• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Snort Web Application Attack on WordPress from Cloudflare Alert

Scheduled Pinned Locked Moved IDS/IPS
4 Posts 2 Posters 920 Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • A
    Abstract3000
    last edited by Sep 25, 2019, 12:38 AM

    Greetings, I am new to Snort, and currently just watching Alerts Daily to try and suppress non threats before actually enabling the blocking feature. I ran into this particular threat today and not sure what to make of it, or how to go about it:

    1 TCP Web Application Attack 172.68.230.117 18996 XX.XXX.XX.X
    80 1:41421 SERVER-WEBAPP WordPress wp-config.php access via directory traversal attempt

    Just the sound of it simply quite terocious! The Source IP is from Cloudflare, who just happens to be my CDN for a Wordpress page hosted on my home server. I guess I am wondering not only does someone know exactly what this alert is? though most importantly if I "Block" this rule, and "Cloudflare" is blocked, I am worried people will not have the ability to access my site until the block is released, as all traffic is directed through cloudflare. Any suggestions as to how I should proceed?

    Thanks!

    1 Reply Last reply Reply Quote 0
    • B
      bmeeks
      last edited by bmeeks Sep 25, 2019, 2:14 AM Sep 25, 2019, 2:12 AM

      @Abstract3000 said in Snort Web Application Attack on WordPress from Cloudflare Alert:

      WordPress wp-config.php access via directory traversal attempt

      I did a Google search using the message from the rule. Searched for this term: "WordPress wp-config.php access via directory traversal attempt" and this is a sample of links I found.

      1. https://www.symantec.com/security_response/attacksignatures/detail.jsp?asid=30890

      2. https://www.bitrepository.com/prevent-directory-traversal-attacks-in-php-wordpress.html

      3. https://www.exploit-db.com/exploits/40288

      4. https://neonprimetime.blogspot.com/2016/08/wordpress-file-path-traversal-examples.html

      I don't know whether your particular version of Wordpress is affected or not. You could track that down by working through the Wordpress support folks.

      Anecdotally, I think Wordpress probably runs like a close second to Adobe in terms of having easily exploited software. I've seen quite a number of Wordpress vulnerability reports over the years. Of course to be absolutely fair, you can say the same for a lot of other common software (hello Microsoft!).

      And to answer your question about the consequence of a block, yes a block from this rule would prevent your home server from communicating with Cloudfare servers (or specifically whatever device or devices live behind the IP).

      1 Reply Last reply Reply Quote 1
      • A
        Abstract3000
        last edited by Sep 25, 2019, 4:08 AM

        Thanks for the Heads up, I did look into the vulnerability prior to posting and I saw it effects versions 4.9... which I am at the latest version 5.2 thanks to (Auto Update) set on.

        Though I'm wondering if this was a deliberate attack attempt, or a false positive, and can Snort not see beyond Cloudflare to the IP address (Spoofed or Not) forwarded over from cloudflare?

        Thanks for your time & consideration.

        B 1 Reply Last reply Sep 25, 2019, 12:27 PM Reply Quote 0
        • B
          bmeeks @Abstract3000
          last edited by bmeeks Sep 28, 2019, 12:34 AM Sep 25, 2019, 12:27 PM

          @Abstract3000 said in Snort Web Application Attack on WordPress from Cloudflare Alert:

          Thanks for the Heads up, I did look into the vulnerability prior to posting and I saw it effects versions 4.9... which I am at the latest version 5.2 thanks to (Auto Update) set on.

          Though I'm wondering if this was a deliberate attack attempt, or a false positive, and can Snort not see beyond Cloudflare to the IP address (Spoofed or Not) forwarded over from cloudflare?

          Thanks for your time & consideration.

          Snort generally can only see the actual IP addresses in the packet's IP header. There are options for the HTTP_INSPECT preprocessor for handling xff (X-Forwarded-For) headers, but those are primarily for logging options. You can create a customized HTTP engine on the PREPROCESSORS tab of Snort with unique settings for certain parameters including the xff options. You should first create a firewall alias containing the HTTP server you are protecting, then use that alias when defining the custom HTTP_INSPECT engine.

          1 Reply Last reply Reply Quote 0
          4 out of 4
          • First post
            4/4
            Last post
          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
            This community forum collects and processes your personal information.
            consent.not_received