Skip to main content

A high-concurrency CLI tool for detecting web cache poisoning vulnerabilities.

Project description

CachePoisonDetector (CPD-SEC)

PyPI version Python Versions CI License: MIT Code style: black

A high-concurrency CLI tool for detecting web cache poisoning vulnerabilities.

Overview

CPD-SEC is a security tool designed to identify vulnerabilities in web caching systems that allow cache poisoning attacks.

Installation

Using Pip (Recommended)

You can install CPD-SEC directly from PyPI:

pip install cpd-sec

From Source

  1. Clone the repository:

    git clone https://github.com/kankburhan/cpd.git
    cd cpd
    
  2. Install dependencies using Poetry:

    poetry install
    

    Alternatively, calculate dependencies to requirements.txt and use pip:

    pip install .
    

Usage

CPD-SEC supports multiple input methods and extensive configuration options.

1. Basic Scan (--url)

Scan a single target URL.

# Installed via pip
cpd-sec scan --url https://example.com

# Using poetry
poetry run cpd-sec scan --url https://example.com

2. Pipeline Mode (Stdin)

Pipe URLs from other tools (like waybackurls, gau, subfinder, or cat) directly into CPD-SEC. This is ideal for mass scanning.

# Scan URLs found by waybackurls
waybackurls target.com | cpd-sec scan

# Scan URLs from a file using cat
cat urls.txt | cpd-sec scan --concurrency 20

3. File Input (--file)

Read URLs from a text file (one URL per line).

cpd-sec scan --file urls.txt

4. Raw Request Scan (--request-file)

Scan using a raw HTTP request definition (e.g., copied from Burp Suite).

# Save your request to a file (e.g. request.txt)
cpd-sec scan --request-file request.txt

Alternative: Direct String (--raw) Use with caution due to shell escaping characters.

cpd-sec scan --raw "GET /api/foo HTTP/1.1
Host: example.com"

5. Advanced Options

Custom Headers (--header)

Add custom headers to every request (e.g., cookies, authorization). You can use this flag multiple times.

cpd-sec scan -u https://admin.example.com \
    -h "Cookie: session=12345" \
    -h "Authorization: Bearer XYZ"

Output to File (--output)

Save the findings to a JSON file.

cpd-sec scan -u https://example.com --output results.json

Concurrency (--concurrency)

Control the number of simultaneous requests (default: 50).

cpd-sec scan -f targets.txt --concurrency 100

Verbosity (--verbose, --quiet)

Control output levels.

cpd-sec scan -u https://example.com -v  # Debug logging
cpd-sec scan -u https://example.com -q  # Only show findings

5. Utilities

Validate Finding (validate)

Manually verify a vulnerability claim step-by-step.

cpd-sec validate --url https://target.com --header "X-Forwarded-Host: evil.com"

Update Tool (update)

Check for and install the latest version of CPD-SEC.

cpd-sec update

Features

  • Auto Update Check: Automatically checks for new versions on run. Auto Update
  • High Concurrency: Built with asyncio and aiohttp for speed.
  • Smart Baseline: Establishes a stable baseline to reduce false positives.
  • Advanced Poisoning:
    • Header Injection: X-Forwarded-Host, X-Forwarded-Scheme, Fastly-Client-IP, etc.
    • Path Normalization: Exploits backend URL decoding differences (/foo\bar).
    • Fat GET: Sends request bodies with GET requests.
    • Unkeyed Query Params: Injects parameters to test cache key inclusion.
    • Method Override: Tests X-HTTP-Method-Override.
  • Pipeline Ready: Designed to integrate into your reconnaissance workflow.

Contributing

We welcome contributions to improve CPD-SEC, especially for new poisoning signatures and false positive reductions.

Reporting False Positives

If you encounter a false positive (a reported vulnerability that is benign), please open an Issue with:

  1. Replication Output: The output of the validate command:
    cpd-sec validate --url <TARGET_URL> --header "KEY: VALUE"
    
  2. Context: Why you believe it is benign (e.g., "The server normalizes the path but returns the same content").

Contributing Code

  1. Fork the repository.
  2. Clone your fork locally.
  3. Install dependencies: poetry install.
  4. Create a Branch for your feature/fix.
  5. Add/Modify Signatures in cpd/logic/poison.py.
  6. Add Tests in tests/ to verify your changes.
  7. Submit a Pull Request!

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

cpd_sec-0.4.0.tar.gz (23.4 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

cpd_sec-0.4.0-py3-none-any.whl (26.0 kB view details)

Uploaded Python 3

File details

Details for the file cpd_sec-0.4.0.tar.gz.

File metadata

  • Download URL: cpd_sec-0.4.0.tar.gz
  • Upload date:
  • Size: 23.4 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/2.2.1 CPython/3.9.25 Linux/6.11.0-1018-azure

File hashes

Hashes for cpd_sec-0.4.0.tar.gz
Algorithm Hash digest
SHA256 6251d6a1274adb41dcf9c8b5d02e1a625f3e7293edf2c9fafbd6ed3f4ec0b8d3
MD5 fdd3cd951f042782347befd8a64cd68d
BLAKE2b-256 3a5a98e56ecbb4e5213f8a8cd9ca6d92660803387d6b588b55318201e2f1e47a

See more details on using hashes here.

File details

Details for the file cpd_sec-0.4.0-py3-none-any.whl.

File metadata

  • Download URL: cpd_sec-0.4.0-py3-none-any.whl
  • Upload date:
  • Size: 26.0 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/2.2.1 CPython/3.9.25 Linux/6.11.0-1018-azure

File hashes

Hashes for cpd_sec-0.4.0-py3-none-any.whl
Algorithm Hash digest
SHA256 ed6d5b92c13bf20e4c160970192b22c98785ca80c9ffeca1cdd8ee91809a9c42
MD5 ca447e0660048c6fe44f7c0d26d3d02e
BLAKE2b-256 d0b225e8b41570a7292b70c2b0598f0815be300425a190b1e98db041b3d980ed

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page