💰 I Found Cache Poisoning & Earned $500 in Just a Few Minutes! 🚀

TheIndianNetwork
2 min read4 days ago

--

Images By — TheIndianNetwork

🚀 How I Discovered a Cache Poisoning Bug in Minutes & Got Paid!

One of the easiest yet highly overlooked vulnerabilities in bug bounty hunting is cache poisoning. Recently, I found a simple misconfiguration that allowed me to poison a website’s cache and deliver attacker-controlled content to all users! 💥 This led to a quick $500 bounty, and in this guide, I’ll show you how I did it step by step.

🕵️‍♂️ Step 1: Finding a Target with Caching Mechanisms

While testing a large website, I noticed it was using CDN-based caching (like Cloudflare, Akamai, or Fastly). These caching mechanisms store responses to serve them faster. However, if the cache incorrectly processes headers, attackers can manipulate responses to affect all users. 🚨

To check for caching behavior, I sent a simple curl request:

curl -I https://target.com/page

Response:

HTTP/1.1 200 OK
Cache-Control: public, max-age=3600
X-Cache: HIT

🚀 Key Findings:

Cache-Control: public → The response can be cached.

X-Cache: HIT → The page is cached and being served from cache.

🔥 Step 2: Poisoning the Cache Using Unkeyed Headers

Many caching servers don’t correctly validate unkeyed headers (headers that don’t change the cache key). One common vulnerability is Host header poisoning.

I sent a request with a malicious Host header:

GET /page HTTP/1.1
Host: evil.com
X-Forwarded-Host: evil.com

If the server processes this header incorrectly, it caches the modified response for all users! 😈

⚠️ Step 3: Confirming the Cache Poisoning

To check if my payload worked, I made a request as a normal user:

curl -I https://target.com/page

And the response came back with my injected Host header!

HTTP/1.1 200 OK
Cache-Control: public, max-age=3600
Content: evil.com attack successful!
X-Cache: HIT

🚨 Impact: ✅ Attackers can serve malicious content (phishing pages, fake login forms, etc.).
Stored XSS can be injected, affecting thousands of users.
✅ Critical resources like login or checkout pages can be poisoned.

📩 Reporting & Quick $500 Bounty

Once I confirmed the bug, I immediately reported it via the bug bounty platform. Since it could be used for phishing or spreading malware, the security team acknowledged the risk and paid a quick $500 bounty! 💰🔥

🏆 Lessons Learned

1️⃣ Always check for cacheable responses (Cache-Control: public).
2️⃣ Test different unkeyed headers (e.g., X-Forwarded-Host, X-Original-URL).
3️⃣ Look for CDN misconfigurations (Fastly, Cloudflare, Akamai).
4️⃣ Report responsibly—cache poisoning can be dangerous!

🔥 Want More Hacking Tutorials?

🛡️ Subscribe for Cybersecurity Videos: youtube.com/@theindiannetwork
💌 Need Ethical Hacking Consultation? Contact: theindiannetwork@protonmail.com

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

TheIndianNetwork
TheIndianNetwork

Written by TheIndianNetwork

The Indian Network is a dedicated platform focused on educating and empowering individuals in the fields of cybersecurity, ethical hacking, and digital privacy.

No responses yet

Write a response