
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Sat, 04 Apr 2026 12:55:58 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Protecting everyone from WordPress Content Injection]]></title>
            <link>https://blog.cloudflare.com/protecting-everyone-from-wordpress-content-injection/</link>
            <pubDate>Wed, 01 Feb 2017 16:53:54 GMT</pubDate>
            <description><![CDATA[ Today a severe vulnerability was announced by the WordPress Security Team that allows unauthenticated users to change content on a site using unpatched (below version 4.7.2) WordPress. ]]></description>
            <content:encoded><![CDATA[ <p>Today a severe vulnerability was announced by the <a href="https://make.wordpress.org/core/2017/02/01/disclosure-of-additional-security-fix-in-wordpress-4-7-2/">WordPress Security Team</a> that allows unauthenticated users to change content on a site using unpatched (below version 4.7.2) WordPress.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/utL0SIRsc0DPLObX0eTgR/f43e45e886095489724c5459ffd9aab5/12977337115_19ea7233c8_z.jpg" />
            
            </figure><p><a href="https://creativecommons.org/licenses/by-sa/2.0/">CC BY-SA 2.0</a> <a href="https://www.flickr.com/photos/quatar/12977337115/in/photolist-kLLfcD-m6QQ9K-q9ahzH-i6thGS-q5GUN3-o54g8R-dAqV34-pbwTN4-pdhTPx-pKEjxp-5AmXEB-ptJHXQ-bhTApi-pNfG3r-oYnMVT-nFpyp5-jVuJZ3-nAwiPG-r9uiAE-9CXRjW-9Cb3Nv-nVEfJP-rg6igk-hz2sEa-pd6xEL-HFSEAG-9Gg2t9-5KFn1C-puzSq6-rmxuj7-nziE1W-nMRZQJ-prTHRW-pcs5S3-fFmD5V-oZv9Pv-ejnMdk-p2DDVW-paNBh3-5Y1U3j-dV9aSt-niAXry-zvQxs-mUJVca-a8yq7r-75Qow8-nMS6ui-njbmKZ-9AZ5vw-k46KRT">image</a> by <a href="https://www.flickr.com/photos/quatar/">Nicola Sap De Mitri</a></p><p>The problem was <a href="https://blog.sucuri.net/2017/02/content-injection-vulnerability-wordpress-rest-api.html">found</a> by the team at Sucuri and reported to WordPress. The WordPress team worked with WAF vendors, including Cloudflare, to roll out protection before the patch became available.</p><p>Earlier this week we rolled out two rules to protect against exploitation of this issue (both types mentioned in the Sucuri blog post). We have been monitoring the situation and have not observed any attempts to exploit this vulnerability before it was announced publicly.</p><p>Customers on a paid plan will find two rules in WAF, WP0025A and WP0025B, that protect unpatched WordPress sites from this vulnerability. If the Cloudflare WordPress ruleset is enabled then these rules are automatically turned on and blocking.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/15B0FJXMnLA2X2AVP4QYwh/8638fb012d9bced9e7edc03b8b1ae0a6/2017-02-01-16-15-38.png" />
            
            </figure>
    <div>
      <h3>Protecting Everyone</h3>
      <a href="#protecting-everyone">
        
