web cache poisoning involves two phases:

  • Attackers must obtain a response from the back-end server that recklessly contains some kind of dangerous payload.
  • After the successful request, make sure that the response is cached and subsequently served to the intended victims.

Even Though being a known vulnerability, web cache poisoning continues to turn up around the web.

In wide research of numerous websites, including some most popular internet services, security researcher Iustin Ladunca (Youstin) discovered 70 cache poisoning vulnerabilities recently with diverse impacts.


More detailed version along with how you can avoid these vulnerabilities is published at : https://beaglesecurity.com/blog/vulnerability/web-cache-poisoning.html

Hostinger image

Get n8n VPS hosting 3x cheaper than a cloud solution

Get fast, easy, secure n8n VPS hosting from $4.99/mo at Hostinger. Automate any workflow using a pre-installed n8n application and no-code customization.

Start now

Top comments (0)

A Workflow Copilot. Tailored to You.

Pieces.app image

Our desktop app, with its intelligent copilot, streamlines coding by generating snippets, extracting code from screenshots, and accelerating problem-solving.

Read the docs

👋 Kindness is contagious

Please leave a ❤️ or a friendly comment on this post if you found it helpful!

Okay