diff --git a/vulnerabilities/aws-waf-sql-injection.yaml b/vulnerabilities/aws-waf-sql-injection.yaml deleted file mode 100644 index c93b161..0000000 --- a/vulnerabilities/aws-waf-sql-injection.yaml +++ /dev/null @@ -1,29 +0,0 @@ -title: AWS WAF configuration allows SQL injection -slug: aws-waf-sql-injection -cves: null -affectedPlatforms: -- AWS -affectedServices: -- AWS WAF -image: https://raw.githubusercontent.com/wiz-sec/open-cvdb/main/images/aws-wafs-dangerous-defaults.jpg -severity: Medium -discoveredBy: - name: Osama Elnaggar - org: null - domain: https://osamaelnaggar.com/ - twitter: https://twitter.com/securityfu -publishedAt: 2021/10/03 -disclosedAt: 2021/09/03 -exploitabilityPeriod: null -knownITWExploitation: false -summary: | - AWS WAF using the Core Rules set allowed SQL injection. In AWS WAF only the first 8 KB (8,192 bytes) of the request body are forwarded to AWS WAF for inspection, but AWS Managed rules allowed requests up to 10 KB. - An attacker could send a request larger than 8 KB but smaller than 10 KB, with a malicious payload located after the first 8,192 bytes, and thereby pass the WAFs inspection. - To fix this issue, AWS reduced the request size limit to 8 KB. -manualRemediation: | - None required -detectionMethods: null -contributor: https://github.com/mer-b -references: -- https://osamaelnaggar.com/blog/aws_waf_dangerous_defaults/ -- https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-changelog.html