Cookie Consent by Free Privacy Policy Generator ๐Ÿ“Œ Cloudflare Public Bug Bounty: Using special IPv4-mapped IPv6 addresses to bypass local IP ban

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Cloudflare Public Bug Bounty: Using special IPv4-mapped IPv6 addresses to bypass local IP ban


๐Ÿ’ก Newskategorie: Sicherheitslรผcken
๐Ÿ”— Quelle: vulners.com


image
By using IPv4-mapped IPv6 addresses there was a way to bypass Cloudflare server's network protections and start connections to ports on the loopback (127.0.0.1) or internal IP addresses (such as 10.0.0.1). The bug was caused by the way a Go library interprets mapped IP addresses and how our code was checking for banned IPs. The code was fixed and now checks both IPv4 and IPv6 properly. Cloudflare has checks in place to block requests destined for banned IP addresses like local and reserved IP ranges. It was possible to bypass these restrictions using proxied AAAA records containing IPv4-mapped IPv6 addresses (e.g. ::ffff:127.0.0.1 and ::ffff:10.0.0.1). This made it possible to access HTTP services listening on the loopback interface of the edge server handling the request, as well as the internal IP addresses of other hosts on the local... ...



๐Ÿ“Œ Cloudflare Public Bug Bounty: YAML schema injection risk in Swagger UI via schema_url parameter at developers.cloudflare.com


๐Ÿ“ˆ 43.3 Punkte

๐Ÿ“Œ Asnap - Tool To Render Recon Phase Easier By Providing Updated Data About Which Companies Owns Which Ipv4 Or Ipv6 Addresses


๐Ÿ“ˆ 39.44 Punkte

๐Ÿ“Œ Internet: Cloudflare macht IPv6 parallel zu IPv4 jetzt Pflicht


๐Ÿ“ˆ 39.28 Punkte

๐Ÿ“Œ Cloudflare Public Bug Bounty: Password Policy Restriction Bypass


๐Ÿ“ˆ 38.31 Punkte

๐Ÿ“Œ Cloudflare Public Bug Bounty: Bypass two-factor authentication


๐Ÿ“ˆ 38.31 Punkte

๐Ÿ“Œ Cloudflare Public Bug Bounty: Bypass R2 payment screen


๐Ÿ“ˆ 38.31 Punkte

๐Ÿ“Œ Cloudflare Public Bug Bounty: HTTP request smuggling with Origin Rules using newlines in the host_header action parameter


๐Ÿ“ˆ 37.17 Punkte

๐Ÿ“Œ Cloudflare Public Bug Bounty: Take over subdomains of r2.dev using R2 custom domains


๐Ÿ“ˆ 37.17 Punkte

๐Ÿ“Œ Internet Bug Bounty: CVE-2022-27775: Bad local IPv6 connection reuse


๐Ÿ“ˆ 32.61 Punkte

๐Ÿ“Œ Cloudflare Public Bug Bounty: Sign in with Apple generates long-life JWTs, seemingly irrevocable, that grant immediate access to accounts


๐Ÿ“ˆ 32.06 Punkte

๐Ÿ“Œ Cloudflare Public Bug Bounty: cd=false (DNSSEC) not respected in DNS over HTTPS JSON requests


๐Ÿ“ˆ 32.06 Punkte

๐Ÿ“Œ Cloudflare Public Bug Bounty: Sign in with Apple works on existing accounts, bypasses 2FA


๐Ÿ“ˆ 32.06 Punkte

๐Ÿ“Œ Cloudflare Public Bug Bounty: Origin IP address disclosure through Pingora response header


๐Ÿ“ˆ 32.06 Punkte

๐Ÿ“Œ Cloudflare Public Bug Bounty: Permanent CASB Integration Takeover due to Improper Access Controls+Confused Deputy Problem


