{"id":51640,"date":"2023-04-26T14:50:24","date_gmt":"2023-04-26T14:50:24","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34555\/Evilflare-Circumventing-Cloudflares-Protection.html"},"modified":"2023-04-26T14:50:24","modified_gmt":"2023-04-26T14:50:24","slug":"evilflare-circumventing-cloudflares-protection","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/evilflare-circumventing-cloudflares-protection\/","title":{"rendered":"Evilflare: Circumventing Cloudflare&#8217;s Protection"},"content":{"rendered":"<p><em>Cloudflare<\/em> is a prominent player in web security and infrastructure, providing essential services like content delivery networks (CDNs), DDoS protection, WAF and more. Despite its robustness, vulnerabilities can still emerge. <\/p>\n<p>In this post, we\u2019ll delve into the importance of protecting origin servers and explore three attack scenarios that could potentially bypass <em>Cloudflare\u2019s<\/em> defenses. <\/p>\n<p>We have called the last of them <em>Evilflare<\/em>. This medium-high complex attack is based on a zero-day vulnerability, not acknowledged by vendor and which we publish here, along with a mitigation, to prevent third parties from surreptitiously exploiting it.<\/p>\n<p> <span id=\"more-69\"><\/span> <\/p>\n<p><strong>Cloudflare and Origin Servers<\/strong><\/p>\n<p>Origin servers are the primary web servers hosting a site\u2019s content. <em>Cloudflare<\/em> acts as a protective layer by routing traffic between end-users and origin servers, processing requests through its network of edge servers. This setup enables <em>Cloudflare<\/em> to filter out malicious requests, ensuring that only legitimate traffic reaches the origin server. <\/p>\n<p>In this context, adecuate protection of origin servers is crucial for maintaining the cohesion of the model and prevent that the security provided by Cloudflare being circumvented.<\/p>\n<p><strong>Unprotected origin servers: The First Scenario<\/strong>.<\/p>\n<p>Origin servers that accept connections from any source IP are at risk of being targeted by attackers who want to bypass <em>Cloudflare\u2019s<\/em> security measures. <\/p>\n<p>This is a major configuration flaw and the attack is relatively trivial. By discovering the real IP addresses of origin servers through methods like DNS bruteforcing, IP history lookups, via server leaks or server errors, attackers can bypass <em>Cloudflare<\/em> and send their traffic directly to the origin server.<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" data-attachment-id=\"75\" data-permalink=\"https:\/\/zerodayzone.com\/2023\/04\/25\/evilflare-circumventing-cloudflares-protection\/iphistory\/\" data-orig-file=\"https:\/\/zerodayzone.files.wordpress.com\/2023\/04\/iphistory.png\" data-orig-size=\"744,237\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"iphistory\" data-image-description data-image-caption data-medium-file=\"https:\/\/zerodayzone.files.wordpress.com\/2023\/04\/iphistory.png?w=300\" data-large-file=\"https:\/\/zerodayzone.files.wordpress.com\/2023\/04\/iphistory.png?w=744\" src=\"https:\/\/zerodayzone.files.wordpress.com\/2023\/04\/iphistory.png?w=744\" alt class=\"wp-image-75\" srcset=\"https:\/\/zerodayzone.files.wordpress.com\/2023\/04\/iphistory.png 744w, https:\/\/zerodayzone.files.wordpress.com\/2023\/04\/iphistory.png?w=150 150w, https:\/\/zerodayzone.files.wordpress.com\/2023\/04\/iphistory.png?w=300 300w\" sizes=\"(max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 984px) 61vw, (max-width: 1362px) 45vw, 600px\"><figcaption class=\"wp-element-caption\">Example of IP history over a \u201ccloudflared\u201d domain<\/figcaption><\/figure>\n<p><strong>Protecting Origin Servers<\/strong><\/p>\n<p><em>Cloudflare<\/em> customers are quick to learn that, if they do not want to have any problems, the first step must be to properly protect their origin servers. To safeguard origin servers, two primary methods can be employed:<\/p>\n<p>a. <strong><em><a href=\"https:\/\/developers.cloudflare.com\/fundamentals\/get-started\/setup\/allow-cloudflare-ip-addresses\/\" target=\"_blank\" rel=\"noreferrer noopener\">IP Filtering<\/a>: <\/em><\/strong>This simpler approach involves allowing traffic only from Cloudflare\u2019s IP addresses. Though it is easier to implement, this method offers less comprehensive protection compared to the alternative. <\/p>\n<p>b.