CDN Cache Poisoning Allows DoS Attacks Against Cloud Apps

  /     /     /  
Publicated : 23/11/2024   Category : security


CDN Cache Poisoning Allows DoS Attacks Against Cloud Apps


A Romanian researcher discovers more than 70 vulnerabilities in how applications and their content delivery networks handle cache misses that open the doors to denial-of-service attacks.



A Romanian vulnerability researcher has discovered more than 70 flaws in combinations of cloud applications and content delivery networks (CDNs) that could be used to poison the CDN caches and result in denial-of-service (DoS) attacks on the applications.
In a late December post, security researcher Iustin Ladunca revealed he had found inconsistencies in the way that a variety of content-caching services and technologies handled common headers variations, such as the capitalization of host information, URL fragments, and invalid values. Because the caching service or technology may handle the information differently — such as lowercasing capitalized headers — the application might return an error, which the caching service would store indexed to a legitimate application route. The result would be that valid HTML or API requests would return the cached error, essentially creating a DoS condition.
The research shows that poisoning Web caches is still a significant threat to cloud applications, Ladunca said in
the recap of his research
.
Even though Web Cache Poisoning has been around for years, the increasing complexity in technology stacks constantly introduces unexpected behavior which can be abused to achieve novel cache poisoning attacks, he stated.
Ladunca bet that the greater complexity would result in more vulnerabilities, making cache poisoning a fertile area for research. Since this subtle inconsistence affected a good subset of bug bounty targets I decided to see what other common patterns I could identify and exploit at scale, he wrote.
Using Web cache poisoning to block access to cloud services and websites is a very efficient DoS attack. A single request, when cached, can cause a site, service, or specific page to become inaccessible for hours, depending on the length of time between cache refreshes. Any Web or API request that a CDN passes to the application that causes the application to throw an exception could poison the cache and result in a DoS attack.
Three years ago, James Kettle, director of research at security-tool maker PortSwigger,
gave a Black Hat presentation
about
Practical Web Cache Poisoning,
 outlining methods of exploiting the decision process that caching services use to determine whether to return cached content or to forward requests onto an application.
The specific thing where you can cause a denial-of-service by poisoning the cache, there are so many ways to do it — there are an insane number of ways you can do it, Kettle says. If I had to make some money right now by bug hunting, that is what I would do — and its great that other people are doing it — but there is no way that one person can find them all.
Searching for Flaws in Modern Cache Services
Kettles research inspired Ladunca to look for Web cache inconsistencies that led to exploitable DoS conditions. Over the past
two

years
, Ladunca has found more than 70 vulnerabilities, garnering more than $26,000 in bug bounties, according to individual bounty amounts in his blog post. (Another report
cited Laduncas tally of approximately $40,000
as the total amount of bug-bounty awards. Ladunca could not be reached for comment.)
The researcher originally discovered a flaw in a specific configuration of the Varnish Web caching proxy, but soon found that some services — including Cloudflare and Fastly — were vulnerable to a capitalized host header attack: CDNs lowercased the header for the cache index, considering the request valid, while some case-sensitive applications returned an error that was then cached.
This meant Cloudflare lowercased the host header before introducing it into the cache key, but always forwarded as sent by the client, Ladunca wrote in his blog. If any backend behind Cloudflare would respond with a different response when sent a capitalized host header, it would allow the cache to be poisoned.
Laduncas latest blog features cache-poisoning issues with Apache Traffic Server, GitHub, GitLab, Cloudflare, Amazons S3 storage buckets, and Fastly. All issues have been fixed, he stated.
Companies Should Reconsider Bug Bounties for DoS
This research underscores that cache-based DoS attacks, which cloud-service providers often do not allow in bug-bounty research, should be considered in scope in the future, says PortWiggers Kettle. While no company wants to encourage hackers to experiment with methods that might take down its site or service, companies should want to know whether attackers could disrupt their service, he argues.
There are a lot of programs that say, We do not allow denial-of-service vulnerabilities. We will not pay you for these, Kettle says. I think this is starting to shift. If we are Google and someone can take down our home page, that is a big deal, and we do want to know about it.
Going forward, we will likely see more companies consider DoS attacks — especially those caused by single requests and exploiting architectures — to be in scope for penetration tests and bug bounties, Kettle says.
Most bug-bounty policies have text discouraging DoS attacks. However, if you look closely youll see some of them actually forbid launching DoS attacks, rather than forbidding reporting DoS vulnerabilities, he stated in
a 2019 blog post on responsible research
. Web cache poisoning has a rare property in that its often possible to make a proof of concept without actually launching an attack.

Last News

▸ Researchers create BlackForest to gather, link threat data. ◂
Discovered: 23/12/2024
Category: security

▸ Travel agency fined £150,000 for breaking Data Protection Act. ◂
Discovered: 23/12/2024
Category: security

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
CDN Cache Poisoning Allows DoS Attacks Against Cloud Apps