{"id":16792,"date":"2021-08-26T12:51:27","date_gmt":"2021-08-26T07:21:27","guid":{"rendered":"https:\/\/www.varutra.com\/?p=16792"},"modified":"2022-12-02T12:21:20","modified_gmt":"2022-12-02T06:51:20","slug":"web-cache-deception","status":"publish","type":"post","link":"https:\/\/www.varutra.com\/varutravrt3\/web-cache-deception\/","title":{"rendered":"WEB CACHE DECEPTION"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/varutra-1a3b6.kxcdn.com\/wp-content\/uploads\/2021\/08\/WEB-CACHE-DECEPTION-1024x535.png\"  class=\"sh-overlay-item sh-table-cell ls-is-cached lazyloaded\" data-rel=\"lightcase\" title=\"WEB CACHE DECEPTION - Varutra Consulting\"><\/p>\n<h3><strong>Introduction:<\/strong><\/h3>\n<p>A security researcher, Mr. Omer Gil initially proposed Web cache deception attack in 2017. This attack takes advantage of the caching functionality in the webserver to extract sensitive user data.<\/p>\n<h4><\/h4>\n<h3><strong>What is Caching?<\/strong><\/h3>\n<p>Caching is a method used to reduce the load and time to respond to a web server. This attack mainly focuses on the configuration of caching features. If these configurations are misused, then it may lead to caching of contents that were not supposed to be cached.<\/p>\n<p>We will get into the details of the attack point by point.<\/p>\n<h4><\/h4>\n<h3><strong>Request processing and CDN:<\/strong><\/h3>\n<p>Initially, whatever request is made to the server, the connection of this request goes through a CDN (Content delivery networks). They are nothing but a geographically distributed network of proxy servers and data centers. It is implemented to gain high availability and performance by distributing the service semantically relative to the end-users. The edge servers are scattered across the world. These stored cache local copies of web content provide faster access to users, thus reducing the load on the web servers.<\/p>\n<p>Edge servers are powerful computers put at the \u201cedge\u201d of a network where data computation needs to happen. They are physically close to the systems or applications that are creating the data being stored on, or being used by the server.<\/p>\n<p>The general and most basic rule of caching is that the cached items should not contain any private or user-specific data. Ideally, static content like images, CSS files, pdf files, etc. should be cached considered as the cached content i.e., the content which is not user-specific. All those requests which are dynamic and request the user-specific data are routed to the main servers. This basic rule of caching the non-user-specific data is implemented for security reasons. As web servers, these cache servers don\u2019t have any mechanisms for identifying any authenticated users, and these checks are provided to avoid access to unauthorized data.<\/p>\n<h4><\/h4>\n<h3><strong>The Working of Web Cache Deception: <\/strong><\/h3>\n<p>As stated above, any request made by a user to the server over the internet may go through proxies or may be processed by several caching techniques, that include the number of CDN\u2019s and centralized server-side caches, before it finally reaches the origin of the webserver.<\/p>\n<p>In a typical Web cache deception attack, the attacker first searches a page that contains highly sensitive data such as a setting page. Then, the request is prompted to have a web caching service, such as a load balancer, reverse proxy, CDN, or other similar services, to interpret the request differently than the main web server.<\/p>\n<p>Here the attacker will try to cache content that would not have been cached in any normal circumstances. Some of the web applications, especially with a non-existent object, a request will try to process it with a similar object reference if any exist. Then, the attacker will add a dynamic URL with a non-existent page or file which most probably will end in a cacheable file such as jpg, CSS, and more.<\/p>\n<p><strong>For Example: <\/strong><\/p>\n<ul>\n<li>Assume a URL <u>example.com\/account.php<\/u> refers to content containing sensitive data that should not be cached. Here, to get the request cached, an attacker will try to add an object which might look like something which is not a user-specific object, such as \/account.php\/nonexistent.jpg<\/li>\n<li>Now the attacker will trick the user into making a request to <u>example.com\/account.php\/nonexistent.jpg<\/u>, which will cause the server to respond with <u>www.example.com\/account.php<\/u>\u00a0because of the presence of the victim\u2019s cookies in the request, the request contains sensitive information personal to the victim.