Non-Cloudflare IPs allowed to access origin servers

Disclosed: 2018-05-28 04:11:21 By emitrani To coalition
Low
Vulnerability Details
Hello Security Team, **Summary:** Like report #255978 It is possible to access origin servers served by nginx and not cloudflare. **Description:** Even though these IP's don't serve a functional version of the app it is possible to enable DDoS attacks by bypassing cloudflare protections. ## Steps To Reproduce: 1. 52.32.239.55 2. 54.69.218.2 3. 34.208.41.101 There are more IP's but I think these are enough as a proof of concept. ## Impact Response header from one of origin IP's : `Connection:keep-alive Content-Encoding:gzip Content-Length:4774 Content-Type:text/html; charset=utf-8 Date:Wed, 14 Feb 2018 01:28:15 GMT Request-Id:542a2e00-1126-11e8-bfba-c90bcfe9a4b2 Server:nginx/1.12.1 Strict-Transport-Security:max-age=16070400 Vary:Accept-Encoding X-Content-Type-Options:nosniff X-Download-Options:noopen X-Frame-Options:deny X-XSS-Protection:1; mode=block` and the regular website: `cf-ray:3ecc3592fd2a7e21-DTW content-encoding:br content-type:text/html; charset=utf-8 date:Wed, 14 Feb 2018 01:21:12 GMT expect-ct:max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct" request-id:57feab10-1125-11e8-a7fe-31e9cef0afb4 server:cloudflare status:200 strict-transport-security:max-age=2592000; includeSubDomains vary:Accept-Encoding x-content-type-options:nosniff x-download-options:noopen x-frame-options:deny x-xss-protection:1; mode=block` Also http://54.69.218.2/login serves an insecure login page.
Actions
View on HackerOne
Report Stats
  • Report ID: 315838
  • State: Closed
  • Substate: resolved
  • Upvotes: 23
Share this report