<strong><em> <a href=\"https:\/\/developers.cloudflare.com\/cloudflare-one\/connections\/connect-apps\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cloudflare Tunnel<\/a>:<\/em><\/strong> A more secure option is for the origin server to establish a tunnel to Cloudflare, ensuring direct communication between the two. Though more complex to set up, this method provides enhanced protection for origin servers by eliminating exposure to direct attacks.<\/p>\n<p>While the second method is best practice, our experience with the product is that the vast majority of hosts that are protected, and not all of them are, use source IP filtering to <em>Cloudflare\u2019s<\/em> public addresses.<\/p>\n<p><strong>HTTP <em>Host<\/em> Header Bypass: The Second Scenario.<\/strong><\/p>\n<p>Once we are in a <em>common<\/em> scenario where a server is protected by source IP filtering, HTTP <em>Host<\/em> header plays a crucial role in the security model.<\/p>\n<p>If attackers could manipulate this header, they can potentially contact to the origin server from another <em>Cloudflare<\/em> <em>tenant<\/em>, under its control, bypassing the legitimate <em>tenant<\/em> protections and mitigations. <em>Cloudflare<\/em> therefore <a rel=\"noreferrer noopener\" href=\"https:\/\/developers.cloudflare.com\/rules\/transform\/request-header-modification\/\" target=\"_blank\">refuses to allow this header to be modified<\/a> in its services. <\/p>\n<p>However, an incorrect configuration of the origin server\u2019s web terminator could still allow the attack. Thus, in the case that the origin server ignores the HTTP <em>Host<\/em> header sent from <em>Clouflare<\/em>, as happens with some balancers, or in the case that the origin answers all requests from a virtual host by <em>default<\/em>, an attacker can take advantage of this feature to bypass the security offered by <em>Clouflare<\/em>.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" data-attachment-id=\"98\" data-permalink=\"https:\/\/zerodayzone.com\/2023\/04\/25\/evilflare-circumventing-cloudflares-protection\/zdz-1\/\" data-orig-file=\"https:\/\/zerodayzone.files.wordpress.com\/2023\/04\/zdz-1.png\" data-orig-size=\"519,429\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"zdz-1\" data-image-description data-image-caption data-medium-file=\"https:\/\/zerodayzone.files.wordpress.com\/2023\/04\/zdz-1.png?w=300\" data-large-file=\"https:\/\/zerodayzone.files.wordpress.com\/2023\/04\/zdz-1.png?w=519\" src=\"https:\/\/zerodayzone.files.wordpress.com\/2023\/04\/zdz-1.png?w=519\" alt class=\"wp-image-98\" srcset=\"https:\/\/zerodayzone.files.wordpress.com\/2023\/04\/zdz-1.png 519w, https:\/\/zerodayzone.files.wordpress.com\/2023\/04\/zdz-1.png?w=150 150w, https:\/\/zerodayzone.files.wordpress.com\/2023\/04\/zdz-1.png?w=300 300w\" sizes=\"(max-width: 519px) 85vw, 519px\"><figcaption class=\"wp-element-caption\">HTTP \u201cHost\u201d Header Bypassing<\/figcaption><\/figure>\n<\/div>\n<p><strong>Evilflare: The Third Scenario<\/strong><\/p>\n<p>Regrettably, a native <em>Cloudflare\u2019s<\/em> function presents a zero-day vulnerability, not acknowledged by vendor, that attackers could exploit to attack origin servers properly configured. <\/p>\n<p>Therefore, an origin server that has been correctly configured to only allow contact from <em>Cloudflare<\/em> IP addresses and where the HTTP header <em>Host<\/em> is handled correctly, continues to be able to be attacked by bypassing the protections and limitations imposed by <em>Cloudflare<\/em>.<\/p>\n<p><strong>Evilflare: Abusing Cloudflare\u2019s application logic to attack origin servers<\/strong><\/p>\n<p>The vulnerability is located in <em>Cloudflare\u2019s<\/em> <em>Health Check<\/em> functionality and allows an attacker, using this default feature, to generate targeted <em>HTTP\/HTTPS<\/em> traffic, specifically <em>GET<\/em> and <em>HEAD<\/em> requests, towards any origin server and to any <em>TCP<\/em> port, using legit <em>Cloudflare\u2019s<\/em> <em>IP<\/em> <em>addresses<\/em>.