Azure Front Door WAF IP Bypass

漏洞信息

漏洞名称: Azure Front Door WAF IP Bypass

漏洞类型: 权限绕过

漏洞等级: 低危

漏洞描述: ### 受影响产品
Azure Front Door WAF是微软提供的一种云服务,旨在保护Web应用程序免受常见的网络攻击,如SQL注入、跨站脚本(XSS)等。它通常部署在企业级云环境中,用于增强Web应用的安全性和可用性。由于其广泛的应用,任何安全漏洞都可能对依赖该服务的组织造成重大影响。

漏洞说明

此漏洞属于权限绕过类型,具体表现为攻击者可能通过构造特定的HTTP请求头(如X-Forwarded-For)来绕过Azure Front Door WAF的IP过滤机制。技术根源在于WAF默认使用’RemoteAddr’来过滤IP地址,而未能正确验证或处理X-Forwarded-For等请求头,导致攻击者可以伪造IP地址,绕过基于IP的访问控制。

影响分析

此漏洞可能导致攻击者绕过Azure Front Door WAF的IP限制策略,访问本应被阻止的资源或服务。虽然漏洞的严重性被标记为低危,但它仍然可能被利用来进行未授权访问,尤其是在依赖IP过滤作为主要安全措施的环境中。攻击者无需认证即可利用此漏洞,且可以自动化执行攻击,增加了潜在的风险。组织应评估其WAF配置,确保不依赖单一的IP过滤机制,并考虑实施多层防御策略以缓解此类漏洞带来的风险。

产品厂商: Microsoft

产品名称: Azure Front Door WAF

来源: https://github.com/projectdiscovery/nuclei-templates/issues/12737

类型: projectdiscovery/nuclei-templates:github issues

来源概述

Is there an existing template for this?

  • I have searched the existing templates.

Nuclei Template

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
id: azure-waf-bypass

info:
name: Azure Front Door WAF IP Bypass
author: ldionmarcil
severity: low
reference:
- https://trustedsec.com/blog/azures-front-door-waf-wtf-ip-restriction-bypass
description: |
Potentially bypassable IP blocking using Azure Front Door WAF.
This can be bypassed by default, if 'RemoteAddr' is used to filter IPs.
tags: azure,waf

requests:
- method: GET
path:
- "{{BaseURL}}"

matchers-condition: and
matchers:
- type: status
status:
- 403

condition: and

- type: word
words:
- "x-azure-ref"
case-insensitive: true
part: header

condition: and

- type: word
words:
- "x-cache"
case-insensitive: true
part: header

Relevant dumped responses

1

Anything else?

Heuristic to detect the default Azure Front Door IP Filtering WAF response, which can be bypassable with a proper X-Forwarded-For request header, as detailed in https://trustedsec.com/blog/azures-front-door-waf-wtf-ip-restriction-bypass.