The Burp Suite User Forum was discontinued on the 1st November 2024.

Burp Suite User Forum

For support requests, go to the Support Center. To discuss with other Burp users, head to our Discord page.

SUPPORT CENTER DISCORD

Targeted web cache poisoning using an unknown header

kairosdev | Last updated: Mar 11, 2022 10:43AM UTC

Hey, Can you have a look a this code because I can't get the lab resolved. I think I'm doing everything right but there's no way. Request ET / HTTP/1.1 Host: aced1f8e1e4fc20bc05a939a00b300af.web-security-academy.net User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/99.0.4844.51 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: close Referer: https://aced1f8e1e4fc20bc05a939a00b300af.web-security-academy.net/ Cookie: session=Wvk1Q9bgzAUdYwhqAfta3hM7k8714Uyz Upgrade-Insecure-Requests: 1 Content-Length: 0 X-Host: exploit-ac141faa1e2bc279c09293bc01680017.web-security-academy.net Response HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Vary: User-Agent Cache-Control: max-age=30 Age: 10 X-Cache: hit Connection: close Content-Length: 7566

Michelle, PortSwigger Agent | Last updated: Mar 11, 2022 01:28PM UTC

Thanks for getting in touch to report this issue. We have been able to replicate the problem here and have identified an issue in this particular lab. This has been raised with the Academy team and they are investigating the cause of the problem. We'll update this thread once we have an update.

Michelle, PortSwigger Agent | Last updated: Apr 01, 2022 10:31AM UTC