<\/p>\n<p>Although the attacker cannot see the full response generated by the target server, they can discern the <em>HTTP<\/em> response code (200, 403, 404, 500, etc.) and check if a specific text string is present in the response, allowing blind attacks over tainted inputs. <\/p>\n<p>The attacker also has control over the headers they can include in the request, including <em>Host<\/em> header, with the exception of the <em>User-Agent<\/em> header, which they cannot manipulate.<\/p>\n<p><strong>Evilflare: Explotation PoC<\/strong><\/p>\n<p>Exploitation can be done via the <em>Cloudflare<\/em> API or via Dashboard. <\/p>\n<p>It is not the aim of this post to go into advanced exploitation, let alone the creation of a complete functional exploit that allows the technique to be used in a real scenario.<\/p>\n<p>As an example, we will simulate a potential exploitation vector using the Dashboard. We will create a new \u201cHealth Check\u201d with the following characteristics:<\/p>\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" loading=\"lazy\" data-attachment-id=\"105\" data-permalink=\"https:\/\/zerodayzone.com\/2023\/04\/25\/evilflare-circumventing-cloudflares-protection\/evilflarepoc-1\/\" data-orig-file=\"https:\/\/zerodayzone.files.wordpress.com\/2023\/04\/evilflarepoc-1.png\" data-orig-size=\"1068,867\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"evilflarepoc-1\" data-image-description data-image-caption data-medium-file=\"https:\/\/zerodayzone.files.wordpress.com\/2023\/04\/evilflarepoc-1.png?w=300\" data-large-file=\"https:\/\/zerodayzone.files.wordpress.com\/2023\/04\/evilflarepoc-1.png?w=840\" src=\"https:\/\/zerodayzone.files.wordpress.com\/2023\/04\/evilflarepoc-1.png?w=1024\" alt class=\"wp-image-105\" width=\"630\" height=\"511\" srcset=\"https:\/\/zerodayzone.files.wordpress.com\/2023\/04\/evilflarepoc-1.png?w=1024 1024w, https:\/\/zerodayzone.files.wordpress.com\/2023\/04\/evilflarepoc-1.png?w=630 630w, https:\/\/zerodayzone.files.wordpress.com\/2023\/04\/evilflarepoc-1.png?w=150 150w, https:\/\/zerodayzone.files.wordpress.com\/2023\/04\/evilflarepoc-1.png?w=300 300w, https:\/\/zerodayzone.files.wordpress.com\/2023\/04\/evilflarepoc-1.png?w=768 768w, https:\/\/zerodayzone.files.wordpress.com\/2023\/04\/evilflarepoc-1.png 1068w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 984px) 61vw, (max-width: 1362px) 45vw, 600px\"><figcaption class=\"wp-element-caption\">Example of Malicious Health Check<\/figcaption><\/figure>\n<p>Once created, we can see that the malicious payload (<code>\/index.php?id=1'+UNION+SELECT+2+FROM+TABLE--<\/code>) is indeed received on the origin server (<code>185.X.Y.Z<\/code>), with the desired HTTP <em>Host<\/em> header (<code>we-are-not-google.google.es<\/code>) and from an IP address owned by <em>Cloudflare<\/em> (<code>172.70.59.4<\/code>).<\/p>\n<p><code># while true; do cat web.http | nc -l 8000; done <br \/>GET \/index.php?id=1'+UNION+SELECT+2+FROM+TABLE-- HTTP\/1.1 <br \/>Host: we-are-not-google.google.es <br \/>User-Agent: Mozilla\/5.0 (compatible;Cloudflare-Healthchecks\/1.0;+https:\/\/www.cloudflare.com\/; healthcheck-id: 7[DELETED]0) <br \/>Cookie: This is a PoC Value <br \/>Accept-Encoding: gzip<\/code><\/p>\n<p><code># tcpdump port 8000<\/code><br \/><code>tcpdump: verbose output suppressed, use -v or -vv for full protocol decode <\/code><br \/><code>listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes<\/code><br \/><code>18:51:13.173136 IP <strong>172.70.59.4<\/strong>.11150 &gt; [DELETED].com.irdmi: Flags [DELETED]<\/code><\/p>\n<p><strong>Evilflare: Impact<\/strong><\/p>\n<p>This vulnerability compromise <em>Cloudflare\u2019s<\/em> security model in several ways. Firstly, the attacker can generate traffic from <em>Cloudflare\u2019s<\/em> IP addresses, which could enable them to contact a properly configured origin server, not under their control, bypassing the restriction that the origin server