- cross-posted to:
- cybersecurity@lemmy.capebreton.social
- cross-posted to:
- cybersecurity@lemmy.capebreton.social
My abstract for the linked article
Cloudflare’s DDoS protections can be bypassed through a specific attack process uncovered by researchers. By setting up a free Cloudflare account and pointing the domain to a victim’s IP address, an attacker can disable protections and route traffic through Cloudflare’s infrastructure, bypassing the company’s security checks. This is possible due to flaws in Cloudflare’s use of a shared certificate for all customers and reliance on traffic originating from its IP ranges. A proof-of-concept demonstrated how easy it is to leverage these logic gaps. While the issues were reported to Cloudflare in March, they have not committed to fixing the problems.
If left unaddressed, these vulnerabilities could render Cloudflare’s protections less effective at stopping attacks on its clients.
Archive.today link to www.bleepingcomputer.com
This comment was generated by a bot. Send comments and complaints via private message.
If it needs the servers ip address doesn’t that make it not a big deal since the ip is hidden in the dns record if cloudflare is proxying?
It could still be a problem for an enterprise client where individuals could exfiltrate or accidentally leak target IPs.
A lot of security flaws like this don’t automatically compromise a system, but can be used in combination with other elements for an attack.
Identifying it means they have the ability to resolve it and come up with an action plan for an attack if long term mitigations will take time though.