Claroty discovers method to bypass vendors’ Web Application Firewalls (WAF)

Share post:

Claroty experts created a generic method for circumventing a variety of leading manufacturers’ web application firewalls (WAF).

The technique, developed by Claroty’s threat research team Team82, is generic, which means it can be used against web application firewalls (WAFs) from various vendors. The technique has been successfully tested against products from Amazon Web Services, Cloudflare, F5, Imperva, and Palo Alto Networks.

WAFs act as a security guardrail against malicious external HTTP(S) traffic, allowing an attacker with the ability to breach the barrier to gain initial access to a target environment for further post-exploitation. Claroty’s bypass mechanism relies on WAFs’ lack of JSON support to craft rogue SQL injection payloads that include JSON syntax to avoid detection.

The vulnerability was reported to be exploitable against the on-premises version, but the Amazon Web Services (AWS) WAF blocked all attempts to exploit it against the cloud version by flagging the SQL injection payload as malicious.

The bypass technique could be used in a number of different attacks. WAFs are used to protect not only web applications, but also APIs and cloud-based management platforms, as Claroty mentioned. Attackers could use the bypass to gain access to backend databases and then exfiltrate data through compromised servers or cloud instances by exploiting additional flaws.

The sources for this piece include an article in TheHackerNews.

Featured Tech Jobs

SUBSCRIBE NOW

Related articles

Cyber Security Today, Week in Review for week ending Friday, April 26, 2024

This episode features a discussion on the latest in the Change Healthcare ransomware attack, a vulnerability in an abandoned Apache open source project, the next step in Canada's proposed critical infrastructure cybersecurity law and the future

Cyber Security Today, April 26, 2024 – Patch warnings for Cisco ASA gateways and a WordPress plugin

This episode reports on the malicious plugin worm that refuses to die

Cyber Security Today, April 24, 2024 – Good news/bad news in Mandiant report, UnitedHealth admits paying a ransomware gang, and more

This episode reports on the danger of using expired open-source packages, a tool used by a Russian hacking group and passw

Google Play introduces new biometric verification with a user warning

Google has recently announced updates to the biometric verification process for Google Play purchases, aiming to bolster security...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways