Actions
BUG #4385
open[SQA] Origin IP Exposure (No Cloudflare Protection)
Start date:
04/08/2026
Due date:
% Done:
0%
Estimated time:
Description
Description:
The origin server IP for aiaxio.com is publicly exposed. Analysis via Censys revealed the actual origin IP, and further verification using Wappalyzer confirms there is no Cloudflare protection on the origin.
This allows attackers to bypass CDN/WAF protections and interact directly with the backend server.
Steps to Reproduce:
- Use Censys to discover the origin IP of aiaxio.com.
- Verify the IP using Wappalyzer or similar tools – no Cloudflare headers are present.
- Access the origin IP directly:
curl http:// -H "Host: aiaxio.com" - Observe that the server responds successfully.
Actual Result:
Origin IP responds directly; no Cloudflare or WAF protection is in place.
Expected Result:
All traffic should route through Cloudflare. Direct access to the origin IP should be blocked.
Impact:
- Bypasses CDN/WAF protections
- Exposes backend to direct attacks (DDoS, brute force, exploit attempts)
- Increases attack surface
Proof of Concept:
PoC
Updated by Tasfia Zaima 1 day ago
- Subject changed from Origin IP Exposure (No Cloudflare Protection) to [SQA] Origin IP Exposure (No Cloudflare Protection)
Actions