Home » Vulnerabilities Knowledge Base » Cacheable Https Response
The most common cached response is a 200 OK result from a GET request. However, browsers can also cache:
If an application stores sensitive information in cache for a long period, it can lead to confidentiality breaches. Cached sensitive data may allow future users to access another user's session details, potentially leading to privilege escalation (horizontal or vertical).
By default, HTTPS responses are cached unless instructed not to via headers. To verify vulnerability, inspect HTTP headers:
Cache-control: no-store
Pragma: no-cache
Cache-Control: max-age=<seconds>
Cache-Control: max-stale[=<seconds>]
Cache-Control: min-fresh=<seconds>
Cache-Control: no-cache
Cache-Control: no-store
Cache-Control: no-transform
Cache-Control: only-if-cached
Cache-Control: must-revalidate
Cache-Control: no-cache
Cache-Control: no-store
Cache-Control: no-transform
Cache-Control: public
Cache-Control: private
Cache-Control: proxy-revalidate
Cache-Control: max-age=<seconds>
Cache-Control: s-maxage=<seconds>
Content Sniffing
Certain browsers, try to determine the content type and encoding of the response even when these properties are defined correctly...
Content Sniffing
Certain browsers, try to determine the content type and encoding of the response even when these properties are defined correctly...
Content Sniffing
Certain browsers, try to determine the content type and encoding of the response even when these properties are defined correctly...
Content Sniffing
Certain browsers, try to determine the content type and encoding of the response even when these properties are defined correctly...