BOOK THIS SPACE FOR AD
ARTICLE ADThis lab contains a web cach e poisoning vulnerability that is only exploitable when you use multiple headers to craft a malicious request. A user visits the home page roughly once a minute. To solve this lab, poison the cache with a response that executes alert(document.cookie) in the visitor’s browser | Karthikeyan Nagaraj
This lab contains a web cache poisoning vulnerability that is only exploitable when you use multiple headers to craft a malicious request. A user visits the home page roughly once a minute. To solve this lab, poison the cache with a response that executes alert(document.cookie) in the visitor's browser.
With Burp running, load the website’s home page.Go to “Proxy” > “HTTP history” and study the requests and responses that you generated. Find the GET request for the JavaScript file /resources/js/tracking.js and send it to Burp Repeater.Add the X-Forwarded-Host: example.com header back to the request, Now add the X-Forwarded-Scheme: nothttps as well. Send this request and notice that the Location header of the 302 redirect now points to https://example.com/.Go to the exploit server and change the file name to match the path used by the vulnerable response:/resources/js/tracking.jsIn the body, enter the payload alert(document.cookie) and store the exploit.Go back to the request in Burp Repeater and set the X-Forwarded-Host header as follows, remembering to enter your own exploit server ID:
X-Forwarded-Host: YOUR-EXPLOIT-SERVER-ID.exploit-server.netMake sure the X-Forwarded-Scheme header is set to anything other than HTTPS.Send the request until you see your exploit server URL reflected in the response and X-Cache: hit in the headers.To check that the response was cached correctly, right-click on the request in Burp, select “Copy URL”, and load this URL in Burp’s browser. If the cache was successfully poisoned, you will see the script containing your payload, alert(document.cookie). Note that the alert() won't actually execute here.Go back to Burp Repeater, remove the cache buster, and resend the request until you poison the cache again.To simulate the victim, reload the home page in the browser and make sure that the alert() fires.Keep resending the request to keep the cache poisoned until the victim visits the site and the lab is solved.
A YouTube Channel for Cybersecurity Lab’s Poc and Write-ups
Telegram Channel for Free Ethical Hacking Dumps
Thank you for Reading!
Happy Ethical Hacking ~
Author: Karthikeyan Nagaraj ~ Cyberw1ng