๐Ÿ“ˆ 32.06 Punkte

๐Ÿ“Œ Linux Kernel up to 3.15.1 IPv4 UDP Socket net/ipv4/datagram.c ip4_datagram_release_cb memory corruption


๐Ÿ“ˆ 30.83 Punkte

๐Ÿ“Œ Cisco Wireless LAN Controller Software 8.4 IPv4 Fragment IPv4 Packet denial of service


๐Ÿ“ˆ 30.83 Punkte

๐Ÿ“Œ Wind River VxWorks 6.9/7 IPv4 IPv4 Packet Stack-based memory corruption


๐Ÿ“ˆ 30.83 Punkte

๐Ÿ“Œ Suricata 4.1.4 Options decode-ipv4.c IPV4OptValidateTimestamp IPv4 Packet memory corruption


๐Ÿ“ˆ 30.83 Punkte

๐Ÿ“Œ CVE-2022-3435 | Linux Kernel IPv4 net/ipv4/fib_semantics.c fib_nh_match out-of-bounds


๐Ÿ“ˆ 30.83 Punkte

๐Ÿ“Œ CVE-2023-42754 | Linux Kernel 6.2.16 IPv4 net/ipv4/route.c ipv4_send_dest_unreach null pointer dereference (FEDORA-2023-50bd7c9c12)


๐Ÿ“ˆ 30.83 Punkte

๐Ÿ“Œ CVE-2023-6932 | Linux Kernel up to 6.6.x IPv4 net/ipv4/igmp.c igmp_start_timer use after free


๐Ÿ“ˆ 30.83 Punkte

๐Ÿ“Œ Linux Kernel bis 3.15.1 IPv4 UDP Socket net/ipv4/datagram.c ip4_datagram_release_cb Pufferรผberlauf


๐Ÿ“ˆ 30.83 Punkte

๐Ÿ“Œ Ultra fast public IP address lookup using Cloudflare's 1.1.1.1 Using awk


๐Ÿ“ˆ 28.34 Punkte

๐Ÿ“Œ dynv6: Kostenloser Dyndns-Dienst fรผr IPv4 und IPv6


๐Ÿ“ˆ 28.05 Punkte

๐Ÿ“Œ IPv4 und IPv6: Mangelhaft duplizierte Security-Richtlinien


๐Ÿ“ˆ 28.05 Punkte

๐Ÿ“Œ IPv4-Dรคmmerung: Telekom testet IPv6-only-Kommunikation im Mobilfunk


๐Ÿ“ˆ 28.05 Punkte

๐Ÿ“Œ [shellcode] Linux/x86 - Dual Network Stack (IPv4 and IPv6) Bind TCP Shellcode


๐Ÿ“ˆ 28.05 Punkte

๐Ÿ“Œ IPv4 Server Hacked in 12 Minutes While IPv6 Server Remained Untouched


๐Ÿ“ˆ 28.05 Punkte

๐Ÿ“Œ #0daytoday #Linux/x86 - Dual Network Stack (IPv4 and IPv6) Bind TCP #Shellcode [shellcode #0day #Exploit]


๐Ÿ“ˆ 28.05 Punkte

๐Ÿ“Œ Linux/x86 Dual Network Stack (IPv4 and IPv6) Bind TCP Shellcode


๐Ÿ“ˆ 28.05 Punkte

๐Ÿ“Œ How to configure nginx to distinguish IPv6 and IPv4 users


๐Ÿ“ˆ 28.05 Punkte

๐Ÿ“Œ IPv6 Security For IPv4 Engineers


๐Ÿ“ˆ 28.05 Punkte

๐Ÿ“Œ DEF CON 27 Packet Hacking Village - Travis Palmer - First Try DNS Cache Poisoning with IPv4 and IPv6


๐Ÿ“ˆ 28.05 Punkte

๐Ÿ“Œ F5 BIG-IP 13.0.0 IPv4/IPv6 Memory Leak denial of service


๐Ÿ“ˆ 28.05 Punkte











matomo