Kingdom: Environment

This section includes everything that is outside of the source code but is still critical to the security of the product that is being created. Because the issues covered by this kingdom are not directly related to source code, we separated it from the rest of the kingdoms.

Cache Management: Web Cache Poisoning

Abstract
An attacker can use Web Cache Poisoning to exploit the application and deliver a malicious response to a legitimate request
Explanation

In Web Cache Poisoning (WCP) the attacker exploits the behavior of caches. This is done by exploiting multiple mechanisms. Some of which include identifying unkeyed inputs such as headers. Unkeyed inputs are used to construct the response but are not the part of cache key.
Web cache ignores the unkeyed input when sending responses. Therefore, it sends the malicious responses that the attacker had cached with the help of these unkeyed inputs.
The unkeyed inputs can be reflected in the response or can be used to dynamically generate responses.
Another mechanism uses fat GET requests. Fat GET requests are GET requests with a request body. An attacker can duplicate a query parameter in the request body with attacker-controlled value and trick an application into responding differently. An intermediate cache might ignore such a request body when caching the response and respond with a cached fat GET response when a normal request arrives.

WCP is possible through a variety of methods including unkeyed headers, fat GET requests, unkeyed ports, unkeyed query parameters, and more.
References
[1] Standards Mapping - Common Weakness Enumeration CWE ID 444
[2] Standards Mapping - DISA Control Correlation Identifier Version 2 CCI-000366, CCI-002754
[3] Standards Mapping - FIPS200 CM
[4] Standards Mapping - General Data Protection Regulation (GDPR) Indirect Access to Sensitive Data
[5] Standards Mapping - NIST Special Publication 800-53 Revision 4 CM-4 Security Impact Analysis (P2), SI-10 Information Input Validation (P1)
[6] Standards Mapping - NIST Special Publication 800-53 Revision 5 CM-4 Impact Analyses, SI-10 Information Input Validation
[7] Standards Mapping - OWASP Application Security Verification Standard 4.0 13.2.5 RESTful Web Service Verification Requirements (L2 L3)
[8] Standards Mapping - OWASP Top 10 2004 A10 Insecure Configuration Management
[9] Standards Mapping - OWASP Top 10 2010 A6 Security Misconfiguration
[10] Standards Mapping - OWASP Top 10 2013 A5 Security Misconfiguration
[11] Standards Mapping - OWASP Top 10 2017 A6 Security Misconfiguration
[12] Standards Mapping - OWASP Top 10 2021 A04 Insecure Design
[13] Standards Mapping - Payment Card Industry Software Security Framework 1.0 Control Objective 10.2 - Threat and Vulnerability Management
[14] Standards Mapping - Payment Card Industry Software Security Framework 1.1 Control Objective 10.2 - Threat and Vulnerability Management
[15] Standards Mapping - Payment Card Industry Software Security Framework 1.2 Control Objective 10.2 - Threat and Vulnerability Management
[16] Standards Mapping - Security Technical Implementation Guide Version 4.2 APSC-DV-002560 CAT I
[17] Standards Mapping - Security Technical Implementation Guide Version 4.3 APSC-DV-002560 CAT I
[18] Standards Mapping - Security Technical Implementation Guide Version 4.4 APSC-DV-002560 CAT I
[19] Standards Mapping - Security Technical Implementation Guide Version 4.5 APSC-DV-002560 CAT I
[20] Standards Mapping - Security Technical Implementation Guide Version 4.6 APSC-DV-002560 CAT I
[21] Standards Mapping - Security Technical Implementation Guide Version 4.7 APSC-DV-002560 CAT I
[22] Standards Mapping - Security Technical Implementation Guide Version 4.8 APSC-DV-002560 CAT I
[23] Standards Mapping - Security Technical Implementation Guide Version 4.9 APSC-DV-002560 CAT I
[24] Standards Mapping - Security Technical Implementation Guide Version 4.10 APSC-DV-002560 CAT I
[25] Standards Mapping - Security Technical Implementation Guide Version 4.11 APSC-DV-002560 CAT I
[26] Standards Mapping - Security Technical Implementation Guide Version 4.1 APSC-DV-002560 CAT I
[27] Standards Mapping - Security Technical Implementation Guide Version 5.1 APSC-DV-002560 CAT I
[28] Standards Mapping - Security Technical Implementation Guide Version 5.2 APSC-DV-002560 CAT I
[29] Standards Mapping - Security Technical Implementation Guide Version 5.3 APSC-DV-002560 CAT I
[30] Standards Mapping - Security Technical Implementation Guide Version 6.1 APSC-DV-002560 CAT I
[31] Standards Mapping - Web Application Security Consortium Version 2.00 Server Misconfiguration (WASC-14)
desc.dynamic.xtended_preview.cache_management_web_cache_poisoning