only accepts incoming traffic from Cloudflare IP addresses. Moreover, the attacker can bypass Cloudflare\u2019s security layer, such as the WAF (Web Application Firewall) and other protections, when performing these requests. <\/p>\n<p>As a result, vulnerability could allow an attacker to discover the existence of protected routes behind Cloudflare\u2019s security measures. Furthermore, it could enable the attacker to carry out blind tainted input exploitations on origin servers, checking <em>HTTP<\/em> response codes or strings contained in the <em>HTTP<\/em> responses. In this respect, the vulnerability could allow exploiting vulnerabilities that should be filtered by <em>Cloudflare\u2019s WAF<\/em> protections, such as <em>SQL injections<\/em>, <em>XSS<\/em>, <em>path traversal<\/em>, and others.<\/p>\n<p>In addition, this vulnerability could also be used by attackers to exploit <em>Cloudflare\u2019s IP reputation<\/em>, directing attacks to any other IP addresses while appearing as legitimate Cloudflare traffic.<\/p>\n<p><strong>Evilflare: Mitigations and Contermeasures<\/strong><\/p>\n<p>As long as <em>Cloudflare<\/em> does not implement the proposed corrections, to eliminate the described risk, which are listed below:<\/p>\n<ul>\n<li>In the <em>Origin<\/em> field: Do not allow IP addresses, always forcing a <em>hostname<\/em> to be defined.<\/li>\n<li>In the <em>Port<\/em> field: Limit the ports to those allowed by <em>Cloudflare<\/em>.<\/li>\n<li>In the <em>Request Headers <\/em>fields: do not allow the <em>Host<\/em> header to be defined, forcing it to be the <em>hostname<\/em> defined in the <em>Origin<\/em> field.<\/li>\n<\/ul>\n<p>We believe it is reasonable that the following mitigations be implemented:<\/p>\n<ul>\n<li>In all scenarios where possible, move away from the protection model based on source IP filtering and move towards the <em><a href=\"https:\/\/developers.cloudflare.com\/cloudflare-one\/connections\/connect-apps\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cloudflare Tunnel<\/a><\/em> protection model.<\/li>\n<li>In scenarios where this is not possible, reject by default any request that contains the string <em>Cloudflare-Healthchecks<\/em> in its <em>HTTP<\/em> <em>User-Agent<\/em> header.<\/li>\n<li>In general, any Internet webserver that wants to guarantee its maximum security, reject by default any request that contains the string <em>Cloudflare-Healthchecks<\/em> in its <em>HTTP User-Agent<\/em> header.<\/li>\n<\/ul>\n<p><strong>Evilflare: Conclusions<\/strong><\/p>\n<p>Once again, vendors\u2019 reluctance to accept vulnerabilities that do not have a direct impact and trivial exploitation is evident. In our opinion, although this vulnerability has a complex exploitation, and may not be valid for all cases, it constitutes a clear risk that should be corrected by <em>Cloudflare<\/em>. Until that time comes, we strongly recommend adopting the proposed countermeasures.<\/p>\n<p>Finally, although the vulnerability shown only affects a specific vendor, we believe it is interesting and necessary to think on how origins that are protected by cloud security solutions are being secured, as well as whether this attack vector could be extrapolated to other platforms or providers.<\/p>\n<p><strong>Evilflare: Disclosure timeline<\/strong><\/p>\n<ul>\n<li>April 20th, 2023: The vulnerability is sent to Cloudflare via Hackerone. <\/li>\n<li>April 21st, 2023: Cloudflare requests more information. Clarification and additional information is provided. <\/li>\n<li>April 24th, 2023: Cloudflare rejects accepting the report as a vulnerability. The reasons given are that the use of the \u201chealth checks\u201d functionality will not compromise confidentiality, integrity, and\/or availability. <\/li>\n<li>April 25th, 2023: The information is released to the community.