Issue name

Web cache deception

Typical severity

Medium

Issue description

Web cache deception exploits discrepancies between cache proxy and backend parsers, leading web servers to mistakenly cache and serve dynamic content as though it were static. This vulnerability is often exploited by attackers adding fake static file extensions to dynamic URLs, for example, changing "/path" to "/path/WCD.css". When users click on these modified links, the caching system erroneously identifies the request as for a static resource and caches the response, making the user's sensitive information public. If subsequent unauthorized users make a request to the same URL then they will be served the cached page, potentially exposing the sensitive information repeatedly. The distributed nature of web caches means that even a single web cache deception attack can have far-reaching effects, extending the potential for sensitive data exposure across various users and sessions.

Issue remediation

To mitigate the risk of web cache deception vulnerabilities, web administrators should:

References

Vulnerability classifications

Web intro