It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda WAF-as-a-Service

Blocking Web Application Attacks

  • Last updated on

Web applications are constantly under threat from attackers who exploit vulnerabilities to inject malicious code or manipulate data. Barracuda WAF-as-a-Service safeguards your applications by identifying and blocking these attacks at the request level.

How it Works

The Barracuda WAF-as-a-Service analyzes incoming requests for patterns associated with various attack types. These patterns include techniques used in attacks like:

  • Cross-Site Scripting (XSS): Injecting malicious scripts into web pages to steal data or hijack user sessions.
  • Remote File Inclusion (RFI): Forcing the server to execute code from an external source.
  • SQL Injection: Injecting malicious SQL code into requests to manipulate databases.
  • Directory Traversal: Accessing unauthorized files or directories on the server.
  • OS Command Injection: Executing arbitrary operating system commands on the server.

Block or Log Attacks

If a request matches an attack pattern, the Barracuda WAF-as-a-Service takes action based on your configuration:

  • Block: The malicious request is blocked entirely, preventing the attack from reaching your application.
  • Log: The request is logged for further analysis, while still being blocked to prevent harm.

Predefined Attack Patterns

The Barracuda WAF-as-a-Service provides a comprehensive list of predefined patterns for various attack types. The following table lists the predefined patterns for attack types:

Attack TypeDescriptionPattern Name(s)
Cross-Site Scripting - strict
  • opening-html-tag   
  • closing-html-tag   
  • script-comments    
  • arbitrary-tag-injection    
  • script-string-concat 
Cross-Site ScriptingTechniques to inject malicious scripts into web pages.
  • onevent-references-misc-3 
  • onevent-references 
  • onevent-references-misc-2 
  • onevent-references-misc-1 
  • url-references 
  • script-tag 
  • xss-style-attr 
  • script-in-tag-attribute 
  • evasion-via-data-uri-scheme 
  • unsafe-tag 
  • script-tag-utf-7 
  • onevent-references-misc-generic 
  • evasion-via-html-named-char-ref 
Remote File Inclusion - strict
  • external-file-reference 
Remote File InclusionForcing the server to execute code from an external source.
  • php-file-inclusion 
SQL Injection - strictInjecting malicious SQL code to manipulate databases.
  • sql-union-command-strict 
  • sql-comments-strict 
  • sql-tautology-conditions-like-dbcmd-strict 
  • sql-select-command-strict 
  • sql-sleep-dos-attempt-strict 
  • sql-tautology-conditions-string-strict 
  • asp-search-manipulation 
SQL Injection - medium
  • sql-declare-simple 
  • sql-quote-variant 
  • sql-blind-injection 
  • sql-tautology-conditions-json-bypass-string 
  • sql-tautology-conditions-in-dbcmd 
  • sql-tautology-conditions-simple 
  • sql-quote 
  • sql-command-injection 
  • sql-union-command 
  • oracle-command-injection 
  • sql-tautology-conditions-between-dbcmd 
  • sql-cast-simple 
  • ms-sql-procedures 
  • sql-select-command 
  • sql-comments 
  • sql-tautology-conditions-like-dbcmd 
  • sql-tautology-conditions-simple-string 
  • sql-exec-simple 
  • sql-tautology-conditions-extract 
Directory Traversal - strictAccessing unauthorized files or directories on the server.
  • tilde-strict 
  • dot-dot-slash-strict 
Directory Traversal - medium
  • dot-dot-slash 
  • tilde 
OS Command Injection - strictExecuting arbitrary operating system commands on the server.
  • python-commands 
  • log4j-rce-colon-vuln-strict 
  • misc-commands 
  • log4j-rce-substitution-vuln-strict 
  • misc-commands-injections-end 
  • arbitrary-cmd-injection-substrings 
  • unix-shell-commands 
  • arbitrary-unix-shell-commands 
  • misc-commands-injections 
  • c-language-functions 
  • arbitrary-string-concatenation 
  • php-injection 
  • arbitrary-cmd-injection-dollar-ifs 
  • misc-commands-start 
OS Command Injection
  • c-language-function-substrings 
  • windows-commands 
  • SSI-injection-command 
  • bash-shell-shock-injection-vulnerability 
  • misc-command-substrings 
  • log4j-rce-vulnerability 
  • windows-command-substrings 
  • unix-shell-command-substrings 
  • perl-language-functions
LDAP Injection - mediumManipulating directory services like LDAP.
  • ldap-injection-command 
  • ldap-injection-command-substrings 
Python PHP Attacks - mediumExploiting vulnerabilities in these languages.
  • python-cfm-command-substrings 
  • php-commands 
  • php-command-substrings
HTTP Specific Attacks - mediumAttacks targeting specific functionalities within HTTP.
  • owa-ssrf-powershell-vulnerability 
  • aws-server-metadata-check-variant 
  • aws-server-metadata-url-check 
  • web-client-commands 
  • aws-server-metadata-check 
  • HTTP-response-splitting-attempt 
  • aws-server-metadata-check-2 
Apache Struts Attacks - mediumApache Struts attack refers to exploiting vulnerabilities in web applications built with the Apache Struts framework.
  • apache-struts-vulnerability-http 
  • apache-struts-vulnerability-java 
Apache Struts Attacks - strict
  • apache-struts-method-vulnerability 
  • apache-struts-redirect-vulnerability 
  • apache-struts-java-lang-vulnerability 

By identifying and blocking these attack patterns, Barracuda WAF-as-a-Service helps keep your web applications secure and your data protected.