      </a>
    </div>
    <p>As we have in the past with other serious and critical vulnerabilities like <a href="/shellshock-protection-enabled-for-all-customers/">Shellshock</a> and <a href="/our-waf-is-keeping-wordpress-jetpack-on-track/">previous issues with JetPack</a>, we have enabled these two rules for our free customers as well.</p><p>Free customers who want full protection for their WordPress sites can upgrade to a <a href="https://www.cloudflare.com/plans/">paid plan</a> and enable the Cloudflare WordPress ruleset in the <a href="https://www.cloudflare.com/waf/">WAF</a>.</p> ]]></content:encoded>
            <category><![CDATA[WordPress]]></category>
            <category><![CDATA[WAF]]></category>
            <category><![CDATA[Vulnerabilities]]></category>
            <guid isPermaLink="false">6ZTsRCzbGkZOEoN1nLnkKS</guid>
            <dc:creator>Ben Cartwright-Cox</dc:creator>
        </item>
        <item>
            <title><![CDATA[CloudFlare sites protected from httpoxy]]></title>
            <link>https://blog.cloudflare.com/cloudflare-sites-protected-from-httpoxy/</link>
            <pubDate>Mon, 18 Jul 2016 15:26:00 GMT</pubDate>
            <description><![CDATA[ We have rolled out automatic protection for all customers for the the newly announced vulnerability called httpoxy. ]]></description>
            <content:encoded><![CDATA[ <p></p><p><a href="https://creativecommons.org/licenses/by/2.0/">CC BY 2.0</a> <a href="https://www.flickr.com/photos/joeseggiola/2696992856/">image</a> by <a href="https://www.flickr.com/photos/joeseggiola/">Joe Seggiola</a></p><p>We have rolled out automatic protection for all customers for the the newly announced vulnerability called <a href="https://httpoxy.org/">httpoxy</a>.</p><p>This vulnerability affects applications that use “classic” CGI execution models, and could lead to API token disclosure of the services that your application may talk to.</p><p>By default httpoxy requests are modified to be harmless and then request is allowed through, however customers who want to outright block those requests can also use the <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">Web Application Firewall</a> rule 100050 in CloudFlare Specials to block requests that could lead to the httpoxy vulnerability.</p> ]]></content:encoded>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Bugs]]></category>
            <category><![CDATA[Vulnerabilities]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[API]]></category>
            <guid isPermaLink="false">7fhu3hhIvJ0ihz7IwTdtml</guid>
            <dc:creator>Ben Cartwright-Cox</dc:creator>
        </item>
        <item>
            <title><![CDATA[Blue Light Special: Ensuring fast global configuration changes]]></title>
            <link>https://blog.cloudflare.com/blue-light-special/</link>
            <pubDate>Fri, 03 Jul 2015 13:41:49 GMT</pubDate>
            <description><![CDATA[ CloudFlare operates a huge global network of servers that proxy our customers' web sites, operate as caches, inspect requests to ensure they are not malicious, deflect DDoS attacks and handle one of the largest authoritative DNS systems in the world.  ]]></description>
            <content:encoded><![CDATA[ <p>CloudFlare operates a huge global network of servers that proxy our customers' web sites, operate as caches, inspect requests to ensure they are not malicious, deflect DDoS attacks and handle one of the largest authoritative DNS systems in the world. And where there's software there's configuration information.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6AtvZb7LpHv8Y5mInr2Zxi/4737a84e28294c03603509b0e77e4e16/rozzers-1.gif" />
            
            </figure><p>CloudFlare is highly customisable. Each customer has a unique configuration consisting of DNS records, all manner of settings (such as minification, image recompression, IP-based blocking, which individual WAF rules to execute) and per-URL rules. And the configuration changes constantly.</p>
    <div>
      <h3>Warp speed configuration</h3>
      <a href="#warp-speed-configuration">
        
      </a>
    </div>
    <p>We offer almost instant configuration changes. If a user adds a DNS record it should be globally resolvable in seconds. If a user enables a CloudFlare WAF rule it should happen very, very fast to protect a site. This presents a challenge because those configuration changes need to be pushed across the globe very quickly.</p><p>We've written in the past about the underlying technology we use: <a href="/kyoto-tycoon-secure-replication/">Kyoto Tycoon</a> and how we secured it from eavesdroppers. We also monitor its performance.</p><p>DNS records are currently changing at a rate of around 40 per second, 24 hours a day. All those changes need to be propagated in seconds.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/67rzza7FcK2ny8M5NtDIbQ/8e380fc00654bc35961203e4efba1bc9/fakeip.jpg" />
            
