From ef6be186c5f5be1d1a14c3c8dcac6bff15236323 Mon Sep 17 00:00:00 2001
From: 0xn3va <0xn3va@MacBook-Pro.local>
Date: Mon, 17 Jan 2022 15:25:15 +0300
Subject: [PATCH 01/17] Refactor links
---
Web Application/Web Cache Poisoning/README.md | 16 +++++++++-------
1 file changed, 9 insertions(+), 7 deletions(-)
diff --git a/Web Application/Web Cache Poisoning/README.md b/Web Application/Web Cache Poisoning/README.md
index 6340eb1..37cb09b 100644
--- a/Web Application/Web Cache Poisoning/README.md
+++ b/Web Application/Web Cache Poisoning/README.md
@@ -2,7 +2,7 @@
Caching is a technique that stores a copy of a given resource and serves it back when requested. When a web cache has a requested resource in its store, it intercepts the request and returns its copy instead of re-downloading from the originating server.
-
+
This achieves several goals:
- Server load reduction (the server doesn't have to serve all clients itself),
@@ -14,13 +14,13 @@ On the other side, it has to be configured properly as not all resources stay id
A private cache is dedicated to a single user. A browser cache holds all documents downloaded via HTTP by the user. This cache is used to make visited documents available for back/forward navigation, saving, viewing-as-source, etc. without requiring an additional trip to the server. It likewise improves offline browsing of cached content.
-
+
## Shared proxy caches
A shared cache is a cache that stores responses to be reused by more than one user. For example, an ISP or your company might have set up a web proxy as part of its local network infrastructure to serve many users so that popular resources are reused a number of times, reducing network traffic and latency.
-
+
## Targets of caching operations
@@ -131,7 +131,7 @@ The freshness lifetime is calculated based on several headers:
The objective of web cache poisoning is to send a request that causes a harmful response that gets saved in the cache and served to other users.
-
+
## Basic cache poisoning
@@ -182,9 +182,11 @@ HTTP/1.1 200 OK
"/>
```
-{% hint style="info" %}
-More examples and techniques: [Web Cache Entanglement: Novel Pathways to Poisoning](https://portswigger.net/research/web-cache-entanglement) and [Practical Web Cache Poisoning](https://portswigger.net/research/practical-web-cache-poisoning)
-{% endhint %}
+{% embed url="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner" %}
+
+References:
+- [PortSwigger Research: Web Cache Entanglement: Novel Pathways to Poisoning](https://portswigger.net/research/web-cache-entanglement)
+- [PortSwigger Research: Practical Web Cache Poisoning](https://portswigger.net/research/practical-web-cache-poisoning)
## Unauthenticated cache purge
From fac7cc581245b56c3520a97c17a9578f3f89183b Mon Sep 17 00:00:00 2001
From: 0xn3va <0xn3va@MacBook-Pro.local>
Date: Mon, 17 Jan 2022 15:25:54 +0300
Subject: [PATCH 02/17] Add links
---
.../Server Side Request Forgery/README.md | 22 ++++++++++++++++---
1 file changed, 19 insertions(+), 3 deletions(-)
diff --git a/Web Application/Server Side Request Forgery/README.md b/Web Application/Server Side Request Forgery/README.md
index d05aed9..3e6ff33 100644
--- a/Web Application/Server Side Request Forgery/README.md
+++ b/Web Application/Server Side Request Forgery/README.md
@@ -176,6 +176,8 @@ The [URL specification](https://tools.ietf.org/html/rfc3986) contains a number o
```
References:
+- [Writeup: URL whitelist bypass in https://cxl-services.appspot.com](https://feed.bugs.xdavidhu.me/bugs/0008)
+- [Writeup: Fixing the Unfixable: Story of a Google Cloud SSRF](https://bugs.xdavidhu.me/google/2021/12/31/fixing-the-unfixable-story-of-a-google-cloud-ssrf/)
- [A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages!](https://github.com/0xn3va/cheat-sheets/blob/master/Web%20Application/Server%20Side%20Request%20Forgery/materials/us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-Languages.pdf)
- [Tool: Tiny URL Fuzzer](https://github.com/orangetw/Tiny-URL-Fuzzer)
@@ -208,7 +210,11 @@ make-127-0-0-1-and-127-127-127-127-rr.1u.ms. 0 IN A 127.0.0.1
make-127-0-0-1-and-127-127-127-127-rr.1u.ms. 0 IN A 127.127.127.127
```
-See more [1u.ms](http://1u.ms)
+{% embed url="https://github.com/neex/1u.ms" %}
+
+Also, check `sslip.io`:
+
+{% embed url="https://sslip.io/" %}
## DNS rebinding
@@ -224,7 +230,11 @@ $ dig A make-1-1-1-1-rebind-127-0-0-1-rr.1u.ms
make-1-1-1-1-rebind-127-0-0-1-rr.1u.ms. 0 IN A 127.0.0.1
```
-See more [1u.ms](http://1u.ms)
+{% embed url="https://github.com/neex/1u.ms" %}
+
+Also, check `lock.cmpxchg8b.com`:
+
+{% embed url="https://lock.cmpxchg8b.com/rebinder.html" %}
# Adobe ColdFusion
@@ -244,16 +254,22 @@ See more [1u.ms](http://1u.ms)
# Server-side processing of arbitrary HTML and JS
-Server-side processing of arbitrary HTML and JS data from the user can often be found when generating various documents, for example, in PDF format. If this functionality is vulnerable to HTML injection and/or XSS, you can try using this to access internal resources:
+Server-side processing of arbitrary HTML and JS data from a user can often be found when generating various documents, for example, to PDFs. If this functionality is vulnerable to HTML injection and/or XSS, you can use this to access internal resources:
```html