Skip to content

Commit b91aa67

Browse files
authored
Merge pull request #187522 from vhorne/waf-crs-drs
CRS, DRS updates from Gunjan
2 parents 28c75dd + fd3a5b5 commit b91aa67

File tree

2 files changed

+30
-10
lines changed

2 files changed

+30
-10
lines changed

articles/web-application-firewall/afds/waf-front-door-drs.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.service: web-application-firewall
55
author: vhorne
66
ms.author: victorh
77
ms.topic: conceptual
8-
ms.date: 07/29/2021
8+
ms.date: 02/04/2022
99
---
1010

1111
# Web Application Firewall DRS rule groups and rules
@@ -352,7 +352,7 @@ Front Door.
352352
|944130|Suspicious Java classes|
353353
|944200|Exploitation of Java deserialization Apache Commons|
354354
|944210|Possible use of Java serialization|
355-
|944240|Remote Command Execution: Java serialization|
355+
|944240|Remote Command Execution: Java serialization and Log4j vulnerability ([CVE-2021-44228](https://www.cve.org/CVERecord?id=CVE-2021-44228), [CVE-2021-45046](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046))|
356356
|944250|Remote Command Execution: Suspicious Java method detected|
357357

358358
### <a name="drs9905-20"></a> MS-ThreatIntel-WebShells
@@ -531,7 +531,7 @@ Front Door.
531531
|944130|Suspicious Java class detected|
532532
|944200|Magic bytes Detected, probable java serialization in use|
533533
|944210|Magic bytes Detected Base64 Encoded, probable java serialization in use|
534-
|944240|Remote Command Execution: Java serialization (CVE-2015-5842)|
534+
|944240|Remote Command Execution: Java serialization and Log4j vulnerability ([CVE-2021-44228](https://www.cve.org/CVERecord?id=CVE-2021-44228), [CVE-2021-45046](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046))|
535535
|944250|Remote Command Execution: Suspicious Java method detected|
536536

537537
### <a name="drs9905-11"></a> MS-ThreatIntel-WebShells
@@ -712,7 +712,7 @@ Front Door.
712712
|944130|Suspicious Java classes|
713713
|944200|Exploitation of Java deserialization Apache Commons|
714714
|944210|Possible use of Java serialization|
715-
|944240|Remote Command Execution: Java serialization|
715+
|944240|Remote Command Execution: Java serialization and Log4j vulnerability ([CVE-2021-44228](https://www.cve.org/CVERecord?id=CVE-2021-44228), [CVE-2021-45046](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046))|
716716
|944250|Remote Command Execution: Suspicious Java method detected|
717717

718718
# [Bot rules](#tab/bot)

articles/web-application-firewall/ag/application-gateway-crs-rulegroups-rules.md

Lines changed: 26 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: This page provides information on web application firewall CRS rule
55
services: web-application-firewall
66
author: vhorne
77
ms.service: web-application-firewall
8-
ms.date: 01/11/2022
8+
ms.date: 02/04/2022
99
ms.author: victorh
1010
ms.topic: conceptual
1111
---
@@ -36,16 +36,17 @@ The WAF protects against the following web vulnerabilities:
3636
- Bots, crawlers, and scanners
3737
- Common application misconfigurations (for example, Apache and IIS)
3838

39-
### OWASP CRS 3.2 (public preview)
39+
### OWASP CRS 3.2 (preview)
4040

41-
CRS 3.2 includes 13 rule groups, as shown in the following table. Each group contains multiple rules, which can be disabled.
41+
CRS 3.2 includes 14 rule groups, as shown in the following table. Each group contains multiple rules, which can be disabled.
4242

4343
> [!NOTE]
4444
> CRS 3.2 is only available on the WAF_v2 SKU.
4545
4646
|Rule group|Description|
4747
|---|---|
4848
|**[General](#general-32)**|General group|
49+
|**[KNOWN-CVES](#crs800-32)**|Help detect new and known CVEs|
4950
|**[REQUEST-911-METHOD-ENFORCEMENT](#crs911-32)**|Lock-down methods (PUT, PATCH)|
5051
|**[REQUEST-913-SCANNER-DETECTION](#crs913-32)**|Protect against port and environment scanners|
5152
|**[REQUEST-920-PROTOCOL-ENFORCEMENT](#crs920-32)**|Protect against protocol and encoding issues|
@@ -62,14 +63,15 @@ CRS 3.2 includes 13 rule groups, as shown in the following table. Each group con
6263

