id: cache-poisoning-fuzz info: name: Cache Poison Fuzzing author: dwisiswant0,ColbyJack1134 severity: info reference: - https://youst.in/posts/cache-poisoning-at-scale/ - https://portswigger.net/web-security/web-cache-poisoning metadata: max-request: 5834 tags: fuzzing,brute-force,cache http: - raw: - | GET /?{{md5(headers)}}=1 HTTP/1.1 Host: {{Hostname}} User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:105.0) Gecko/20100101 Firefox/105.0 {{headers}}: {{randstr}}.tld - | GET /?{{md5(headers)}}=1 HTTP/1.1 Host: {{Hostname}} User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:105.0) Gecko/20100101 Firefox/105.0 attack: clusterbomb payloads: headers: helpers/wordlists/headers.txt stop-at-first-match: true matchers: - type: dsl dsl: - 'contains(body_1, "{{randstr}}")' - 'contains(body_2, "{{randstr}}")' condition: and # digest: 4a0a0047304502210090f4e6417dd7ceda5eb32f85beb49ce28912b6a00ed0613e40b09b168af0147502206182c7ac41d217e8b29994eac562f9e877692114ad9af04e52327d25853743a5:922c64590222798bb761d5b6d8e72950