Silverstripe CMS sites through 4.4.4 which have opted into HTTP Cache Headers on responses served by the framework's HTTP layer can be vulnerable to web cache poisoning. Through modifying the X-Original-Url and X-HTTP-Method-Override headers, responses with malicious HTTP headers can return unexpected responses to other consumers of this cached response. Most other headers associated with web cache poisoning are already disabled through request hostname forgery whitelists.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-4928 Silverstripe CMS sites through 4.4.4 which have opted into HTTP Cache Headers on responses served by the framework's HTTP layer can be vulnerable to web cache poisoning. Through modifying the X-Original-Url and X-HTTP-Method-Override headers, responses with malicious HTTP headers can return unexpected responses to other consumers of this cached response. Most other headers associated with web cache poisoning are already disabled through request hostname forgery whitelists.
Github GHSA Github GHSA GHSA-q9ff-3q93-fm8m SilverStripe Web Cache Poisoning through HTTPRequestBuilder
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T02:16:46.998Z

Reserved: 2019-11-27T00:00:00

Link: CVE-2019-19326

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-07-15T19:15:11.180

Modified: 2024-11-21T04:34:34.667

Link: CVE-2019-19326

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.