37 lines
1.2 KiB
YAML
37 lines
1.2 KiB
YAML
id: cache-poisoning-fuzz
|
|
|
|
info:
|
|
name: Cache Poison Fuzzing
|
|
author: dwisiswant0,ColbyJack1134
|
|
severity: info
|
|
reference:
|
|
- https://youst.in/posts/cache-poisoning-at-scale/
|
|
- https://portswigger.net/web-security/web-cache-poisoning
|
|
metadata:
|
|
max-request: 5834
|
|
tags: fuzzing,brute-force,cache
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
GET /?{{md5(headers)}}=1 HTTP/1.1
|
|
Host: {{Hostname}}
|
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:105.0) Gecko/20100101 Firefox/105.0
|
|
{{headers}}: {{randstr}}.tld
|
|
- |
|
|
GET /?{{md5(headers)}}=1 HTTP/1.1
|
|
Host: {{Hostname}}
|
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:105.0) Gecko/20100101 Firefox/105.0
|
|
|
|
attack: clusterbomb
|
|
payloads:
|
|
|
|
headers: helpers/wordlists/headers.txt
|
|
stop-at-first-match: true
|
|
matchers:
|
|
- type: dsl
|
|
dsl:
|
|
- 'contains(body_1, "{{randstr}}")'
|
|
- 'contains(body_2, "{{randstr}}")'
|
|
condition: and
|
|
# digest: 4a0a0047304502210090f4e6417dd7ceda5eb32f85beb49ce28912b6a00ed0613e40b09b168af0147502206182c7ac41d217e8b29994eac562f9e877692114ad9af04e52327d25853743a5:922c64590222798bb761d5b6d8e72950 |