Combining Web Cache Poisoning with X-Forwarded-Host and X-Original-URL Headers
攻击者利用X-Forwarded-Host和X-Original-URL头的漏洞进行Web缓存中毒攻击,使恶意内容被缓存服务器存储并返回给其他用户,导致持久性XSS攻击。 2025-9-25 08:23:41 Author: infosecwriteups.com(查看原文) 阅读量:13 收藏

Bash Overflow

Learn how combining X-Forwarded-Host and X-Original-URL vulnerabilities can poison web caches, delivering persistent XSS to unsuspecting users.

🔓 Free Link

Press enter or click to view image in full size

Combining Web Cache Poisoning with X-Forwarded-Host and X-Original-URL Headers

Disclaimer:
The techniques described in this document are intended solely for ethical use and educational purposes. Unauthorized use of these methods outside approved environments is strictly prohibited, as it is illegal, unethical, and may lead to severe consequences.

It is crucial to act responsibly, comply with all applicable laws, and adhere to established ethical guidelines. Any activity that exploits security vulnerabilities or compromises the safety, privacy, or integrity of others is strictly forbidden.

Table of Contents

  1. Summary of the Vulnerability
  2. Steps to Reproduce & Proof of Concept (PoC)
  3. Impact

Summary of the Vulnerability

This scenario demonstrates a web cache poisoning attack that relies on chaining two separate weaknesses: the X-Forwarded-Host and the X-Original-URL headers. Normally, web cache poisoning occurs when an attacker can manipulate the server’s response in a way that gets stored in a caching layer…


文章来源: https://infosecwriteups.com/combining-web-cache-poisoning-with-x-forwarded-host-and-x-original-url-headers-6d71d8d1f1f7?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh