Transforming SQL Queries Bypasses WAF Security

  /     /     /  
Publicated : 23/11/2024   Category : security


Transforming SQL Queries Bypasses WAF Security


A team of university researchers finds a machine learning-based approach to generating HTTP requests that slip past Web application firewalls.



BLACK HAT ASIA 2022 — A team of university researchers used basic machine learning to identify patterns that common Web application firewalls (WAFs) fail to detect as malicious, but which can still deliver an attackers payload, one of the researchers said in a presentation at the Black Hat Asia security conference in Singapore on Thursday.
The researchers from Zhejiang University in China started with common ways of transforming injection attacks to target Web-application databases using the common Structured Query Language (SQL). Rather than using a brute-force search of potential bypasses, the team created a tool, AutoSpear, that uses a pool of potential bypasses that can be combined using a weighted mutation strategy and then tested to determine the effectiveness of the bypasses at evading the security of WAF-as-a-service offerings.
The tool successfully bypassed — as measured by a false negative rate — all seven of the tested cloud-based WAFs with a variety of success, from a low of 3% for ModSecurity to a high of 63% for Amazon Web Services and Cloudflares WAFs, said Zhenqing Qu, a Zhejiang University graduate student and member of the AutoSpear team.
The case studies have shown the potential [of the tool], because detection signatures were not robust due to various vulnerabilities, he said. Just adding comments or whitespace can bypass some WAFs, but the most effective mutation depends on specific WAFs.
The AWS, Fortinet, F5, and CSC web application firewalls were deployed using the managed rulesets provided by those vendors on the Amazon Web Services WAF platform, while the Cloudflare and Wallarm WAFs were purchased from those companies official website, Zhenqing said. In many cases, a vendors standalone WAF—such as Fortinets FortiWeb and FortiWeb Cloud—are not impacted by the same issues as the WAF rulesets.
Web application firewalls are a common way to defend important cloud software and Web services from attack, filtering out common application attacks and attempts at injecting database commands, also known as SQL injection (SQLi). A 2020 study, for example, found that 4 in 10 security professionals believed that
50% of application-layer attacks
that targeted their cloud application bypassed their WAF. Other attacks focus on
compromising the WAF through its inspection of traffic
.
In
their presentation
, the team from Zhejiang University focused on ways of transforming requests using 10 different techniques for the four common request methods: POST and GET requests, either using JSON encoding or not. 
The researchers found that the four different types of requests were treated the same by rulesets provided by four different WAF vendors, while others approached the inputs differently.
By systematically mutating the requests with different combinations of the 10 techniques — such as inline comments, substituting whitespace, and substituting the common tautologies (that is, 1=1) for others (such as, 2<3) — the researchers found a set of transformations that performed best against each of the seven different WAF rulesets.
[C]ombining multiple mutation methods, AutoSpear is much more effective in bypassing mainstream WAF-as-a-service solutions due to their vulnerable detection signatures for semantic matching and regular expression matching, the researchers stated in their presentation slides.
SQL injection attacks continue to be a major risk for many companies. The OWASP Top-10 Web Security Risks rated the Injection class of vulnerabilities at the top of its list of risks in 2013 and 2017, and
as the No. 3 risk in 2021
. The list, released approximately every four years, uses more than 400 broad classes of weaknesses to determine the most significant threats for web applications.
The research team started with creating Web applications that had specific vulnerabilities, and then used its approach to transforms the known exploits into a unique request that the WAF would not catch.
Bypassing Web application firewalls typically focus on three broad approaches. At the architectural level, attackers can find ways to circumvent the WAF and directly access the origin server. At the protocol level, a variety of techniques can use errors or mismatches in encoding assumptions, such as
HTTP request smuggling
, to bypass WAFs. Finally, at the payload level, attackers can use a variety of encoding transformation to fool the WAF into failing to detect an attack, while still producing a valid request from the standpoint of the database server.
The transformations allowed the attacks to be successful anywhere from 9% of the time to nearly 100% of the time, depending on the WAF ruleset and the request format, the team stated in their presentation. In one case, the researcher found that just adding a newline character, /n, bypassed a major WAF-as-a-service.
AWS, Cloudflare Affected
The research team reported the vulnerabilities to all seven providers of WAFs and WAF rulesets: AWS, Cloudflare, CSC, F5, Fortinet, ModSecurity, and Wallarm. Cloudflare, F5, and Wallarm have fixed their issues, Zhenqing said. The team also provided the vendors with bypass patterns that can be used to detect the most common types of transformations.
The other four are still working with us, since the flaws cannot be easily patched, he said.

Last News

▸ CryptoWall is more widespread but less lucrative than CryptoLocker. ◂
Discovered: 23/12/2024
Category: security

▸ Feds probe cyber breaches at JPMorgan, other banks. ◂
Discovered: 23/12/2024
Category: security

▸ Security Problem Growing for Dairy Queen, UPS & Retailers, Back off ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Transforming SQL Queries Bypasses WAF Security