{"published":"2025-09-16 07:53:32","url":"https://cysec148.hatenablog.com/entry/2025/09/16/075332","title":"Lab: Combining web cache poisoning vulnerabilities","image_url":null,"provider_name":"Hatena Blog","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fcysec148.hatenablog.com%2Fentry%2F2025%2F09%2F16%2F075332\" title=\"Lab: Combining web cache poisoning vulnerabilities - Shikata Ga Nai\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","type":"rich","width":"100%","author_name":"ThisIsOne","provider_url":"https://hatena.blog","version":"1.0","blog_title":"Shikata Ga Nai","description":"Hello there, ('\u03c9')\u30ce \u5168\u4f53\u50cf\uff08\u307e\u305a\u201c\u7d75\u201d\u3092\u63b4\u3080\uff09 \u30c8\u30c3\u30d7\uff08/\uff09\u306f\u6642\u3005 \u30d0\u30c3\u30af\u30b9\u30e9\u30c3\u30b7\u30e5\u3092\u6b63\u898f\u5316\u3057\u3066 /setlang\\es \u2192 302 \u2192 /setlang/es \u3092\u8fd4\u3059\u3002 \u2192 302\u304c\u30ad\u30e3\u30c3\u30b7\u30e5\u53ef\u80fd\u306a\u306e\u3067\u3001\u30db\u30fc\u30e0\u3092\u8e0f\u3093\u3060\u4eba\u5168\u54e1\u3092 /setlang/es \u306b\u62bc\u3057\u51fa\u305b\u308b\uff08\uff1d\u5f37\u5236\u7684\u306b lang=es \u30af\u30c3\u30ad\u30fc\u3092\u30b5\u30fc\u30d0\u5074\u3067\u30bb\u30c3\u30c8\uff09\u3002 /?localized=1 \u306f \u7ffb\u8a33JSON\uff08/resources/json/translations.json\uff09\u3092\u8aad\u307f\u8fbc\u3080\u3002\u82f1\u8a9e\u4ee5\u5916\u306e\u8a00\u8a9e\u3067\u306f initTranslations() \u306eDOM\u6271\u3044\u304c\u5371\u967a\u3067\u3001JSON\u5024\u306b HTML\u304c\u305d\u306e\u307e\u307e\u633f\u5165\u3055\u308c\u308b\u3002 \u2026","height":"190","categories":["Web Security Academy","Web Cache"],"author_url":"https://blog.hatena.ne.jp/ThisIsOne/","blog_url":"https://cysec148.hatenablog.com/"}