Web Cache Deception
Web Cache Deception is an attack where an attacker tricks a web cache into storing sensitive content that should only be delivered dynamically to individual users. Once cached, that private content may then be served to other users who request the same URL. The attack exploits differences in how the web server and the caching layer interpret the same URL.
Web Cache Deception is a vulnerability class in which an attacker exploits URL parsing discrepancies between a web application server and its caching layer to cause the cache to incorrectly store dynamic, user-specific, or otherwise sensitive responses as if they were static cacheable resources. The attack typically involves crafting a URL that the origin server interprets as a request for authenticated or personalized dynamic content, while the cache layer treats the request as a static resource eligible for storage based on path suffix, file extension, or cache rule heuristics. Once the response is cached, the attacker retrieves it directly from the cache without authentication, potentially exposing session data, account details, or other sensitive information. The root cause is inconsistency in URL normalization, path segment handling, or cache key construction between the origin and the caching component.
Why it matters
Web Cache Deception is significant because it can expose sensitive, authenticated user data to unauthenticated attackers without requiring any direct interaction with the victim's session. When a caching layer is tricked into storing a response that contains personal account details, session tokens, or other private information, that data becomes retrievable by anyone who requests the same crafted URL. The attack is particularly dangerous because the vulnerability exists at the infrastructure level, meaning a single misconfiguration can affect large numbers of users simultaneously.
The attack was publicly presented at Black Hat USA 2017 by researcher Omer Gil, which brought widespread attention to how caching infrastructure, intended to improve performance and scalability, can inadvertently become an attack surface. The technique is relevant to any application that uses a caching layer in front of a web server, including those relying on CDNs, reverse proxies, or application-level caches, which describes a broad portion of modern web deployments.
Beyond data exposure, Web Cache Deception is difficult to detect through standard monitoring because the attacker's HTTP request may appear superficially similar to legitimate traffic. The cached response is served by the cache itself rather than by the origin application, which means application-layer logging may not capture the moment of data exfiltration. This makes post-incident forensics more complex and underscores the importance of preventive controls over reactive detection.
Who it's relevant to
Inside WCD
Common questions
Answers to the questions practitioners most commonly ask about WCD.