<\/li>\n<\/ul>\n<div id=\"jp-post-flair\" class=\"sharedaddy sd-like-enabled sd-sharing-enabled\">\n<div class=\"sharedaddy sd-sharing-enabled\">\n<div class=\"robots-nocontent sd-block sd-social sd-social-icon-text sd-sharing\">\n<h3 class=\"sd-title\">Share this:<\/h3>\n<\/div>\n<\/div>\n<div class=\"sharedaddy sd-block sd-like jetpack-likes-widget-wrapper jetpack-likes-widget-unloaded\" id=\"like-post-wrapper-218018800-69-644977babc4d4\" data-src=\"\/\/widgets.wp.com\/likes\/index.html?ver=20230309#blog_id=218018800&amp;post_id=69&amp;origin=zerodayzone.wordpress.com&amp;obj_id=218018800-69-644977babc4d4&amp;domain=zerodayzone.com\" data-name=\"like-post-frame-218018800-69-644977babc4d4\" data-title=\"Like or Reblog\">\n<h3 class=\"sd-title\">Like this:<\/h3>\n<div class=\"likes-widget-placeholder post-likes-widget-placeholder\"><span class=\"button\"><span>Like<\/span><\/span> <span class=\"loading\">Loading&#8230;<\/span><\/div>\n<p><span class=\"sd-text-color\"><\/span><\/div>\n<\/div>\n<div class=\"author-info\">\n<div class=\"author-avatar\"> <img loading=\"lazy\" decoding=\"async\" alt src=\"https:\/\/2.gravatar.com\/avatar\/5b29f50a4cd6c389d2f0a640b763dab3?s=42&amp;d=identicon&amp;r=G\" class=\"avatar avatar-42\" height=\"42\" width=\"42\">\t<\/div>\n<p><!-- .author-avatar --> <\/p>\n<div class=\"author-description\">\n<h2 class=\"author-title\"><span class=\"author-heading\">Author:<\/span> Zero-Day Zone<\/h2>\n<p class=\"author-bio\"> Cybersecurity professionals with decades of joint experience. Throughout our career, we&#8217;ve conducted researchs, discovered new offensive techniques and identified zero-day vulnerabilities. As of today, We continue to perform technical tasks in both offensive and defensive cybersecurity, and we still have the same passion for this field as we did on first day. We&#8217;re committed to the continued advancement of the cybersecurity industry and look forward to new challenges and opportunities in the years to come. <a class=\"author-link\" href=\"https:\/\/zerodayzone.com\/author\/zerodayzone\/\" rel=\"author\"> View all posts by Zero-Day Zone <\/a> <\/p>\n<p><!-- .author-bio --> <\/div>\n<p><!-- .author-description -->\n<\/div>\n<p><!-- .author-info --> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34555\/Evilflare-Circumventing-Cloudflares-Protection.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":51641,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[968],"class_list":["post-51640","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlineflaw"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Evilflare: Circumventing Cloudflare&#039;s Protection 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/evilflare-circumventing-cloudflares-protection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Evilflare: Circumventing Cloudflare&#039;s Protection 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/evilflare-circumventing-cloudflares-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-26T14:50:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/zerodayzone.files.wordpress.com\/2023\/04\/iphistory.png?w=744\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/evilflare-circumventing-cloudflares-protection\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/evilflare-circumventing-cloudflares-protection\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Evilflare: Circumventing Cloudflare&#8217;s Protection\",\"datePublished\":\"2023-04-26T14:50:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/evilflare-circumventing-cloudflares-protection\\\/\"},\"wordCount\":1471,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/evilflare-circumventing-cloudflares-protection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/evilflare-circumventing-cloudflares-protection.png\",\"keywords\":[\"headline,flaw\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/evilflare-circumventing-cloudflares-protection\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/evilflare-circumventing-cloudflares-protection\\\/\",\"name\":\"Evilflare: Circumventing Cloudflare's Protection 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/evilflare-circumventing-cloudflares-protection\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/evilflare-circumventing-cloudflares-protection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/evilflare-circumventing-cloudflares-protection.png\",\"datePublished\":\"2023-04-26T14:50:24+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/evilflare-circumventing-cloudflares-protection\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/evilflare-circumventing-cloudflares-protection\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/evilflare-circumventing-cloudflares-protection\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/evilflare-circumventing-cloudflares-protection.