Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Browser Cache Attack Bypasses Web Security

July 4, 2025
Reading Time: 2 mins read
in Alerts
Browser Cache Attack Bypasses Web Security

A sophisticated new technique has been discovered that bypasses Content Security Policy protections using HTML injection and cache manipulation. It specifically targets the back/forward cache and the disk cache systems used by many popular web browsers. This research demonstrates how attackers can circumvent one of the web’s most important security mechanisms. This potentially exposes countless web applications to Cross-Site Scripting attacks that were previously thought to be well protected.

The attack methodology centers on exploiting the reuse of CSP nonce values through different browser caching mechanisms. This multi-stage approach begins with CSS injection to leak the secret nonce values from the target web application. The technique utilizes CSS attribute selectors to extract nonce values from meta tags containing the CSP headers. The research team discovered that while nonce attributes in script tags are protected, the same values remain accessible. This allows attackers to systematically leak the nonce values using CSS injection techniques that generate multiple background requests.

The method exploits the interaction between nonce-based CSP implementations and also modern browser caching mechanisms.

The attack also leverages Cross-Site Request Forgery vulnerabilities to update the injected payload while maintaining access. By exploiting a login endpoint’s lack of CSRF protection, attackers can modify the stored malicious payload. The breakthrough lies in manipulating browser cache partitioning and the interaction between the bfcache and disk cache. When bfcache conditions fail, the browser falls back to disk cache, which preserves the original page. This allows the known nonce to be preserved while also allowing for dynamic content updates from the attacker.

This research reveals significant implications for web application security, as many applications rely on nonce-based CSP.

This technique works across modern browsers and requires only two preconditions for it to be successful. Security professionals must now consider cache behavior when implementing CSP protections on their web applications. This may require additional safeguards such as cache-control headers and improved nonce generation strategies to be implemented. This vulnerability serves as a call to reassess how effectively security investments are surfacing these latent risks.

Reference:

  • Nonce CSP bypass using Disk Cache
Tags: BrowserCyber AlertsCyber Alerts 2025CyberattackCybersecurityJuly 2025
ADVERTISEMENT

Related Posts

AMOS Mac Stealer Adds Persistent Backdoor

AMOS Mac Stealer Adds Persistent Backdoor

July 8, 2025
AMOS Mac Stealer Adds Persistent Backdoor

NordDragonScan Malware Steals Windows Data

July 8, 2025
AMOS Mac Stealer Adds Persistent Backdoor

New Ransomware BERT Targets ESXi Systems

July 8, 2025
hpingbot Botnet Uses Pastebin C2 Channel

APT36 Targets Indian Defense Linux Systems

July 7, 2025
hpingbot Botnet Uses Pastebin C2 Channel

Hackers Abuse Driver Signing For Malware

July 7, 2025
hpingbot Botnet Uses Pastebin C2 Channel

hpingbot Botnet Uses Pastebin C2 Channel

July 7, 2025

Latest Alerts

New Ransomware BERT Targets ESXi Systems

NordDragonScan Malware Steals Windows Data

AMOS Mac Stealer Adds Persistent Backdoor

APT36 Targets Indian Defense Linux Systems

hpingbot Botnet Uses Pastebin C2 Channel

Hackers Abuse Driver Signing For Malware

Subscribe to our newsletter

    Latest Incidents

    French Chip Firm Semco Hacked During IPO

    Louis Vuitton Korea Hit By Cyberattack

    Virginia School District Hit By Cyberattack

    Ransomware Attack Causes Outage at Ingram

    Call of Duty Players Hacked on Game Pass

    RansomHub Claims Theft of Coppell City Data

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial