Skip to content

Commit a8305eb

Browse files
Merge pull request #127505 from yuvalpery/patch-10
Update application-gateway-crs-rulegroups-rules.md
2 parents f1b2f3e + 5ec12e3 commit a8305eb

File tree

1 file changed

+6
-0
lines changed

1 file changed

+6
-0
lines changed

articles/web-application-firewall/ag/application-gateway-crs-rulegroups-rules.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -871,6 +871,7 @@ The following rule groups and rules are available when using Web Application Fir
871871
|941100|XSS Attack Detected via libinjection|
872872
|941101|XSS Attack Detected via libinjection.<br />This rule detects requests with a *Referer* header|
873873
|941110|XSS Filter - Category 1 = Script Tag Vector|
874+
|941120|XSS Filter - Category 2 = Event Handler Vector|
874875
|941130|XSS Filter - Category 3 = Attribute Vector|
875876
|941140|XSS Filter - Category 4 = JavaScript URI Vector|
876877
|941150|XSS Filter - Category 5 = Disallowed HTML Attributes|
@@ -957,9 +958,14 @@ The following rule groups and rules are available when using Web Application Fir
957958

958959
|RuleId|Description|
959960
|---|---|
961+
|944100|Remote Command Execution: Apache Struts, Oracle WebLogic|
962+
|944110|Detects potential payload execution|
960963
|944120|Possible payload execution and remote command execution|
961964
|944130|Suspicious Java classes|
962965
|944200|Exploitation of Java deserialization Apache Commons|
966+
|944210|Possible use of Java serialization|
967+
|944240|Remote Command Execution: Java serialization and Log4j vulnerability ([CVE-2021-44228](https://www.cve.org/CVERecord?id=CVE-2021-44228), [CVE-2021-45046](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046))|
968+
|944250|Remote Command Execution: Suspicious Java method detected|
963969

964970
# [Bot Manager 1.0](#tab/bot)
965971

0 commit comments

Comments
 (0)