<\/li>\n<li>The proxy considers <u>example.com\/account.php\/nonexistent.jpg<\/u>\u00a0as a request for a non-existent, cacheable \u2018nonexistent.jpg\u2019 file, causing the content of \u2018\/account.php\u2019 to be cached and accessible by others.<\/li>\n<li>The target user starts the first request, which is a key aspect of this attack. The attacker would then access the cached contents of the legitimate URL, holding the previously private data by following the same URL and caching server.<\/li>\n<\/ul>\n<p>The figure below shows the summarized process explained till now.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-16793 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/08\/Web-cache-deception-using-path-confusion.png\" alt=\"Web cache deception using path confusion\" width=\"606\" height=\"304\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/08\/Web-cache-deception-using-path-confusion.png 606w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/08\/Web-cache-deception-using-path-confusion-300x150.png 300w\" sizes=\"(max-width: 606px) 100vw, 606px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure: Web cache deception using path confusion<\/strong><\/p>\n<h4><\/h4>\n<h3><strong>Impact of Web Cache Deception Attack :<\/strong><\/h3>\n<p>Web cache deception can cause various attacks, such as<\/p>\n<ul>\n<li>Theft of sensitive information\n<ul>\n<li>Insecurely stored Credit Card details<\/li>\n<li>Addresses<\/li>\n<\/ul>\n<\/li>\n<li>Site-Specific information like,\n<ul>\n<li>Search history<\/li>\n<li>Shopping cart content<\/li>\n<\/ul>\n<\/li>\n<li>Carrying out actions on behalf of the user\n<ul>\n<li>Using CSRF Tokens for a <a href=\"https:\/\/www.varutra.com\/mitigating-cross-site-request-forgery-csrf-attacks\/\">Cross-Site-Request-Forgery attack<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Account takeovers or Account theft\n<ul>\n<li>Stealing access tokens or plaintext passwords<\/li>\n<\/ul>\n<\/li>\n<li>Enabling exploitation of otherwise un-exploitable vulnerabilities, such as self-XSS.<\/li>\n<\/ul>\n<h4><\/h4>\n<h3><strong>Recommendations to Mitigate <\/strong><strong>Web Cache Deception Attack <\/strong><strong>:<\/strong><\/h3>\n<p>Web cache deception mainly arises when the cache is configured poorly. The configurations of the web cache are specific to application requirements. Thus, the recommendations are also mostly application-specific. But the following are some of the generic recommendations which might mitigate to some extent but fully.<\/p>\n<ul>\n<li>Scripts and applications that do not assume parameters in the URI following their location should redirect to a URL they could handle, or return a 404 or 302 response.<\/li>\n<li>Assure that caching services properly follow the origin\u2019s caching expectations, especially if the expectation is \u201cno-store\u201d.<\/li>\n<li>Disable any functionality that could lead to a file extension conflict between the proxy server and the origin server.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><u>Thank you.<\/u><\/p>\n<p><strong>Author<\/strong><\/p>\n<p>Pralekya Hirmalwar<\/p>\n<p>Attack&amp;Pentest Team<\/p>\n<p>Varutra Consulting Pvt. Ltd.<\/p>","protected":false},"excerpt":{"rendered":"<p>Introduction: A security researcher, Mr. Omer Gil initially proposed Web cache deception attack in 2017. This attack takes advantage of the caching functionality in the&#8230;<\/p>\n","protected":false},"author":4,"featured_media":16796,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[272],"tags":[421,240,309,492],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.6.3 - aioseo.com -->\n\t\t<meta name=\"description\" content=\"Web cache deception attack where attacker tricks a caching proxy to falsely store the private data and gain unauthorized access to that cached data.\" \/>\n\t\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t\t<link rel=\"canonical\" href=\"https:\/\/www.varutra.com\/varutravrt3\/web-cache-deception\/\" \/>\n\t\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.6.3\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Varutra Consulting\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Web cache deception, Impact, Recommendations to Mitigate\" \/>\n\t\t<meta property=\"og:description\" content=\"Web cache deception attack where attacker tricks a caching proxy to falsely store the private data and gain unauthorized access to that cached data.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.varutra.com\/varutravrt3\/web-cache-deception\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/08\/WEB-CACHE-DECEPTION.