Python implementation of the Web Cache Deception detection methodology presented in the paper "Web Cache Deception Escalates!" published at USENIX Security '22: Web Cache Deception Escalates!.
Detect WCD vulnerabilities in websites in a black-box manner.
usage: wcde.py -t example.com
For more information about the options, please see the help page.
usage: launcher.py -s sites.txt
For more information about the options, please see the help page.
Requires an account to be manually created on the website so that the attack URL is requested with valid authentication cookies, simulating a logged-in victim clicking on the malicious link.
The JSON cookies file contains a list of cookies and can be generated using the browser extension Cookie-Editor for Firefox or Chrome.
usage: wcde.py -t example.com -c example.com-cookies.json
The --path-confusion
option allows adding more path confusion techniques from a JSON file structured as follows:
{
"EXAMPLE_ONE": "%2E%2E",
"EXAMPLE_TWO": "%2E%2E%3F%2E%2E"
}
The --extensions
option allows adding more file extensions separated by commas.
usage: wcde.py -t example.com --extensions ".pdf, .png, .jpg, .js, .css"
pip install -r requirements.txt
DE testing a vulnerable target with authentication.
- The code is provided as-is and is not guaranteed to detect all WCD vulnerabilities.
- If the script does not find any vulnerabilities, it does not necessarily mean that the website is not vulnerable.
- You should use this script only against websites that you own or control, or for which you have permission to perform security analysis.