New issue
Advanced search Search tips

Issue 837542 link

Starred by 2 users

Issue metadata

Status: WontFix
Owner: ----
Closed: Apr 2018
EstimatedDays: ----
NextAction: ----
OS: ----
Pri: ----
Type: Bug-Security



Sign in to add a comment

Security: Information disclosure through http cache

Reported by ma7h1a...@gmail.com, Apr 27 2018

Issue description

online demo: http://176.122.169.50/static/guest.html

 

Comment 1 by ma7h1a...@gmail.com, Apr 27 2018

the online demo shows how to abuse http cache to bypass a referer check
or in another word , it could cause a referer spoofing vuln. (but not only this)

http://115.159.205.137/token.php checks if referer=="http://www.infelphira.cn/static/admin.html" 

but when http://176.122.169.50/static/guest.html send the request to token.php , it should get "get out you are just guest" rather than "token from admin"
token.php
268 bytes View Download
Status: WontFix (was: Unconfirmed)
Here's what I think you're saying here:

1> If there's a resource for which the server makes an Access Control decision based on the HTTP Referer header, AND
2> That resource is cacheable, AND
3> The server fails to properly include a Vary: Referer response header on that response, THEN

Then the browser will freely use that resource for subsequent requests, despite the fact that the server would have returned a different resource had the resource not been in the cache.

Is that correct?

If so, this is absolutely working-as-expected. Servers who vary responses based on request headers must indicate that they've done so using the Vary response header.
Project Member

Comment 3 by sheriffbot@chromium.org, Aug 4

Labels: -Restrict-View-SecurityTeam allpublic
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot

Sign in to add a comment