The Burp Suite User Forum was discontinued on the 1st November 2024.

Burp Suite User Forum

For support requests, go to the Support Center. To discuss with other Burp users, head to our Discord page.

SUPPORT CENTER DISCORD

Combining web cache poisoning vulnerabilities and Web cache poisoning to exploit a DOM vulnerability via a cache with strict cacheability criteria

Sharon | Last updated: Aug 01, 2022 05:14PM UTC

Helle :) I encountered the same problem in two different labs of cache poisoning. I try to set the Access-Control-allow-origin: * header on the exploit server (on both labs), in order to allow the file to be accessed from the application, but I get the following error: "Invalid response: Invalid HTTP header: expected 10, got byte 37" I tried several times, and also checked the solution and tried to copy the header from there, and it is still not working so I really have no idea what's wrong. Your help would be much appreciated here :) Since this is happening in two different labs, can it be possible that the bot itself is somehow struggling? tnx!

Hannah, PortSwigger Agent | Last updated: Aug 02, 2022 08:47AM UTC