Web cache poisoning - gachikuku/portswigger GitHub Wiki
Practitioner lab:
Web cache poisoning with an unkeyed header
Practitioner lab:
Web cache poisoning with an unkeyed header
-
Solution
-
Get param-miner's wordlist
curl -o headers.txt 'https://raw.githubusercontent.com/PortSwigger/param-miner/refs/heads/master/resources/headers'
-
Run ffuf to get the unkeyed header.
ffuf -w headers.txt -u "https://uuid.web-security-academy.net/?cb=FUZZ" -H "FUZZ: canary123" -mr "canary123"
-
Craft payload based on
x-forwarded-host
header, using portswigger's exploit server.
-