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/08\/WEB-CACHE-DECEPTION.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t\t<meta property=\"article:section\" content=\"Web Application Security\" \/>\n\t\t<meta property=\"article:tag\" content=\"web app security\" \/>\n\t\t<meta property=\"article:tag\" content=\"web attack\" \/>\n\t\t<meta property=\"article:tag\" content=\"web cache\" \/>\n\t\t<meta property=\"article:tag\" content=\"web cache deception\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2021-08-26T07:21:27+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2022-12-02T06:51:20+00:00\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Web cache deception, Impact, Recommendations to Mitigate\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Web cache deception attack where attacker tricks a caching proxy to falsely store the private data and gain unauthorized access to that cached data.\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/08\/WEB-CACHE-DECEPTION.png\" \/>\n\t\t<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t\t<meta name=\"twitter:data1\" content=\"kalpblogger\" \/>\n\t\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/web-cache-deception\\\/#article\",\"name\":\"Web cache deception, Impact, Recommendations to Mitigate\",\"headline\":\"WEB CACHE DECEPTION\",\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/WEB-CACHE-DECEPTION.png\",\"width\":1200,\"height\":627,\"caption\":\"WEB CACHE DECEPTION\"},\"datePublished\":\"2021-08-26T12:51:27+05:30\",\"dateModified\":\"2022-12-02T12:21:20+05:30\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/web-cache-deception\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/web-cache-deception\\\/#webpage\"},\"articleSection\":\"Web Application Security, web app security, Web Attack, web cache, web cache deception\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/web-cache-deception\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"nextItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/web-cache-deception\\\/#listItem\"},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/web-cache-deception\\\/#listItem\",\"position\":2,\"name\":\"WEB CACHE DECEPTION\",\"previousItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\"}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\",\"name\":\"Varutra\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Varutra-Found-e1612984024606.jpg\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/web-cache-deception\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/web-cache-deception\\\/#organizationLogo\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/\",\"name\":\"kalpblogger\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/web-cache-deception\\\/#authorImage\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5e96a9b330da7c941c1e39217a2fbe38?s=96&d=mm&r=g\",\"width\":96,\"height\":96,\"caption\":\"kalpblogger\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/web-cache-deception\\\/#webpage\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/web-cache-deception\\\/\",\"name\":\"Web cache deception, Impact, Recommendations to Mitigate\",\"description\":\"Web cache deception attack where attacker tricks a caching proxy to falsely store the private data and gain unauthorized access to that cached data.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/web-cache-deception\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/WEB-CACHE-DECEPTION.png\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/web-cache-deception\\\/#mainImage\",\"width\":1200,\"height\":627,\"caption\":\"WEB CACHE DECEPTION\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/web-cache-deception\\\/#mainImage\"},\"datePublished\":\"2021-08-26T12:51:27+05:30\",\"dateModified\":\"2022-12-02T12:21:20+05:30\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"name\":\"Varutra Consulting\",\"description\":\"Secure your digital world with our Cybersecurity services.