This web application is using a caching system. By sending a POST request with the same GET parameter it was possible to force the caching system to cache a response that contains user-controlled input. This cached response can be later served to a victim resulting in various vulnerabilities.


Caching keys should also include the HTTP method to prevent this type of issues.


Related Vulnerabilities