Skip to content

Commit 45b2e5e

Browse files
authored
Update az-front-door.md
1 parent 123b37d commit 45b2e5e

File tree

1 file changed

+1
-6
lines changed

1 file changed

+1
-6
lines changed

src/pentesting-cloud/azure-security/az-services/az-front-door.md

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,6 @@ To bypass this rule automated tools can be used that **brute-force IP addresses*
1010

1111
This is mentioned in the [Microsoft documentation](https://learn.microsoft.com/en-us/azure/web-application-firewall/afds/waf-front-door-configure-ip-restriction).
1212

13-
---
14-
1513
## Credential Skimming via WAF Custom Rules + Log Analytics
1614

1715
Abuse Azure Front Door (AFD) WAF Custom Rules in combination with Log Analytics to capture cleartext credentials (or other secrets) traversing the WAF. This is not a CVE; it’s misuse of legitimate features by anyone who can modify the WAF policy and read its logs.
@@ -80,13 +78,10 @@ The matched values appear in details_matches_s and include the cleartext values
8078
- An existing Azure Front Door instance.
8179
- Permissions to edit the AFD WAF policy and read the associated Log Analytics workspace.
8280

83-
### Impact
84-
- High risk: An operator with WAF/Log access can silently harvest secrets at the trusted TLS termination point.
85-
8681
## References
8782

8883
- [https://trustedsec.com/blog/azures-front-door-waf-wtf-ip-restriction-bypass](https://trustedsec.com/blog/azures-front-door-waf-wtf-ip-restriction-bypass)
8984
- [Skimming Credentials with Azure's Front Door WAF](https://trustedsec.com/blog/skimming-credentials-with-azures-front-door-waf)
9085
- [Azure WAF on Front Door monitoring and logging](https://learn.microsoft.com/en-us/azure/web-application-firewall/afds/waf-front-door-monitor)
9186

92-
{{#include ../../../banners/hacktricks-training.md}}
87+
{{#include ../../../banners/hacktricks-training.md}}

0 commit comments

Comments
 (0)