←back to thread

119 points bavarianbob | 3 comments | | HN request time: 0s | source

EDIT: Back online?!

NPM discussion: https://github.com/npm/cli/issues/8203

NPM incident: https://status.npmjs.org/incidents/hdtkrsqp134s

Cloudflare messaging: https://www.cloudflarestatus.com/incidents/gshczn1wxh74

GitHub issue: https://github.com/sindresorhus/camelcase/issues/114

Anyone experiencing npm outage that's more than just the referenced camelcase package?

Show context
tom_usher ◴[] No.43548817[source]
Seems to be a change in Cloudflare's managed WAF ruleset - any site using that will have URLs containing 'camel' blocked due to the 'Apache Camel - Remote Code Execution - CVE:CVE-2025-29891' (a9ec9cf625ff42769298671d1bbcd247) rule.

That rule can be overridden if you're having this issue on your own site.

replies(3): >>43549123 #>>43550078 #>>43550699 #
oncallthrow ◴[] No.43550078[source]
WAFs are so shit
replies(2): >>43550728 #>>43552419 #
ronsor ◴[] No.43550728[source]
WAFs are literally "a pile of regexes can secure my insecure software"
replies(2): >>43551360 #>>43555585 #
1. cluckindan ◴[] No.43555585[source]
They do mitigate known vulnerabilities.
replies(1): >>43566888 #
2. rcxdude ◴[] No.43566888[source]
They may mitigate known proofs of concept of vulnerabilities, and require a small amount of creativity to work around. At the cost of randomly breaking things.
replies(1): >>43568248 #
3. cluckindan ◴[] No.43568248[source]
That creativity takes time. WAFs are the first line of defence, buying some time for fixing the actual vulnerabilities.