Researchers Detail New Attack Method to Bypass Popular Web Application Firewalls

0
200
Researchers Detail New Attack Method to Bypass Popular Web Application Firewalls


Dec 10, 2022Ravie LakshmananWeb App Firewall / Web Security

Researchers Detail New Attack Method to Bypass Popular Web Application Firewalls

A brand new assault methodology can be utilized to avoid net software firewalls (WAFs) of varied distributors and infiltrate techniques, probably enabling attackers to achieve entry to delicate enterprise and buyer info.

Web software firewalls are a key line of protection to assist filter, monitor, and block HTTP(S) site visitors to and from an online software, and safeguard in opposition to assaults corresponding to cross-site forgery, cross-site-scripting (XSS), file inclusion, and SQL injection.

CyberSecurity

The generic bypass “includes appending JSON syntax to SQL injection payloads {that a} WAF is unable to parse,” Claroty researcher Noam Moshe stated. “Most WAFs will simply detect SQLi assaults, however prepending JSON to SQL syntax left the WAF blind to those assaults.”

The industrial and IoT cybersecurity firm stated its method efficiently labored in opposition to WAFs from distributors like Amazon Web Services (AWS), Cloudflare, F5, Imperva, and Palo Alto Networks, all of whom have since launched updates to assist JSON syntax throughout SQL injection inspection.

Web Application Firewalls

With WAFs appearing as a safety guardrail in opposition to malicious exterior HTTP(S) site visitors, an attacker with capabilities to get previous the barrier can acquire preliminary entry to a goal setting for additional post-exploitation.

The bypass mechanism devised by Claroty banks on the dearth of JSON assist for WAFs to craft rogue SQL injection payloads that embrace JSON syntax to skirt the protections.

“Attackers utilizing this novel method might entry a backend database and use extra vulnerabilities and exploits to exfiltrate info through both direct entry to the server or over the cloud,” Moshe defined. “This is a harmful bypass, particularly as extra organizations proceed emigrate extra enterprise and performance to the cloud.”

Found this text attention-grabbing? Follow us on Twitter and LinkedIn to learn extra unique content material we submit.

LEAVE A REPLY

Please enter your comment!
Please enter your name here