Skip to content

Commit 4164eb2

Browse files
Update application-gateway-crs-rulegroups-rules.md
1 parent df7ab0a commit 4164eb2

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

articles/web-application-firewall/ag/application-gateway-crs-rulegroups-rules.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -520,7 +520,9 @@ The following rule groups and rules are available when using Web Application Fir
520520
|800111|Attempted Spring Cloud routing-expression injection - [CVE-2022-22963](https://www.cve.org/CVERecord?id=CVE-2022-22963)|
521521
|800112|Attempted Spring Framework unsafe class object exploitation - [CVE-2022-22965](https://www.cve.org/CVERecord?id=CVE-2022-22965)|
522522
|800113|Attempted Spring Cloud Gateway Actuator injection - [CVE-2022-22947](https://www.cve.org/CVERecord?id=CVE-2022-22947)|
523-
|800114|Attempted Apache Struts file upload exploitation - [CVE-2023-50164](https://www.cve.org/CVERecord?id=CVE-2023-50164)|
523+
|800114*|Attempted Apache Struts file upload exploitation - [CVE-2023-50164](https://www.cve.org/CVERecord?id=CVE-2023-50164)|
524+
525+
*<sup>This rule's action is set to log by default. Set action to Block to prevent against Apache Struts vulnerability. Anomaly Score not supported for this rule.</sup>
524526

525527
### <a name="crs911-32"></a> REQUEST-911-METHOD-ENFORCEMENT
526528
|RuleId|Description|

0 commit comments

Comments
 (0)