Cache keys are parts of an HTTP request that the cache will use to uniquely identify a response. Typically, a cache key consists of the values of one or more response headers as well as the whole or part of the URL path. Cache key injection, or, in the case of being abused by hackers, “Cache key poisoning”, is the act of identifying a vulnerability in the web cache contents and exploiting it through injection of a malicious script tag into a page and then storing the page in the cache. By doing this an attacker will be able to turn a reflected header XSS into a stored XSS that will last until the cache entry expires.
Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.
✕