4.4.6-Testing_for_Browser_Cache_Weaknesses

Testing for Browser Cache Weaknesses

ID
WSTG-ATHN-06

Summary

In this phase the tester checks that the application correctly instructs the browser to not retain sensitive data.

Browsers can store information for purposes of caching and history. Caching is used to improve performance, so that previously displayed information doesn't need to be downloaded again. History mechanisms are used for user convenience, so the user can see exactly what they saw at the time when the resource was retrieved. If sensitive information is displayed to the user (such as their address, credit card details, Social Security Number, or username), then this information could be stored for purposes of caching or history, and therefore retrievable through examining the browser's cache or by simply pressing the browser's Back button.

Test Objectives

  • Review if the application stores sensitive information on the client-side.
  • Review if access can occur without authorization.

How to Test

Browser History

Technically, the Back button is a history and not a cache (see Caching in HTTP: History Lists). The cache and the history are two different entities. However, they share the same weakness of presenting previously displayed sensitive information.

The first and simplest test consists of entering sensitive information into the application and logging out. Then the tester clicks the Back button of the browser to check whether previously displayed sensitive information can be accessed whilst unauthenticated.

If by pressing the Back button the tester can access previous pages but not access new ones, then it is not an authentication issue, but a browser history issue. If these pages contain sensitive data, it means that the application did not forbid the browser from storing it.

Authentication does not necessarily need to be involved in the testing. For example, when a user enters their email address in order to sign up to a newsletter, this information could be retrievable if not properly handled.

The Back button can be stopped from showing sensitive data. This can be done by:

  • Delivering the page over HTTPS.
  • Setting Cache-Control: must-revalidate

Browser Cache

Here testers check that the application does not leak any sensitive data into the browser cache. In order to do that, they can use a proxy (such as ZAP) and search through the server responses that belong to the session, checking that for every page that contains sensitive information the server instructed the browser not to cache any data. Such a directive can be issued in the HTTP response headers with the following directives:

  • Cache-Control: no-cache, no-store
  • Expires: 0
  • Pragma: no-cache

These directives are generally robust, although additional flags may be necessary for the Cache-Control header in order to better prevent persistently linked files on the file system. These include:

  • Cache-Control: must-revalidate, max-age=0, s-maxage=0
http 复制代码
HTTP/1.1:
Cache-Control: no-cache
html 复制代码
HTTP/1.0:
Pragma: no-cache
Expires: "past date or illegal value (e.g., 0)"

For instance, if testers are testing an e-commerce application, they should look for all pages that contain a credit card number or some other financial information, and check that all those pages enforce the no-cache directive. If they find pages that contain critical information but that fail to instruct the browser not to cache their content, they know that sensitive information will be stored on the disk, and they can double-check this simply by looking for the page in the browser cache.

The exact location where that information is stored depends on the client operating system and on the browser that has been used. Here are some examples:

  • Mozilla Firefox:
    • Unix/Linux: ~/.cache/mozilla/firefox/
    • Windows: C:\Users\<user_name>\AppData\Local\Mozilla\Firefox\Profiles\<profile-id>\Cache2\
  • Internet Explorer:
    • C:\Users\<user_name>\AppData\Local\Microsoft\Windows\INetCache\
  • Chrome:
    • Windows: C:\Users\<user_name>\AppData\Local\Google\Chrome\User Data\Default\Cache
    • Unix/Linux: ~/.cache/google-chrome
Reviewing Cached Information

Firefox provides functionality for viewing cached information, which may be to your benefit as a tester. Of course the industry has also produced various extensions, and external apps which you may prefer or need for Chrome, Internet Explorer, or Edge.

Cache details are also available via developer tools in most modern browsers, such as Firefox, Chrome, and Edge. With Firefox it is also possible to use the URL about:cache to check cache details.

Check Handling for Mobile Browsers

Handling of cache directives may be completely different for mobile browsers. Therefore, testers should start a new browsing session with clean caches and take advantage of features like Chrome's Device Mode or Firefox's Responsive Design Mode to re-test or separately test the concepts outlined above.

Additionally, personal proxies such as ZAP and Burp Suite allow the tester to specify which User-Agent should be sent by their spiders/crawlers. This could be set to match a mobile browser User-Agent string and used to see which caching directives are sent by the application being tested.

Gray-Box Testing

The methodology for testing is equivalent to the black-box case, as in both scenarios testers have full access to the server response headers and to the HTML code. However, with gray-box testing, the tester may have access to account credentials that will allow them to test sensitive pages that are accessible only to authenticated users.

Tools

References

Whitepapers

相关推荐
Ha_To13 分钟前
2025.12.18 NAT地址转换、PAT
linux·服务器·网络
云和恩墨22 分钟前
告别 “事后救火”:7 大前置动作规避 80% 数据库故障
数据库·oracle
vortex534 分钟前
Linux 命令行入门:命令的构成与选项用法
linux·运维·服务器
STLearner39 分钟前
VLDB 2025 | 时间序列(Time Series)论文总结(预测,异常检测,压缩,自动化等)
数据库·人工智能·深度学习·神经网络·机器学习·数据挖掘·时序数据库
1 小时前
TIDB——TIKV——raft
数据库·分布式·tidb
不会c嘎嘎1 小时前
MySQL 指南:全面掌握用户管理与权限控制
数据库·mysql
ShadowSmartMicros1 小时前
java调用milvus数据库
java·数据库·milvus
Bug.ink1 小时前
BUUCTF——WEB(2)
数据库·sql·网络安全·buuctf
山风wind1 小时前
网络分层模型:OSI和TCP/IP参考模型
服务器·网络·tcp/ip
像风一样的男人@1 小时前
linux --防火墙
linux·运维·服务器