Lee Duna@lemmy.nz to Technology@beehaw.orgEnglish · 1 year agoCloudflare DDoS protections ironically bypassed using Cloudflarewww.bleepingcomputer.comexternal-linkmessage-square3fedilinkarrow-up1107arrow-down10cross-posted to: cybersecurity@infosec.pubcybersecurity@lemmy.capebreton.social
arrow-up1107arrow-down1external-linkCloudflare DDoS protections ironically bypassed using Cloudflarewww.bleepingcomputer.comLee Duna@lemmy.nz to Technology@beehaw.orgEnglish · 1 year agomessage-square3fedilinkcross-posted to: cybersecurity@infosec.pubcybersecurity@lemmy.capebreton.social
minus-squareSmashingSquid@notyour.rodeolinkfedilinkEnglisharrow-up10·1 year agoIf it needs the servers ip address doesn’t that make it not a big deal since the ip is hidden in the dns record if cloudflare is proxying?
minus-squareconciselyverbose@kbin.sociallinkfedilinkarrow-up9·1 year agoIt could still be a problem for an enterprise client where individuals could exfiltrate or accidentally leak target IPs. A lot of security flaws like this don’t automatically compromise a system, but can be used in combination with other elements for an attack. Identifying it means they have the ability to resolve it and come up with an action plan for an attack if long term mitigations will take time though.
If it needs the servers ip address doesn’t that make it not a big deal since the ip is hidden in the dns record if cloudflare is proxying?
It could still be a problem for an enterprise client where individuals could exfiltrate or accidentally leak target IPs.
A lot of security flaws like this don’t automatically compromise a system, but can be used in combination with other elements for an attack.
Identifying it means they have the ability to resolve it and come up with an action plan for an attack if long term mitigations will take time though.