this post was submitted on 02 Oct 2023
107 points (100.0% liked)

Technology

37711 readers
163 users here now

A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.

Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 2 years ago
MODERATORS
top 3 comments
sorted by: hot top controversial new old
[–] [email protected] 12 points 1 year ago

My abstract for the linked article


Cloudflare's DDoS protections can be bypassed through a specific attack process uncovered by researchers. By setting up a free Cloudflare account and pointing the domain to a victim's IP address, an attacker can disable protections and route traffic through Cloudflare's infrastructure, bypassing the company's security checks. This is possible due to flaws in Cloudflare's use of a shared certificate for all customers and reliance on traffic originating from its IP ranges. A proof-of-concept demonstrated how easy it is to leverage these logic gaps. While the issues were reported to Cloudflare in March, they have not committed to fixing the problems.

If left unaddressed, these vulnerabilities could render Cloudflare's protections less effective at stopping attacks on its clients.


Archive.today link to www.bleepingcomputer.com


This comment was generated by a bot. Send comments and complaints via private message.

[–] [email protected] 10 points 1 year ago (1 children)

If it needs the servers ip address doesn’t that make it not a big deal since the ip is hidden in the dns record if cloudflare is proxying?

[–] [email protected] 9 points 1 year ago

It could still be a problem for an enterprise client where individuals could exfiltrate or accidentally leak target IPs.

A lot of security flaws like this don't automatically compromise a system, but can be used in combination with other elements for an attack.

Identifying it means they have the ability to resolve it and come up with an action plan for an attack if long term mitigations will take time though.