<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CloudGuard AppSec is the only product known to pre-emptively block Claroty WAF bypass in WAF</title>
    <link>https://community.checkpoint.com/t5/WAF/CloudGuard-AppSec-is-the-only-product-known-to-pre-emptively/m-p/164763#M95</link>
    <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/80409"&gt;@yuvalmamka&lt;/a&gt;&amp;nbsp;that's a wonderful explanation. I am the one who has implemented Appsec when it was pretty new and running in production with around 18 portals.&lt;/P&gt;</description>
    <pubDate>Mon, 12 Dec 2022 03:36:02 GMT</pubDate>
    <dc:creator>Blason_R</dc:creator>
    <dc:date>2022-12-12T03:36:02Z</dc:date>
    <item>
      <title>CloudGuard AppSec is the only product known to pre-emptively block Claroty WAF bypass</title>
      <link>https://community.checkpoint.com/t5/WAF/CloudGuard-AppSec-is-the-only-product-known-to-pre-emptively/m-p/164746#M94</link>
      <description>&lt;P class="mm8Nw _1j-51 roLFQS _1FoOD _3M0Fe Z63qyL roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="_2PHJq public-DraftStyleDefault-ltr"&gt;This article originally posted by Oded Gonda, on open-appsec website &lt;A href="https://www.openappsec.io/post/open-appsec-cloudguard-appsec-is-the-only-product-known-to-pre-emptively-block-claroty-waf-bypass" target="_self"&gt;here&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="mm8Nw _1j-51 roLFQS _1FoOD _3M0Fe Z63qyL roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="_2PHJq public-DraftStyleDefault-ltr"&gt;--&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="mm8Nw _1j-51 roLFQS _1FoOD _3M0Fe Z63qyL roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="_2PHJq public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;&lt;A class="_3Bkfb _1lsz7" tabindex="0" href="https://claroty.com/team82" target="_blank" rel="noopener noreferrer" data-hook="linkViewer"&gt;&lt;U class="_3zM-5"&gt;Claroty Team82&lt;/U&gt;&lt;/A&gt; has developed a generic bypass for industry-leading web application firewalls (WAF). &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="_2PHJq public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;The bypass technique involves appending JSON syntax to SQL injection payloads that a WAF is unable to parse. It is explained in a &lt;A class="_3Bkfb _1lsz7" tabindex="0" href="https://claroty.com/team82/research/js-on-security-off-abusing-json-based-sql-to-bypass-waf" target="_blank" rel="noopener noreferrer" data-hook="linkViewer"&gt;&lt;U class="_3zM-5"&gt;detailed blog&lt;/U&gt;&lt;/A&gt; that was published on December 8th, 2022.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="mm8Nw _1j-51 roLFQS _1FoOD _3M0Fe Z63qyL roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="_2PHJq public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;As part of a &lt;A class="_3Bkfb _1lsz7" tabindex="0" href="https://en.wikipedia.org/wiki/Coordinated_vulnerability_disclosure" target="_blank" rel="noopener noreferrer" data-hook="linkViewer"&gt;&lt;U class="_3zM-5"&gt;responsible disclosure&lt;/U&gt;&lt;/A&gt; process for vulnerabilities, Claroty approached our team with findings of the new bypass technique. Looking at the attack payloads we thought that open-appsec/CloudGuard AppSec ML-engine would block the attack based on the vast training data we use. To validate, we tested it on the same day and indeed it blocked the attack pre-emptively! We sent the product logs to the Claroty team and they confirmed “&lt;STRONG&gt;&lt;EM&gt;Thanks for the update. Kudos to the AppSec Team&lt;/EM&gt;&lt;/STRONG&gt;”. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="mm8Nw _1j-51 roLFQS _1FoOD _3M0Fe Z63qyL roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="_2PHJq public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;You can read more about the WAF bypass technique in &lt;A class="_3Bkfb _1lsz7" tabindex="0" href="https://claroty.com/team82/research/js-on-security-off-abusing-json-based-sql-to-bypass-waf" target="_blank" rel="noopener noreferrer" data-hook="linkViewer"&gt;Claroty’s detailed blog&lt;/A&gt;. It explains the details of this new bypass vector and how they found that AWS WAF as well as other major WAFs were vulnerable to it:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV id="viewer-ba7a4" class="_2vd5k b6lcWf"&gt;
&lt;DIV class="_3CWa- sxFoib sxFoib _3mymk"&gt;
&lt;DIV class="_2kEVY" tabindex="0" role="button" data-hook="imageViewer"&gt;
&lt;DIV id="new-image11833" class="_3WJnn _2i-Gt _2Ybje"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_0-1670769212518.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18741i66CD0DE85D192175/image-size/large?v=v2&amp;amp;px=999" role="button" title="yuvalmamka_0-1670769212518.png" alt="yuvalmamka_0-1670769212518.png" /&gt;&lt;/span&gt;
&lt;P&gt;&lt;SPAN&gt;Source: Claroty Team82 Blog&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;H2 id="viewer-50qlm" class="eSWI6 _1j-51 _1FoOD _3M0Fe Z63qyL roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="_2PHJq public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;Attack Details&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;DIV id="viewer-4n3li" class="mm8Nw _1j-51 roLFQS _1FoOD _3M0Fe Z63qyL roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="_2PHJq public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;SQL Injection is one of the most well-known attack vectors and has been part of &lt;A class="_3Bkfb _1lsz7" tabindex="0" href="https://owasp.org/www-project-top-ten/" target="_blank" rel="noopener noreferrer" data-hook="linkViewer"&gt;OWASP-Top-10&lt;/A&gt; list for years. As such all WAF solutions are able to detect it. The innovation in Claroty’s bypass involved adding JSON to SQL syntax which rendered most WAFs blind to the attacks.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="mm8Nw _1j-51 roLFQS _1FoOD _3M0Fe Z63qyL roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV id="viewer-4gaah" class="mm8Nw _1j-51 roLFQS _1FoOD _3M0Fe Z63qyL roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="_2PHJq public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;&lt;A class="_3Bkfb _1lsz7" tabindex="0" href="https://learn.microsoft.com/en-us/sql/relational-databases/json/json-data-sql-server?view=sql-server-ver16" target="_blank" rel="noopener noreferrer" data-hook="linkViewer"&gt;JSON in SQL&lt;/A&gt; has been supported by leading databases for many years, including Microsoft SQL Server, MySQL, SQLite, PostgresSQL and others. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block15"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV id="viewer-fe55q" class="mm8Nw _1j-51 roLFQS _1FoOD _3M0Fe Z63qyL roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="_2PHJq public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="_2PHJq public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;Claroty team was able to craft expressions that allowed to get a true statements in SQL:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV id="viewer-6adqf" class="_2vd5k b6lcWf"&gt;
&lt;DIV class="_3CWa- sxFoib sxFoib _3mymk"&gt;
&lt;DIV class="_2kEVY" tabindex="0" role="button" data-hook="imageViewer"&gt;
&lt;DIV id="new-image11834" class="_3WJnn _2i-Gt _2Ybje"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_1-1670769212691.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18740i5D4EEEA4156BEDA6/image-size/large?v=v2&amp;amp;px=999" role="button" title="yuvalmamka_1-1670769212691.png" alt="yuvalmamka_1-1670769212691.png" /&gt;&lt;/span&gt;
&lt;P&gt;&lt;SPAN&gt;Source: Claroty Team82 Blog&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV id="viewer-b7rf7" class="mm8Nw _1j-51 roLFQS _1FoOD _1oG79 WJlzbz roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="_2PHJq public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;They found that operands used in these queries render major WAF solutions blind to the SQL injection. At this time the five vendors fixed their code, but Claroty believes that other vendors may be vulnerable as well.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="mm8Nw _1j-51 roLFQS _1FoOD _1oG79 WJlzbz roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="mm8Nw _1j-51 roLFQS _1FoOD _1oG79 WJlzbz roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;
&lt;H2 id="viewer-ckin" class="eSWI6 _1j-51 _1FoOD _3M0Fe Z63qyL roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="_2PHJq public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;Summary&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;DIV id="viewer-6q9oe" class="mm8Nw _1j-51 roLFQS _1FoOD _3M0Fe Z63qyL roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="_2PHJq public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;Preemptive protection against cyber attacks is critical because vulnerabilities may have been known by bad actors before publication and because it naturally takes time for everyone to fix them, also known as “vulnerability window”. These windows can sometimes be as long as months and years.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block46"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV id="viewer-c9u4u" class="mm8Nw _1j-51 roLFQS _1FoOD _3M0Fe Z63qyL roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="_2PHJq public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;CloudGuard AppSec’s unique machine learning which is based on two models (off-line/supervised and on-line/unsupervised) sets it apart from other WAF solutions, enabling it to offer first-class security with minimal configuration or maintenance, but most importantly once and again it proves to be pre-emptive, that means blocking zero day attacks with default product settings and no software updates required.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block48"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV id="viewer-5evb0" class="mm8Nw _1j-51 roLFQS _1FoOD _3M0Fe Z63qyL roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="_2PHJq public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="_2PHJq public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;This was proven several times in the last year for the well-known Log4Shell, Spring4Shell and Text4Shell zero day attacks and now also with Claroty's WAF bypass.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="mm8Nw _1j-51 roLFQS _1FoOD _3M0Fe Z63qyL roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="mm8Nw _1j-51 roLFQS _1FoOD _3M0Fe Z63qyL roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="_2PHJq public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;For additional information about this attack and what is&amp;nbsp;emptively block, you can read the full article &lt;A href="https://www.openappsec.io/post/open-appsec-cloudguard-appsec-is-the-only-product-known-to-pre-emptively-block-claroty-waf-bypass" target="_self"&gt;here&lt;/A&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Sun, 11 Dec 2022 14:39:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/WAF/CloudGuard-AppSec-is-the-only-product-known-to-pre-emptively/m-p/164746#M94</guid>
      <dc:creator>yuvalmamka</dc:creator>
      <dc:date>2022-12-11T14:39:48Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard AppSec is the only product known to pre-emptively block Claroty WAF bypass</title>
      <link>https://community.checkpoint.com/t5/WAF/CloudGuard-AppSec-is-the-only-product-known-to-pre-emptively/m-p/164763#M95</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/80409"&gt;@yuvalmamka&lt;/a&gt;&amp;nbsp;that's a wonderful explanation. I am the one who has implemented Appsec when it was pretty new and running in production with around 18 portals.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Dec 2022 03:36:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/WAF/CloudGuard-AppSec-is-the-only-product-known-to-pre-emptively/m-p/164763#M95</guid>
      <dc:creator>Blason_R</dc:creator>
      <dc:date>2022-12-12T03:36:02Z</dc:date>
    </item>
  </channel>
</rss>

