this post was submitted on 04 Dec 2024
25 points (100.0% liked)
Cybersecurity
5922 readers
241 users here now
c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.
THE RULES
Instance Rules
- Be respectful. Everyone should feel welcome here.
- No bigotry - including racism, sexism, ableism, homophobia, transphobia, or xenophobia.
- No Ads / Spamming.
- No pornography.
Community Rules
- Idk, keep it semi-professional?
- Nothing illegal. We're all ethical here.
- Rules will be added/redefined as necessary.
If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.
Learn about hacking
Other security-related communities [email protected] [email protected] [email protected] [email protected] [email protected]
Notable mention to [email protected]
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
I feel like this doesn't explain a lot. What makes it so trivial to find the origin? They just brush it aside as easy.
Also this really just comes back to: secure your origins folks, especially if you're relying on edge security features. Nobody should be relying on a waf though.
The tech blog is much better: https://www.zafran.io/resources/breaking-waf-technical-analysis
It boils down to scanning all IPV4 space, and grabbing the SSL certificate returned by any webservers on port 443. If the server is incorrectly configured the fields in the SSL cert will tell you what domains it serves. And using Certificate Transparency logs to figure out what domains you want to target. I wouldn't really call this a flaw that breaks anything. It's just a byproduct of how SSL, IPV4, and WAFs work.
Ahh that makes more sense, especially if people aren't using the cf origin certs. I'd expect SNI to prevent this on newer systems though, unless it's the default cert on the ip.
From the article:
So apparently the real issue is that people aren't using SNI correctly.
So, misconfigured backends that don't limit access to CDN sources can be fingerprinted through web scans. Seems like a big honking nothing-burger.