Learn how combining X-Forwarded-Host
and X-Original-URL
vulnerabilities can poison web caches, delivering persistent XSS to unsuspecting users.
Press enter or click to view image in full size
Disclaimer:
The techniques described in this document are intended solely for ethical use and educational purposes. Unauthorized use of these methods outside approved environments is strictly prohibited, as it is illegal, unethical, and may lead to severe consequences.It is crucial to act responsibly, comply with all applicable laws, and adhere to established ethical guidelines. Any activity that exploits security vulnerabilities or compromises the safety, privacy, or integrity of others is strictly forbidden.
Table of Contents
Summary of the Vulnerability
This scenario demonstrates a web cache poisoning attack that relies on chaining two separate weaknesses: the X-Forwarded-Host
and the X-Original-URL
headers. Normally, web cache poisoning occurs when an attacker can manipulate the server’s response in a way that gets stored in a caching layer…