CIO News Hubb
Advertisement
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
CIO News Hubb
No Result
View All Result
Home Information Security

Researchers Detail New Attack Method to Bypass Popular Web Application Firewalls

admin by admin
December 11, 2022
in Information Security


Dec 10, 2022Ravie LakshmananWeb App Firewall / Web Security

A new attack method can be used to circumvent web application firewalls (WAFs) of various vendors and infiltrate systems, potentially enabling attackers to gain access to sensitive business and customer information.

Web application firewalls are a key line of defense to help filter, monitor, and block HTTP(S) traffic to and from a web application, and safeguard against attacks such as cross-site forgery, cross-site-scripting (XSS), file inclusion, and SQL injection.

CyberSecurity

The generic bypass “involves appending JSON syntax to SQL injection payloads that a WAF is unable to parse,” Claroty researcher Noam Moshe said. “Most WAFs will easily detect SQLi attacks, but prepending JSON to SQL syntax left the WAF blind to these attacks.”

The industrial and IoT cybersecurity company said its technique successfully worked against WAFs from vendors like Amazon Web Services (AWS), Cloudflare, F5, Imperva, and Palo Alto Networks, all of whom have since released updates to support JSON syntax during SQL injection inspection.

Web Application Firewalls

With WAFs acting as a security guardrail against malicious external HTTP(S) traffic, an attacker with capabilities to get past the barrier can obtain initial access to a target environment for further post-exploitation.

The bypass mechanism devised by Claroty banks on the lack of JSON support for WAFs to craft rogue SQL injection payloads that include JSON syntax to skirt the protections.

“Attackers using this novel technique could access a backend database and use additional vulnerabilities and exploits to exfiltrate information via either direct access to the server or over the cloud,” Moshe explained. “This is a dangerous bypass, especially as more organizations continue to migrate more business and functionality to the cloud.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.





Source link

Tags: computer securitycyber attackscyber newscyber security newscyber security news todaycyber security updatescyber updatesdata breachhacker newshacking newshow to hackinformation securitynetwork securityransomware malwaresoftware vulnerabilitythe hacker news
Previous Post

Innovateleadership ~ Future of CIO

Next Post

How to Innovate by Introducing Product Management in SMB and Non-Tech Companies

Related Posts

Information Security

Google Releases Patch for Actively Exploited Zero-Day Vulnerability

by admin
September 28, 2023
Information Security

AWS achieves QI2/QC2 qualification to host critical data and workloads from the Italian Public Administration

by admin
September 28, 2023
Information Security

RATs, rootkits, and ransomware (oh my!)

by admin
September 28, 2023
Information Security

Microsoft is Rolling out Support for Passkeys in Windows 11

by admin
September 27, 2023
Information Security

Deploy AWS WAF faster with Security Automations

by admin
September 27, 2023
Next Post

How to Innovate by Introducing Product Management in SMB and Non-Tech Companies

Recommended

Google Releases Patch for Actively Exploited Zero-Day Vulnerability

September 28, 2023

AWS achieves QI2/QC2 qualification to host critical data and workloads from the Italian Public Administration

September 28, 2023

RATs, rootkits, and ransomware (oh my!)

September 28, 2023

The Innovation Framework and Key Success Factors ~ Future of CIO

September 27, 2023

Microsoft is Rolling out Support for Passkeys in Windows 11

September 27, 2023

Deploy AWS WAF faster with Security Automations

September 27, 2023

© CIO News Hubb All rights reserved.

Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Privacy Policy and Terms & Conditions.

Navigate Site

  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

Newsletter Sign Up

No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

© 2022 CIO News Hubb All rights reserved.