Files
nuclei-templates/vulnerabilities/generic/cache-poisoning.yaml
Prince Chaddha 7ada510859 Fixed possible FPs in open redirect templates (#4544)
* Fixed possible FPs in open redirect templates

We have replaced example.com with interact.sh since few domains redirect to example.com, which results in FP results.

* updated example domain

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-06-06 16:10:15 +05:30

34 lines
795 B
YAML

id: cache-poisoning
info:
name: Cache Poisoning
author: melbadry9,xelkomy,akincibor,dogasantos
severity: low
reference:
- https://blog.melbadry9.xyz/fuzzing/nuclei-cache-poisoning
- https://portswigger.net/research/practical-web-cache-poisoning
tags: cache,generic
requests:
- raw:
- |
GET /?{{randstr}}=9 HTTP/1.1
X-Forwarded-Prefix: prefix.cache.interact.sh
X-Forwarded-Host: host.cache.interact.sh
X-Forwarded-For: for.cache.interact.sh
- |
GET /?{{randstr}}=9 HTTP/1.1
req-condition: true
matchers:
- type: dsl
dsl:
- 'contains(body_2, "cache.interact.sh")'
extractors:
- type: regex
part: response
regex:
- "(prefix|host|for).cache.interact.sh"