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Web cache deception, Impact, Recommendations to Mitigate<\/title>\n\n","aioseo_head_json":{"title":"Web cache deception, Impact, Recommendations to Mitigate","description":"Web cache deception attack where attacker tricks a caching proxy to falsely store the private data and gain unauthorized access to that cached data.","canonical_url":"https:\/\/www.varutra.com\/varutravrt3\/web-cache-deception\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"og:locale":"en_US","og:site_name":"Varutra Consulting","og:type":"article","og:title":"Web cache deception, Impact, Recommendations to Mitigate","og:description":"Web cache deception attack where attacker tricks a caching proxy to falsely store the private data and gain unauthorized access to that cached data.","og:url":"https:\/\/www.varutra.com\/varutravrt3\/web-cache-deception\/","og:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/08\/WEB-CACHE-DECEPTION.png","og:image:secure_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/08\/WEB-CACHE-DECEPTION.png","og:image:width":"1200","og:image:height":"627","article:section":"Web Application Security","article:tag":["web app security","web attack","web cache","web cache deception"],"article:published_time":"2021-08-26T07:21:27+00:00","article:modified_time":"2022-12-02T06:51:20+00:00","twitter:card":"summary_large_image","twitter:title":"Web cache deception, Impact, Recommendations to Mitigate","twitter:description":"Web cache deception attack where attacker tricks a caching proxy to falsely store the private data and gain unauthorized access to that cached data.","twitter:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/08\/WEB-CACHE-DECEPTION.png","twitter:label1":"Written by","twitter:data1":"kalpblogger","twitter:label2":"Est. reading time","twitter:data2":"4 minutes","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.varutra.com\/varutravrt3\/web-cache-deception\/#article","name":"Web cache deception, Impact, Recommendations to Mitigate","headline":"WEB CACHE DECEPTION","author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/08\/WEB-CACHE-DECEPTION.png","width":1200,"height":627,"caption":"WEB CACHE DECEPTION"},"datePublished":"2021-08-26T12:51:27+05:30","dateModified":"2022-12-02T12:21:20+05:30","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/web-cache-deception\/#webpage"},"isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/web-cache-deception\/#webpage"},"articleSection":"Web Application Security, web app security, Web Attack, web cache, web cache deception"},{"@type":"BreadcrumbList","@id":"https:\/\/www.varutra.com\/varutravrt3\/web-cache-deception\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/#listItem","position":1,"name":"Home","item":"https:\/\/www.varutra.com\/varutravrt3\/","nextItem":"https:\/\/www.varutra.com\/varutravrt3\/web-cache-deception\/#listItem"},{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/web-cache-deception\/#listItem","position":2,"name":"WEB CACHE DECEPTION","previousItem":"https:\/\/www.varutra.com\/varutravrt3\/#listItem"}]},{"@type":"Organization","@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization","name":"Varutra","url":"https:\/\/www.varutra.com\/varutravrt3\/","logo":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Varutra-Found-e1612984024606.jpg","@id":"https:\/\/www.varutra.com\/varutravrt3\/web-cache-deception\/#organizationLogo"},"image":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/web-cache-deception\/#organizationLogo"}},{"@type":"Person","@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author","url":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/","name":"kalpblogger","image":{"@type":"ImageObject","@id":"https:\/\/www.varutra.com\/varutravrt3\/web-cache-deception\/#authorImage","url":"https:\/\/secure.gravatar.com\/avatar\/5e96a9b330da7c941c1e39217a2fbe38?s=96&d=mm&r=g","width":96,"height":96,"caption":"kalpblogger"}},{"@type":"WebPage","@id":"https:\/\/www.varutra.com\/varutravrt3\/web-cache-deception\/#webpage","url":"https:\/\/www.varutra.com\/varutravrt3\/web-cache-deception\/","name":"Web cache deception, Impact, Recommendations to Mitigate","description":"Web cache deception attack where attacker tricks a caching proxy to falsely store the private data and gain unauthorized access to that cached data.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#website"},"breadcrumb":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/web-cache-deception\/#breadcrumblist"},"author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"creator":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/08\/WEB-CACHE-DECEPTION.png","@id":"https:\/\/www.varutra.com\/varutravrt3\/web-cache-deception\/#mainImage","width":1200,"height":627,"caption":"WEB CACHE DECEPTION"},"primaryImageOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/web-cache-deception\/#mainImage"},"datePublished":"2021-08-26T12:51:27+05:30","dateModified":"2022-12-02T12:21:20+05:30"},{"@type":"WebSite","@id":"https:\/\/www.varutra.com\/varutravrt3\/#website","url":"https:\/\/www.varutra.com\/varutravrt3\/","name":"Varutra Consulting","description":"Secure your digital world with our Cybersecurity services.