Burp Suite User Forum

Login to post

Combining web cache poisoning vulnerabilities and Web cache poisoning to exploit a DOM vulnerability via a cache with strict cacheability criteria

Sharon | Last updated: Aug 01, 2022 05:14PM UTC

Helle :) I encountered the same problem in two different labs of cache poisoning. I try to set the Access-Control-allow-origin: * header on the exploit server (on both labs), in order to allow the file to be accessed from the application, but I get the following error: "Invalid response: Invalid HTTP header: expected 10, got byte 37" I tried several times, and also checked the solution and tried to copy the header from there, and it is still not working so I really have no idea what's wrong. Your help would be much appreciated here :) Since this is happening in two different labs, can it be possible that the bot itself is somehow struggling? tnx!

Hannah, PortSwigger Agent | Last updated: Aug 02, 2022 08:47AM UTC

Hi I've just tested the lab that you've been having issues with, and it's worked as expected. Is this issue happening when you're trying to poison the cache through the Repeater tab or when you access the exploit URL?

You need to Log in to post a reply. Or register here, for free.