I Was Hunting Bugs — The Cache Was Hunting Users Instead
文章描述了作者在进行大规模安全测试时发现了一个严重的缓存中毒漏洞。通过分析响应头中的X-Cache和Vary字段,作者发现目标网站的CDN缓存机制存在缺陷。攻击者可以利用此漏洞将恶意链接注入到合法用户的缓存中,导致用户被重定向至攻击者控制的页面。 2025-12-29 05:57:1 Author: infosecwriteups.com(查看原文) 阅读量:2 收藏

Iski

Free Link 🎈

Hey there!😁

Press enter or click to view image in full size

Image by AI

I opened Burp. It crashed.

I reopened Burp. The app logged me out.

I sighed, took a sip of coffee ☕, and questioned my life choices — because somehow, while I was hunting bugs… the cache was hunting users instead.

And it was doing a damn good job.

🎯 The Setup: Mass Recon Before the Magic

This didn’t start with a payload. It started with boredom and discipline — the two most dangerous tools in bug bounty.

I was doing large-scale recon on a production domain sitting behind a well-known CDN. Nothing fancy:

  • Collecting historical URLs (Wayback, GAU, Katana)
  • Extracting parameter patterns from JS files
  • Mapping cache behavior using response headers

One response header quietly whispered danger:

X-Cache: HIT
X-Cacheable: YES
Vary…

文章来源: https://infosecwriteups.com/i-was-hunting-bugs-the-cache-was-hunting-users-instead-1350057031e5?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh