@@ -5,7 +5,7 @@ description: This page provides information on web application firewall CRS rule
5
5
services : web-application-firewall
6
6
author : vhorne
7
7
ms.service : web-application-firewall
8
- ms.date : 01/11 /2022
8
+ ms.date : 02/04 /2022
9
9
ms.author : victorh
10
10
ms.topic : conceptual
11
11
---
@@ -38,14 +38,15 @@ The WAF protects against the following web vulnerabilities:
38
38
39
39
### OWASP CRS 3.2 (public preview)
40
40
41
- CRS 3.2 includes 13 rule groups, as shown in the following table. Each group contains multiple rules, which can be disabled.
41
+ CRS 3.2 includes 14 rule groups, as shown in the following table. Each group contains multiple rules, which can be disabled.
42
42
43
43
> [ !NOTE]
44
44
> CRS 3.2 is only available on the WAF_v2 SKU.
45
45
46
46
| Rule group| Description|
47
47
| ---| ---|
48
48
| ** [ General] ( #general-32 ) ** | General group|
49
+ | ** [ REQUEST-800-KNOWN-CVES] ( #crs800-32 ) ** | Help detect new and known CVEs|
49
50
| ** [ REQUEST-911-METHOD-ENFORCEMENT] ( #crs911-32 ) ** | Lock-down methods (PUT, PATCH)|
50
51
| ** [ REQUEST-913-SCANNER-DETECTION] ( #crs913-32 ) ** | Protect against port and environment scanners|
51
52
| ** [ REQUEST-920-PROTOCOL-ENFORCEMENT] ( #crs920-32 ) ** | Protect against protocol and encoding issues|
@@ -62,14 +63,15 @@ CRS 3.2 includes 13 rule groups, as shown in the following table. Each group con
62
63
63
64
### OWASP CRS 3.1
64
65
65
- CRS 3.1 includes 13 rule groups, as shown in the following table. Each group contains multiple rules, which can be disabled.
66
+ CRS 3.1 includes 14 rule groups, as shown in the following table. Each group contains multiple rules, which can be disabled.
66
67
67
68
> [ !NOTE]
68
69
> CRS 3.1 is only available on the WAF_v2 SKU.
69
70
70
71
| Rule group| Description|
71
72
| ---| ---|
72
73
| ** [ General] ( #general-31 ) ** | General group|
74
+ | ** [ REQUEST-800-KNOWN-CVES] ( #crs800-31 ) ** | Help detect new and known CVEs|
73
75
| ** [ REQUEST-911-METHOD-ENFORCEMENT] ( #crs911-31 ) ** | Lock-down methods (PUT, PATCH)|
74
76
| ** [ REQUEST-913-SCANNER-DETECTION] ( #crs913-31 ) ** | Protect against port and environment scanners|
75
77
| ** [ REQUEST-920-PROTOCOL-ENFORCEMENT] ( #crs920-31 ) ** | Protect against protocol and encoding issues|
@@ -85,11 +87,12 @@ CRS 3.1 includes 13 rule groups, as shown in the following table. Each group con
85
87
86
88
### OWASP CRS 3.0
87
89
88
- CRS 3.0 includes 12 rule groups, as shown in the following table. Each group contains multiple rules, which can be disabled.
90
+ CRS 3.0 includes 13 rule groups, as shown in the following table. Each group contains multiple rules, which can be disabled.
89
91
90
92
| Rule group| Description|
91
93
| ---| ---|
92
94
| ** [ General] ( #general-30 ) ** | General group|
95
+ | ** [ REQUEST-800-KNOWN-CVES] ( #crs800-30 ) ** | Help detect new and known CVEs|
93
96
| ** [ REQUEST-911-METHOD-ENFORCEMENT] ( #crs911-30 ) ** | Lock-down methods (PUT, PATCH)|
94
97
| ** [ REQUEST-913-SCANNER-DETECTION] ( #crs913-30 ) ** | Protect against port and environment scanners|
95
98
| ** [ REQUEST-920-PROTOCOL-ENFORCEMENT] ( #crs920-30 ) ** | Protect against protocol and encoding issues|
@@ -121,7 +124,7 @@ CRS 2.2.9 includes 10 rule groups, as shown in the following table. Each group c
121
124
122
125
The following rule groups and rules are available when using Web Application Firewall on Application Gateway.
123
126
124
- # [ OWASP 3.2 (public preview)] ( #tab/owasp32 )
127
+ # [ OWASP 3.2 (preview)] ( #tab/owasp32 )
125
128
126
129
## <a name =" owasp32 " ></a > 3.2 rule sets
127
130
@@ -130,6 +133,11 @@ The following rule groups and rules are available when using Web Application Fir
130
133
| ---| ---|
131
134
| 200004| Possible Multipart Unmatched Boundary.|
132
135
136
+ ### <a name =" crs800-32 " ></a > REQUEST-800-KNOWN-CVES
137
+ | RuleId| Description|
138
+ | ---| ---|
139
+ | 800100| Rule to help detect and mitigate log4j vulnerability [ CVE-2021 -44228] ( https://www.cve.org/CVERecord?id=CVE-2021-44228 ) , [ CVE-2021 -45046] ( https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046 ) |
140
+
133
141
### <a name =" crs911-32 " ></a > REQUEST-911-METHOD-ENFORCEMENT
134
142
| RuleId| Description|
135
143
| ---| ---|
@@ -366,6 +374,12 @@ The following rule groups and rules are available when using Web Application Fir
366
374
| ---| ---|
367
375
| 200004| Possible Multipart Unmatched Boundary.|
368
376
377
+ ### <a name =" crs800-31 " ></a > REQUEST-800-KNOWN-CVES
378
+ | RuleId| Description|
379
+ | ---| ---|
380
+ | 800100| Rule to help detect and mitigate log4j vulnerability [ CVE-2021 -44228] ( https://www.cve.org/CVERecord?id=CVE-2021-44228 ) , [ CVE-2021 -45046] ( https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046 ) |
381
+
382
+
369
383
### <a name =" crs911-31 " ></a > REQUEST-911-METHOD-ENFORCEMENT
370
384
371
385
| RuleId| Description|
@@ -608,6 +622,12 @@ The following rule groups and rules are available when using Web Application Fir
608
622
| ---| ---|
609
623
| 200004| Possible Multipart Unmatched Boundary.|
610
624
625
+ ### <a name =" crs800-30 " ></a > REQUEST-800-KNOWN-CVES
626
+ | RuleId| Description|
627
+ | ---| ---|
628
+ | 800100| Rule to help detect and mitigate log4j vulnerability [ CVE-2021 -44228] ( https://www.cve.org/CVERecord?id=CVE-2021-44228 ) , [ CVE-2021 -45046] ( https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046 ) |
629
+
630
+
611
631
### <a name =" crs911-30 " ></a > REQUEST-911-METHOD-ENFORCEMENT
612
632
613
633
| RuleId| Description|
0 commit comments