This web application is using a caching system. By manipulating specific unkeyed inputs (HTTP/2 pseudo-headers that are not included when generating the cache key) it was possible to force the caching system to cache a response that contains user-controlled input. This cached response can be later served to a victim resulting in various vulnerabilities.


Key unkeyed HTTP/2 pseudo-headers


Related Vulnerabilities