Web Cache Deception Attack

preview_player
Показать описание
Web Cache Deception attack is a new web attack vector that puts various technologies and frameworks at risk. By manipulating behaviors of web servers and caching mechanisms, anonymous attackers can expose sensitive information of authenticated application users, and in certain cases to even take control over their accounts.

By Omer Gil

Рекомендации по теме
Комментарии
Автор

Nice talk

The moral is the same as Spectre: too much push on performance without caring about security

ysantamorena
Автор

Very clear explanation, respect to this guy!

MherZaqaryann
Автор

Some penetration tools used to perform automated assessments of vulnerable sites must be adding a lot of data to these caches. Particularly authenticated fuzzing or file/directory brute-force. Let's hope tool developers don't use known file names and locations, and customers always sanitise their test DB's. 8-(

derek
Автор

Using name Java wasn't good idea cause it's a litte bit confuse

mleczkoxdTakTenmleczko
Автор

Why are you guys putting it online 6 month later?

director
Автор

IMO you are not mentioning the only real solution: serve your cacheable and personalized/non-cacheable content on different domains. Use a very simple CDN configuration for the latter that does not cache anything, or no CDN at all if your origin can handle that. Otherwise you are only one mistake away from some major egg on your face. It is way too easy to make a configuration error in the CDN, or have the origin send the wrong headers by mistake.

BR-lxpy
Автор

Haha I did this to cheat on my ochem online homework when I forgot to do it and it was about to be due. Still got a B tho

jasonlind