You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/pentesting-cloud/azure-security/az-services/az-front-door.md
+1-6Lines changed: 1 addition & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,8 +10,6 @@ To bypass this rule automated tools can be used that **brute-force IP addresses*
10
10
11
11
This is mentioned in the [Microsoft documentation](https://learn.microsoft.com/en-us/azure/web-application-firewall/afds/waf-front-door-configure-ip-restriction).
12
12
13
-
---
14
-
15
13
## Credential Skimming via WAF Custom Rules + Log Analytics
16
14
17
15
Abuse Azure Front Door (AFD) WAF Custom Rules in combination with Log Analytics to capture cleartext credentials (or other secrets) traversing the WAF. This is not a CVE; it’s misuse of legitimate features by anyone who can modify the WAF policy and read its logs.
@@ -80,13 +78,10 @@ The matched values appear in details_matches_s and include the cleartext values
80
78
- An existing Azure Front Door instance.
81
79
- Permissions to edit the AFD WAF policy and read the associated Log Analytics workspace.
82
80
83
-
### Impact
84
-
- High risk: An operator with WAF/Log access can silently harvest secrets at the trusted TLS termination point.
0 commit comments