            </figure><p>So we take propagation times very seriously.</p>
    <div>
      <h3>Keep a close eye on this light of mine</h3>
      <a href="#keep-a-close-eye-on-this-light-of-mine">
        
      </a>
    </div>
    <p>For this we need to keep a close eye on how long it takes a change to reach every one of our data centers. Whilst we have in-depth metrics for our operations team to look at it's sometimes useful (and fun) to have something more visceral.</p><p>We also want developers and operations people to equally be aware of some critical metrics, and developers are spending their time observing the metrics and alerts aimed at operations.</p><p>On some rare occasions, perhaps due to routing problems on the wider Internet, we may find that our ability to push changes at the required velocity becomes impractical. To ensure that we know about this as soon as possible and know when to take action we've built a custom alert system that everyone in the office can see.</p><p>From an external global collection of machines we monitor propagation time for DNS records and trigger an alert if propagation time exceeds a pre-set threshold. The alert comes in the form of a blue rotating 'police light'.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5TuhyXE68uR226VQJyktNp/3236012d272ad17357da7d1cd0082eb3/IMG_6126.JPG.jpeg" />
            
            </figure><p>We had joked about having a "red alert" alarm when we fall behind on propagation and so I turned that joke into reality.</p>
    <div>
      <h3>Hawaii Pi-O</h3>
      <a href="#hawaii-pi-o">
        
      </a>
    </div>
    <p>A Raspberry Pi hidden in an old hard drive case connects to our global monitors and obtains the current propagation time (as measured from outside our network). The Pi is connected (via a transistor acting as a switch) to a cheap <a href="http://www.maplin.co.uk/p/mini-led-police-beacon-n74kf">mini police light</a> that's visible throughout the office.</p><p>PS: All the puns in this post were added by John Graham-Cumming. I disclaim all responsibility.</p> ]]></content:encoded>
            <category><![CDATA[Speed & Reliability]]></category>
            <category><![CDATA[Reliability]]></category>
            <category><![CDATA[DNS]]></category>
            <category><![CDATA[WAF]]></category>
            <category><![CDATA[Raspberry Pi]]></category>
            <guid isPermaLink="false">6R5aFlyXmB7MfjTlojhvJJ</guid>
            <dc:creator>Ben Cartwright-Cox</dc:creator>
        </item>
        <item>
            <title><![CDATA[Protection against critical Windows vulnerability (CVE-2015-1635)]]></title>
            <link>https://blog.cloudflare.com/cloudflare-is-protected-against-cve-2015-1635/</link>
            <pubDate>Wed, 15 Apr 2015 13:48:55 GMT</pubDate>
            <description><![CDATA[ A few hours ago, more details surfaced about the MS15-034 vulnerability. Simple PoC code has been widely published that will hang a Windows web server if sent a request with an HTTP Range header containing large byte offsets. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>A few hours ago, more details surfaced about the <a href="https://support.microsoft.com/en-us/kb/3042553">MS15-034</a> vulnerability. Simple PoC code has been widely published that will hang a Windows web server if sent a request with an HTTP Range header containing large byte offsets.</p><p>We have rolled out a WAF rule that blocks these requests.</p><p>Customers on a paid plan and who have the WAF enabled are automatically protected against this problem. It is highly recommended that you upgrade your IIS and your Windows servers as soon as possible; in the meantime any requests coming into CloudFlare that try and exploit this DoS/RCE will be blocked.</p> ]]></content:encoded>
            <category><![CDATA[Vulnerabilities]]></category>
            <category><![CDATA[WAF Rules]]></category>
            <category><![CDATA[WAF]]></category>
            <guid isPermaLink="false">1sCnEYQta0KOC9YvgIbNo5</guid>
            <dc:creator>Ben Cartwright-Cox</dc:creator>
        </item>
    </channel>
</rss>