I think WAF is more complicated, and we can solve some of the WAF problems
through regularization.
Here is an issue about this. https://github.com/apache/apisix/issues/5780

Zhiyuan Ju <juzhiy...@apache.org> 于2021年12月17日周五 10:50写道:

> Hi,
>
> > Apache APISIX can add a general WAF plug-in to solve similar security
> problems
> I support adding Security Plugins to prevent common vulnerabilities, then
> fulfill the Gateway abilities.
>
> BTW, for the specific log4j2 issue, we should also pay attention to more
> encode algorithms, e.g Hex, Unicode. Because if we use some keywords like
> `${` to check requests, if the hacker converts it to `"\x24\u007b"`, it may
> bypass the WAF check :)
>
> Best Regards!
> @ Zhiyuan Ju <https://github.com/juzhiyuan>
>
>
> Ming Wen <wenm...@apache.org> 于2021年12月17日周五 09:52写道:
>
> > hello, community,
> >     Apache APISIX does not yet have a WAF plug-in, so when encountering a
> > security vulnerability in log4j2, users of Apache APISIX need to write
> > their own plug-ins.
> >
> >     In my opinion, Apache APISIX can add a general WAF plug-in to solve
> > similar security problems. We can deal with HTTP header, URI args,
> request
> > body (this needs to be cautious and affect performance).
> >
> > What do you think?
> >
> > Thanks,
> > Ming Wen, Apache APISIX PMC Chair
> > Twitter: _WenMing
> >
>

Reply via email to