Radware Cloud Web App Firewall Flaw Allows Attackers to Bypass Security Filters

Radware Cloud Web App Firewall Flaw Allows Attackers to Bypass Security Filters

Security researchers have uncovered two critical vulnerabilities in Radware’s Cloud Web Application Firewall (WAF) that enable attackers to bypass security filters and deliver malicious payloads to protected web applications.

These flaws, designated CVE-2024-56523 and CVE-2024-56524, highlight systemic weaknesses in how the WAF processes non-standard HTTP requests and user-supplied input containing special characters.

The vulnerabilities, disclosed on May 7, 2025, remain unacknowledged by Radware despite evidence of potential fixes in recent updates.

– Advertisement –

The first vulnerability (CVE-2024-56523) exploits the WAF’s failure to properly validate HTTP GET requests containing extraneous data in the request body.

While the HTTP/1.1 specification permits bodies in GET requests, most web servers ignore them, creating a discrepancy between how the WAF and backend systems process such inputs.

Attackers can append randomized data-such as arbitrary parameters or encoded payloads-to the body of a GET request.

This “noise” confuses the WAF’s parsing logic, allowing malicious content to slip through undetected.

For example, a SQL injection payload hidden within a GET body padded with Base64-encoded junk data could evade signature-based detection rules.

This technique bypasses protections for over 70% of tested security policies in Radware’s default configuration.

The exploit requires no advanced tools, as demonstrated by a proof-of-concept curl command:

bashcurl -X GET "https://target.com/search?q=test" -d "junk=data&malicious=payload"

This anomaly underscores the risks of strictly protocol-compliant but logically inconsistent traffic handling in security appliances.

Special Character Handling Flaws

The second vulnerability (CVE-2024-56524) stems from improper input sanitization when processing requests containing non-alphanumeric characters.

Researchers found that adding symbols like ~, ^, or Unicode control characters to parameter values disrupts the WAF’s tokenization process.

A case study involving XSS payloads revealed that inserting %0d%0a (URL-encoded carriage return and line feed) before a