Skip to content

Commit 6f0d236

Browse files
Merge pull request #215474 from Miskatonic-Electronic/patch-16
Update waf-front-door-drs.md
2 parents 1972950 + 0a39314 commit 6f0d236

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/web-application-firewall/afds/waf-front-door-drs.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -222,7 +222,7 @@ The following rule groups and rules are available when using Web Application Fir
222222
|932110|Remote Command Execution: Windows Command Injection|
223223
|932115|Remote Command Execution: Windows Command Injection|
224224
|932120|Remote Command Execution: Windows PowerShell Command Found|
225-
|932130|Remote Command Execution: Unix Shell Expression or Confluence Vulnerability (CVE-2022-26134) Found|
225+
|932130|Remote Command Execution: Unix Shell Expression or Confluence Vulnerability (CVE-2022-26134) or Text4Shell ([CVE-2022-42889](https://nvd.nist.gov/vuln/detail/CVE-2022-42889)) Found|
226226
|932140|Remote Command Execution: Windows FOR/IF Command Found|
227227
|932150|Remote Command Execution: Direct Unix Command Execution|
228228
|932160|Remote Command Execution: Unix Shell Code Found|
@@ -266,7 +266,7 @@ The following rule groups and rules are available when using Web Application Fir
266266
|941180|Node-Validator Blacklist Keywords|
267267
|941190|XSS Using style sheets|
268268
|941200|XSS using VML frames|
269-
|941210|XSS using obfuscated JavaScript|
269+
|941210|IE XSS Filters - Attack Detected or Text4Shell ([CVE-2022-42889](https://nvd.nist.gov/vuln/detail/CVE-2022-42889))|
270270
|941220|XSS using obfuscated VB Script|
271271
|941230|XSS using 'embed' tag|
272272
|941240|XSS using 'import' or 'implementation' attribute|
@@ -425,7 +425,7 @@ The following rule groups and rules are available when using Web Application Fir
425425
|932110|Remote Command Execution: Windows Command Injection|
426426
|932115|Remote Command Execution: Windows Command Injection|
427427
|931120|Remote Command Execution: Windows PowerShell Command Found|
428-
|932130|Remote Command Execution: Unix Shell Expression or Confluence Vulnerability (CVE-2022-26134) Found|
428+
|932130|Remote Command Execution: Unix Shell Expression or Confluence Vulnerability (CVE-2022-26134) or Text4Shell ([CVE-2022-42889](https://nvd.nist.gov/vuln/detail/CVE-2022-42889)) Found|
429429
|932140|Remote Command Execution: Windows FOR/IF Command Found|
430430
|932150|Remote Command Execution: Direct Unix Command Execution|
431431
|932160|Remote Command Execution: Shellshock (CVE-2014-6271)|
@@ -462,7 +462,7 @@ The following rule groups and rules are available when using Web Application Fir
462462
|941180|Node-Validator Blacklist Keywords|
463463
|941190|IE XSS Filters - Attack Detected.|
464464
|941200|IE XSS Filters - Attack Detected.|
465-
|941210|IE XSS Filters - Attack Detected.|
465+
|941210|IE XSS Filters - Attack Detected or Text4Shell ([CVE-2022-42889](https://nvd.nist.gov/vuln/detail/CVE-2022-42889)) found.|
466466
|941220|IE XSS Filters - Attack Detected.|
467467
|941230|IE XSS Filters - Attack Detected.|
468468
|941240|IE XSS Filters - Attack Detected.|
@@ -608,7 +608,7 @@ The following rule groups and rules are available when using Web Application Fir
608608
|932110|Remote Command Execution: Windows Command Injection|
609609
|932115|Remote Command Execution: Windows Command Injection|
610610
|932120|Remote Command Execution: Windows PowerShell Command Found|
611-
|932130|Remote Command Execution: Unix Shell Expression or Confluence Vulnerability (CVE-2022-26134) Found|
611+
|932130|Remote Command Execution: Unix Shell Expression or Confluence Vulnerability (CVE-2022-26134) or Text4Shell ([CVE-2022-42889](https://nvd.nist.gov/vuln/detail/CVE-2022-42889)) Found|
612612
|932140|Remote Command Execution: Windows FOR/IF Command Found|
613613
|932150|Remote Command Execution: Direct Unix Command Execution|
614614
|932160|Remote Command Execution: Unix Shell Code Found|
@@ -645,7 +645,7 @@ The following rule groups and rules are available when using Web Application Fir
645645
|941180|Node-Validator Blacklist Keywords|
646646
|941190|XSS Using style sheets|
647647
|941200|XSS using VML frames|
648-
|941210|XSS using obfuscated JavaScript|
648+
|941210|IE XSS Filters - Attack Detected or Text4Shell ([CVE-2022-42889](https://nvd.nist.gov/vuln/detail/CVE-2022-42889))|
649649
|941220|XSS using obfuscated VB Script|
650650
|941230|XSS using 'embed' tag|
651651
|941240|XSS using 'import' or 'implementation' attribute|

0 commit comments

Comments
 (0)