Skip to content

Commit ab9297b

Browse files
Update application-gateway-crs-rulegroups-rules.md
1 parent ddd40ed commit ab9297b

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/web-application-firewall/ag/application-gateway-crs-rulegroups-rules.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -240,7 +240,7 @@ The following rule groups and rules are available when using Web Application Fir
240240
|932110|Remote Command Execution: Windows Command Injection|
241241
|932115|Remote Command Execution: Windows Command Injection|
242242
|932120|Remote Command Execution: Windows PowerShell Command Found|
243-
|932130|Remote Command Execution: Unix Shell Expression or Confluence Vulnerability (CVE-2022-26134) Found|
243+
|932130|Remote Command Execution: Unix Shell Expression or Confluence Vulnerability (CVE-2022-26134) or Text4Shell ([CVE-2022-42889](https://nvd.nist.gov/vuln/detail/CVE-2022-42889)) Found|
244244
|932140|Remote Command Execution: Windows FOR/IF Command Found|
245245
|932150|Remote Command Execution: Direct Unix Command Execution|
246246
|932160|Remote Command Execution: Unix Shell Code Found|
@@ -284,7 +284,7 @@ The following rule groups and rules are available when using Web Application Fir
284284
|941180|Node-Validator Blacklist Keywords|
285285
|941190|XSS Using style sheets|
286286
|941200|XSS using VML frames|
287-
|941210|XSS using obfuscated JavaScript|
287+
|941210|XSS using obfuscated JavaScript or Text4Shell ([CVE-2022-42889](https://nvd.nist.gov/vuln/detail/CVE-2022-42889))|
288288
|941220|XSS using obfuscated VB Script|
289289
|941230|XSS using 'embed' tag|
290290
|941240|XSS using 'import' or 'implementation' attribute|

0 commit comments

Comments
 (0)