Skip to content

Commit 69e45fe

Browse files
Cache Deception (#453)
* Cache Deception ADD: Varies: Server Security Misconfiguration - Cache Deception * Update remediation_advice.json --------- Co-authored-by: Abhinav Nain <[email protected]>
1 parent b61f40d commit 69e45fe

File tree

4 files changed

+18
-0
lines changed

4 files changed

+18
-0
lines changed

mappings/cvss_v3/cvss_v3.json

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1066,6 +1066,10 @@
10661066
"id": "cache_poisoning",
10671067
"cvss_v3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N"
10681068
},
1069+
{
1070+
"id": "cache_deception",
1071+
"cvss_v3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N"
1072+
},
10691073
{
10701074
"id": "captcha",
10711075
"children": [

mappings/remediation_advice/remediation_advice.json

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1351,6 +1351,13 @@
13511351
"https://portswigger.net/blog/practical-web-cache-poisoning"
13521352
]
13531353
},
1354+
{
1355+
"id": "cache_deception",
1356+
"remediation_advice": "The most effective way to prevent cache deception is to carefully control which responses are cached and to avoid caching responses that contain user-specific or sensitive data.\n\nEnsure that authentication-protected pages and any responses containing sensitive information explicitly disable caching via headers such as `Cache-Control: no-store, no-cache, must-revalidate` and `Pragma: no-cache`.\n\nBe particularly cautious with URL structures. Cache deception attacks often rely on tricking the cache into treating dynamic responses as static. A simple mitigation is to ensure that URLs ending in extensions like `.css`, `.js`, `.png`, etc., only serve static content and do not process dynamic requests.\n\nFor additional protection, configure your cache layer to only cache responses from a predefined allowlist of safe URL patterns. This prevents attackers from injecting deceptive paths that lead to cached sensitive data.\n\nAuditing your cache behavior using tools like Param Miner or manual testing can help identify and eliminate unintended caching of sensitive responses. Additionally, security headers such as `X-Content-Type-Options: nosniff` can help prevent certain forms of cache-related attacks.\n\nFinally, if your application uses a CDN or a reverse proxy (e.g., Cloudflare, Akamai, Varnish), ensure that caching rules are correctly configured to prevent caching of personalized or user-specific content.",
1357+
"references": [
1358+
"https://portswigger.net/web-security/web-cache-deception"
1359+
]
1360+
},
13541361
{
13551362
"id": "captcha",
13561363
"children": [

third-party-mappings/remediation_training/secure-code-warrior-links.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -334,6 +334,7 @@
334334
"server_security_misconfiguration": null,
335335
"server_security_misconfiguration.bitsquatting": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=server_security_misconfiguration:bitsquatting&redirect=true",
336336
"server_security_misconfiguration.cache_poisoning": null,
337+
"server_security_misconfiguration.cache_deception": null,
337338
"server_security_misconfiguration.captcha": null,
338339
"server_security_misconfiguration.captcha.brute_force": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=server_security_misconfiguration:captcha:brute_force&redirect=true",
339340
"server_security_misconfiguration.captcha.implementation_vulnerability": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=server_security_misconfiguration:captcha:implementation_vulnerability&redirect=true",

vulnerability-rating-taxonomy.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2097,6 +2097,12 @@
20972097
"type": "subcategory",
20982098
"priority": null
20992099
},
2100+
{
2101+
"id": "cache_deception",
2102+
"name": "Cache Deception",
2103+
"type": "subcategory",
2104+
"priority": null
2105+
},
21002106
{
21012107
"id": "captcha",
21022108
"name": "CAPTCHA",

0 commit comments

Comments
 (0)