Automated exposed credentials check
Many web applications have suffered credential stuffing attacks in the recent past. In these attacks there is a massive number of login attempts using username/password pairs from databases of exposed credentials.
Cloudflare offers you automated checks for exposed credentials using Cloudflare Web Application Firewall (WAF).
The WAF provides two mechanisms for this check:
Cloudflare updates the databases of exposed credentials supporting the exposed credentials check feature on a regular basis.
The username and password credentials in clear text never leave the Cloudflare network. The WAF only uses an anonymized version of the username and password when determining if there are previously exposed credentials. Cloudflare follows the approach based on the k-Anonymity mathematical property described in the following blog post: .
The WAF can perform one of the following actions when it detects exposed credentials:
- Exposed-Credential-Check Header — Adds a new HTTP header to HTTP requests with exposed credentials. Your application at the origin can then force a password reset, start a two-factor authentication process, or perform any other action. The name of the added HTTP header is
Exposed-Credential-Checkand its value is
- Managed Challenge — Helps reduce the lifetimes of human time spent solving CAPTCHAs across the Internet. Depending on the characteristics of a request, Cloudflare will dynamically choose the appropriate type of challenge based on specific criteria.
- Block — Blocks HTTP requests containing exposed credentials.
- JS Challenge — Presents a non-interactive challenge to the clients making HTTP requests with exposed credentials.
- Log — Only available on Enterprise plans. Logs requests with exposed credentials in the Cloudflare logs. Recommended for validating a rule before committing to a more severe action.
- Interactive Challenge — Presents an interactive challenge to the clients making HTTP requests with exposed credentials.
The default action for the rules in the Exposed Credentials Check Managed Ruleset is Exposed-Credential-Check Header (named
rewrite in the API).
Cloudflare recommends that you only use the following actions: Exposed-Credential-Check Header (named
rewrite in the API) and Log (
Exposed credentials checks in custom rules
Besides enabling the , you can also check for exposed credentials in custom rules. One common use case is to create custom rules on the end user authentication endpoints of your application to check for exposed credentials. Rules that check for exposed credentials run before rate limiting rules.
To check for exposed credentials in a custom rule, include the exposed credentials check in the rule definition and specify how to obtain the username and password values from the HTTP request. For more information, refer to .