• AbstractifyBot@beehaw.orgB
    link
    fedilink
    arrow-up
    13
    ·
    1 year ago
    My abstract for the linked article

    Cloudflare’s DDoS protections can be bypassed through a specific attack process uncovered by researchers. By setting up a free Cloudflare account and pointing the domain to a victim’s IP address, an attacker can disable protections and route traffic through Cloudflare’s infrastructure, bypassing the company’s security checks. This is possible due to flaws in Cloudflare’s use of a shared certificate for all customers and reliance on traffic originating from its IP ranges. A proof-of-concept demonstrated how easy it is to leverage these logic gaps. While the issues were reported to Cloudflare in March, they have not committed to fixing the problems.

    If left unaddressed, these vulnerabilities could render Cloudflare’s protections less effective at stopping attacks on its clients.


    Archive.today link to www.bleepingcomputer.com


    This comment was generated by a bot. Send comments and complaints via private message.

  • SmashingSquid@notyour.rodeo
    link
    fedilink
    English
    arrow-up
    10
    ·
    1 year ago

    If it needs the servers ip address doesn’t that make it not a big deal since the ip is hidden in the dns record if cloudflare is proxying?

    • conciselyverbose@kbin.social
      link
      fedilink
      arrow-up
      9
      ·
      1 year ago

      It could still be a problem for an enterprise client where individuals could exfiltrate or accidentally leak target IPs.

      A lot of security flaws like this don’t automatically compromise a system, but can be used in combination with other elements for an attack.

      Identifying it means they have the ability to resolve it and come up with an action plan for an attack if long term mitigations will take time though.