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/evilflare-circumventing-cloudflares-protection.png\",\"width\":744,\"height\":237},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/evilflare-circumventing-cloudflares-protection\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,flaw\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlineflaw\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Evilflare: Circumventing Cloudflare&#8217;s Protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Evilflare: Circumventing Cloudflare's Protection 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/evilflare-circumventing-cloudflares-protection\/","og_locale":"en_US","og_type":"article","og_title":"Evilflare: Circumventing Cloudflare's Protection 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/evilflare-circumventing-cloudflares-protection\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-04-26T14:50:24+00:00","og_image":[{"url":"https:\/\/zerodayzone.files.wordpress.com\/2023\/04\/iphistory.png?w=744","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/evilflare-circumventing-cloudflares-protection\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/evilflare-circumventing-cloudflares-protection\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Evilflare: Circumventing Cloudflare&#8217;s Protection","datePublished":"2023-04-26T14:50:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/evilflare-circumventing-cloudflares-protection\/"},"wordCount":1471,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/evilflare-circumventing-cloudflares-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/04\/evilflare-circumventing-cloudflares-protection.png","keywords":["headline,flaw"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/evilflare-circumventing-cloudflares-protection\/","url":"https:\/\/www.threatshub.org\/blog\/evilflare-circumventing-cloudflares-protection\/","name":"Evilflare: Circumventing Cloudflare's Protection 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/evilflare-circumventing-cloudflares-protection\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/evilflare-circumventing-cloudflares-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/04\/evilflare-circumventing-cloudflares-protection.png","datePublished":"2023-04-26T14:50:24+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/evilflare-circumventing-cloudflares-protection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/evilflare-circumventing-cloudflares-protection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/evilflare-circumventing-cloudflares-protection\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/04\/evilflare-circumventing-cloudflares-protection.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/04\/evilflare-circumventing-cloudflares-protection.png","width":744,"height":237},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/evilflare-circumventing-cloudflares-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,flaw","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlineflaw\/"},{"@type":"ListItem","position":3,"name":"Evilflare: Circumventing Cloudflare&#8217;s Protection"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51640","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=51640"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51640\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/51641"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=51640"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=51640"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=51640"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}