A Burp Suite extension for detecting cache deception vulnerabilities in web applications.
Created by MNM
The Cache Deception Scanner is a Burp Suite extension designed to help security researchers and penetration testers identify cache deception vulnerabilities. This extension provides a custom request editor tab to visualize and analyze HTTP traffic for indicators of cache deception. Version 1.2 includes modular code structure for better maintainability, improved vulnerability detection through detailed header analysis (e.g., Cache-Control directives, CDN-specific headers), and structured HTTP editors for clearer request/response viewing.
- Custom request editor tab for analyzing HTTP requests and responses with structured HTTP editors.
- Automated passive detection of cache deception issues, including score-based analysis of caching headers (e.g., max-age > 0, cache-status: hit).
- Clean interface with detailed vulnerability information, including reasons for detection (e.g., "Cache-Control: max-age=30").
- Modular codebase for easier extension and maintenance.
- Visit the Releases section of this repository.
- Download the latest
WCDScanner-1.2.jarfile.
curl -L https://github.com/Nowafen/cache-deception-scanner/releases/download/v1.2/WCDScanner-1.2.jar -o WCDScanner-1.2.jar- Open Burp Suite and go to the Extension tab.
- Click Add, select Java as the extension type, and choose the downloaded
WCDScanner-1.2.jar. - Click Next to load the extension.
- Clone the repository:
git clone https://github.com/Nowafen/cache-deception-scanner.git cd cache-deception-scanner - Build using Gradle:
gradle build
- The compiled
WCDScanner-1.2.jarfile will be located at:build/libs/WCDScanner-1.2.jar - Load the JAR file into Burp Suite as described in Option 1.
After loading the extension, a new tab titled WCD Scanner will appear in the Burp Suite tabs.
- Send or forward requests to Burp Suite (e.g., from Proxy, Repeater, or Intruder).
- The extension will analyze requests and highlight potential cache deception issues in the table (e.g., "vulnerable packet" in the Vulnerable column).
- Click on a row in the table to view the full request and response in the structured editors below, including headers and body.
- Use the domain tree to filter by domain and view actions like deleting packets.
For more details, check the source code or contact the maintainer.