Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Addressing Security Risks: Preventing Exposure of Azure URLs in Umbraco Cloud via Cloudflare #838

Open
Nikhilgirirajdigital opened this issue Sep 26, 2024 · 2 comments

Comments

@Nikhilgirirajdigital
Copy link

Issue description

Umbraco Cloud uses Cloudflare, but we notice that Google indexes the customer's Azure URL, this is dangerous as it exposes Cloud customers to DoS & DDoS attacks, without the protection from Cloudflare. We could manually fix them per project with redirects, but shouldn't Umbraco Cloud not expose these Azure URLs in the first place?

@Jette94
Copy link

Jette94 commented Sep 26, 2024

Hi @Nikhilgirirajdigital

We do have a workaround for this issue in the docs: https://docs.umbraco.com/umbraco-cloud/set-up/project-settings/manage-hostnames/rewrites-on-cloud#troubleshooting

Hope that helps 😁

@c9mb
Copy link

c9mb commented Sep 26, 2024

Being pedantic - the example pattern given in the docs really should be escaping the 2 dots rather than accepting any single character in those positions: ^(.*)?\.azurewebsites\.net$

However, even that is still a clunky workaround, and has limitations as specified in the docs.

Perhaps Umbraco should be redirecting from ^(.*)?\.azurewebsites\.net$ to https://native-host.umbraco.io/{R:0} as a default transform-rule for the live environment, which will in-turn be redirected if/when a custom domain is applied.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants