Nytro Posted July 9, 2014 Report Posted July 9, 2014 HTTP Response Splitting, Web CachePoisoning Attacks, and Related TopicsWhite PaperAmit Klein, Director of Security and ResearchSanctum, Inc.March, 2004Abstract ....................................................................................................................3Introduction to HTTP Response Splitting ..............................................................3Use Cases for Web Cache Poisoning .......................................................................5The Basic Technique of HTTP Response Splitting .................................................6Practical Considerations – The Web Server Mount Point ........................................8Determining Where The second Response Message Starts ....................................12Cache Poisoning– Practical Considerations..........................................................13Cache Poisoning with Apache/2.0 – Practical Considerations................................14Cache poisoning with NetCache 5.2 – Practical considerations .............................15Cache Poisoning with Squid 2.4 - Practical Considerations ...................................17Cache Poisoning and Cross Site Scripting with Internet Explorer 6.0 SP1 - PracticalConsiderations ......................................................................................................19Other Indirect Web Cache Poisoning Attacks ......................................................21Cross User Attacks – The Theory..........................................................................22Hijacking a Page (HTTP response) with User Sensitive Information..................23Other Practical Aspects .........................................................................................24HTTP Response Splitting Vulnerability in the Wild ............................................25Research Byproducts .............................................................................................25Recommendations ..................................................................................................28Conclusions.............................................................................................................29Related work ..........................................................................................................30References...............................................................................................................30Appendix - Lab Environment................................................................................31Download: http://dl.packetstormsecurity.net/papers/general/whitepaper_httpresponse.pdf Quote