Skip to content

Web Cache Deception script added to active directory with ID 100046#510

Open
e1l1ya wants to merge 1 commit intozaproxy:mainfrom
e1l1ya:main
Open

Web Cache Deception script added to active directory with ID 100046#510
e1l1ya wants to merge 1 commit intozaproxy:mainfrom
e1l1ya:main

Conversation

@e1l1ya
Copy link
Copy Markdown

@e1l1ya e1l1ya commented Feb 20, 2026

No description provided.

Signed-off-by: eiliya keshtkar <eiliyakeshtkar0@gmail.com>
@psiinon
Copy link
Copy Markdown
Member

psiinon commented Feb 20, 2026

Logo
Checkmarx One – Scan Summary & Detailsdb2899d8-e82c-4999-8ed3-8847cf8efa86

Great job! No new security vulnerabilities introduced in this pull request


Use @Checkmarx to interact with Checkmarx PR Assistant.
Examples:
@Checkmarx how are you able to help me?
@Checkmarx rescan this PR

@e1l1ya
Copy link
Copy Markdown
Author

e1l1ya commented Mar 21, 2026

Hi guys any updates?

@kingthorin
Copy link
Copy Markdown
Member

Sorry I've been away a while, I'll try to tackle this when I'm back into things Monday/Tuesday.

Update the web cache policy to not cache sensitive pages.
references:
- https://portswigger.net/web-security/web-cache-deception
- https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/07-Input_Validation_Testing/11.2-Testing_for_Web_Cache_Deception
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Per the WSTG linking guidance this should use a versioned link

}
}

// TODO: this section cant detect correctly
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

?

Comment on lines +303 to +315
if (alertRef === "100046-1") {
name = "Web Cache Deception - Extension/Delimiter";
description = "The server appears to cache sensitive pages when accessed with file extensions or crafted delimiters. " +
"When requesting '" + newPath + "', this could allow attackers to cache sensitive user pages " +
"by appending file extensions or using delimiters, potentially exposing private data to other users.";
} else if (alertRef === "100046-2") {
name = "Web Cache Deception - Path Traversal";
description = "The server appears vulnerable to web cache deception via path traversal technique. " +
"When accessing '" + newPath + "', it may permit caching of sensitive resources due to improper path validation.";
} else {
name = "Web Cache Deception Vulnerability Detected";
description = "The server may be vulnerable to web cache deception attacks.";
}
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It shouldn't be necessary to include all this extra handling. It should be handled by the metadata.

)
.setReference(
"https://portswigger.net/web-security/web-cache-deception\n" +
"https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/07-Input_Validation_Testing/11.2-Testing_for_Web_Cache_Deception"
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This should also use a versioned link

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Development

Successfully merging this pull request may close these issues.

3 participants