Web-Cache-Vulnerability-Scanner icon indicating copy to clipboard operation
Web-Cache-Vulnerability-Scanner copied to clipboard

No CSS files were found?

Open marcelo321 opened this issue 1 year ago • 4 comments

Do we hae to link CSS files, or how does one see how the tool performs CSS poisoning, how it differs from the other tests?

marcelo321 avatar Jun 19 '24 15:06 marcelo321

Hey @marcelo321 , did you find this out? It's first time I'm running this and got this:

image

Sh4d0wHunt3rX avatar Sep 05 '24 17:09 Sh4d0wHunt3rX

Do we hae to link CSS files, or how does one see how the tool performs CSS poisoning, how it differs from the other tests?

WCVS searches responses for linked CSS files. It is not possible to directly link CSS files. CSS files are mostly static but there may be occasions where CSS files reflect the requests URL. WCVS checks if that is the case and if true whether it's possible to poison the cache with an arbitrary URL. That is the only check for CSS files.

m10x avatar Sep 08 '24 07:09 m10x

Hey @marcelo321 , did you find this out? It's first time I'm running this and got this:

image

The website you are scanning returns Cf-Cache-Status: DYNAMIC. This means, that the response is not eligible for caching. Hence, wcvs will not test for web cache poisoning (unless you force it to with -f/-force). However, it is trying to achieve web cache deception. This means that it is trying to manipulate the request in order for the response to get cached. It is doing this by trying to trick the Cache Proxy into thinking that a css files is requested. That is because css files will be cached most of the times. The status codes 400 and 444 mean that the Cache Proxy could not be tricked.

m10x avatar Sep 08 '24 07:09 m10x

@m10x Thank you so much for your great explanation and the tool 🙏

Sh4d0wHunt3rX avatar Sep 08 '24 10:09 Sh4d0wHunt3rX

InShot_20241024_145331625

Getting this error on android (termux)

termux-tools version: 1.38.3
Android version: 11
Kernel build info: Linux localhost 4.9.227-perf+ #1 SMP PREEMPT Wed Mar 16 16:56:21 CST 2022 aarch64 Android

schooldropout1337 avatar Oct 24 '24 06:10 schooldropout1337

Golang throws an error because https://example.com% is an invalid format and it won't send the request. https://example.com/% however would be rfc compliant and work.

m10x avatar Oct 24 '24 17:10 m10x

Thanks m8, got it. '/' trailing was missing.

schooldropout1337 avatar Oct 25 '24 09:10 schooldropout1337