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"}}]}},"aioseo_meta_data":{"post_id":"16792","title":"Web cache deception, Impact, Recommendations to Mitigate","description":"Web cache deception attack where attacker tricks a caching proxy to falsely store the private data and gain unauthorized access to that cached data.","keywords":[],"keyphrases":"{\"focus\":{\"keyphrase\":\"Web cache deception\",\"analysis\":{\"keyphraseInTitle\":{\"title\":\"Focus keyphrase in SEO title\",\"description\":\"Focus keyphrase found in SEO title.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInDescription\":{\"title\":\"Focus keyphrase in meta description\",\"description\":\"Focus keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Focus keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":3},\"keyphraseInURL\":{\"title\":\"Focus keyphrase in URL\",\"description\":\"Focus keyphrase used in the URL.\",\"score\":5,\"maxScore\":5,\"error\":0},\"keyphraseInIntroduction\":{\"title\":\"Focus keyphrase in introduction\",\"description\":\"Your Focus keyphrase appears in the first paragraph. Well done!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInSubHeadings\":{\"title\":\"Focus keyphrase in Subheadings\",\"description\":\"Your H2 and H3 subheadings reflects the topic of your copy. Good job!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInImageAlt\":{\"title\":\"Focus keyphrase in image alt attributes\",\"description\":\"Focus keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}},\"score\":100},\"additional\":[{\"keyphrase\":\"Web Cache Deception Attack\",\"score\":67,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":4},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase not found in image alt attribute(s). Add an image with your Keyphrase as alt text.\",\"score\":3,\"maxScore\":9,\"error\":1}}},{\"keyphrase\":\"Deception Attack\",\"score\":67,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase not found in image alt attribute(s). Add an image with your Keyphrase as alt text.\",\"score\":3,\"maxScore\":9,\"error\":1}}},{\"keyphrase\":\"Cache Deception Attack\",\"score\":67,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":3},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase not found in image alt attribute(s). Add an image with your Keyphrase as alt text.\",\"score\":3,\"maxScore\":9,\"error\":1}}}]}","primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"featured","og_image_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/08\/WEB-CACHE-DECEPTION.png","og_image_width":"1200","og_image_height":"627","og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":"Web Application Security","og_article_tags":[],"twitter_use_og":true,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":"{\"article\":{\"articleType\":\"BlogPosting\"},\"course\":{\"name\":\"\",\"description\":\"\",\"provider\":\"\"},\"faq\":{\"pages\":[]},\"product\":{\"reviews\":[]},\"recipe\":{\"ingredients\":[],\"instructions\":[],\"keywords\":[]},\"software\":{\"reviews\":[],\"operatingSystems\":[]},\"webPage\":{\"webPageType\":\"WebPage\"}}","pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"limit_modified_date":false,"open_ai":null,"created":"2021-10-27 15:11:00","updated":"2022-12-02 06:53:12"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\/category\/web-application-security\/\" title=\"Web Application Security\">Web Application Security<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\tWEB CACHE DECEPTION\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.varutra.com\/varutravrt3"},{"label":"Web Application Security","link":"https:\/\/www.varutra.com\/varutravrt3\/category\/web-application-security\/"},{"label":"WEB CACHE DECEPTION","link":"https:\/\/www.varutra.com\/varutravrt3\/web-cache-deception\/"}],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/16792"}],"collection":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/comments?post=16792"}],"version-history":[{"count":5,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/16792\/revisions"}],"predecessor-version":[{"id":20271,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/16792\/revisions\/20271"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media\/16796"}],"wp:attachment":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media?parent=16792"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/categories?post=16792"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/tags?post=16792"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}