Lab: Web cache poisoning via an unkeyed query string
This lab is vulnerable to web cache poisoning because the query string is unkeyed. A user regularly visits this site's home page using Chrome.
To solve the lab, poison the home page with a response that executes
alert(1) in the victim's browser.
If you're struggling, you can use the
Pragma: x-get-cache-keyheader to display the cache key in the response. This applies to some of the other labs as well.
- Although you can't use a query parameter as a cache buster, there is a common request header that will be keyed if present. You can use the Param Miner extension to automatically add a cache buster header to your requests.
With Burp running, load the website's home page. In Burp, go to "Proxy" > "HTTP history". Find the
GETrequest for the home page. Notice that this page is a potential cache oracle. Send the request to Burp Repeater.
- Add arbitrary query parameters to the request. Observe that you can still get a cache hit even if you change the query parameters. This indicates that they are not included in the cache key.
Notice that you can use the
Originheader as a cache buster. Add it to your request.
- When you get a cache miss, notice that your injected parameters are reflected in the response. If the response to your request is cached, you can remove the query parameters and they will still be reflected in the cached response.
Add an arbitrary parameter that breaks out of the reflected string and injects an XSS payload:
Keep replaying the request until you see your payload reflected in the response and
X-Cache: hitin the headers.
- To simulate the victim, remove the query string from your request and send it again (while using the same cache buster). Check that you still receive the cached response containing your payload.
Remove the cache-buster
Originheader and add your payload back to the query string. Replay the request until you have poisoned the cache for normal users. Confirm this attack has been successful by loading the home page in your browser and observing the popup.
- The lab will be solved when the victim user visits the poisoned home page. You may need to re-poison the cache if the lab is not solved after 35 seconds.