6364
### OWASP CRS 3.1
6465

65-
CRS 3.1 includes 13 rule groups, as shown in the following table. Each group contains multiple rules, which can be disabled.
66+
CRS 3.1 includes 14 rule groups, as shown in the following table. Each group contains multiple rules, which can be disabled.
6667

6768
> [!NOTE]
6869
> CRS 3.1 is only available on the WAF_v2 SKU.
6970
7071
|Rule group|Description|
7172
|---|---|
7273
|**[General](#general-31)**|General group|
74+
|**[KNOWN-CVES](#crs800-31)**|Help detect new and known CVEs|
7375
|**[REQUEST-911-METHOD-ENFORCEMENT](#crs911-31)**|Lock-down methods (PUT, PATCH)|
7476
|**[REQUEST-913-SCANNER-DETECTION](#crs913-31)**|Protect against port and environment scanners|
7577
|**[REQUEST-920-PROTOCOL-ENFORCEMENT](#crs920-31)**|Protect against protocol and encoding issues|
@@ -85,11 +87,12 @@ CRS 3.1 includes 13 rule groups, as shown in the following table. Each group con
8587

8688
### OWASP CRS 3.0
8789

88-
CRS 3.0 includes 12 rule groups, as shown in the following table. Each group contains multiple rules, which can be disabled.
90+
CRS 3.0 includes 13 rule groups, as shown in the following table. Each group contains multiple rules, which can be disabled.
8991

9092
|Rule group|Description|
9193
|---|---|
9294
|**[General](#general-30)**|General group|
95+
|**[KNOWN-CVES](#crs800-30)**|Help detect new and known CVEs|
9396
|**[REQUEST-911-METHOD-ENFORCEMENT](#crs911-30)**|Lock-down methods (PUT, PATCH)|
9497
|**[REQUEST-913-SCANNER-DETECTION](#crs913-30)**|Protect against port and environment scanners|
9598
|**[REQUEST-920-PROTOCOL-ENFORCEMENT](#crs920-30)**|Protect against protocol and encoding issues|
@@ -121,7 +124,7 @@ CRS 2.2.9 includes 10 rule groups, as shown in the following table. Each group c
121124

122125
The following rule groups and rules are available when using Web Application Firewall on Application Gateway.
123126

124-
# [OWASP 3.2 (public preview)](#tab/owasp32)
127+
# [OWASP 3.2 (preview)](#tab/owasp32)
125128

126129
## <a name="owasp32"></a> 3.2 rule sets
127130

@@ -130,6 +133,11 @@ The following rule groups and rules are available when using Web Application Fir
130133
|---|---|
131134
|200004|Possible Multipart Unmatched Boundary.|
132135

136+
### <a name="crs800-32"></a> KNOWN-CVES
137+
|RuleId|Description|
138+
|---|---|
139+
|800100|Rule to help detect and mitigate log4j vulnerability [CVE-2021-44228](https://www.cve.org/CVERecord?id=CVE-2021-44228), [CVE-2021-45046](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046)|
140+
133141
### <a name="crs911-32"></a> REQUEST-911-METHOD-ENFORCEMENT
134142
|RuleId|Description|
135143
|---|---|
@@ -366,6 +374,12 @@ The following rule groups and rules are available when using Web Application Fir
366374
|---|---|
367375
|200004|Possible Multipart Unmatched Boundary.|
368376

377+
### <a name="crs800-31"></a> KNOWN-CVES
378+
|RuleId|Description|
379+
|---|---|
380+
|800100|Rule to help detect and mitigate log4j vulnerability [CVE-2021-44228](https://www.cve.org/CVERecord?id=CVE-2021-44228), [CVE-2021-45046](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046)|
381+
382+
369383
### <a name="crs911-31"></a> REQUEST-911-METHOD-ENFORCEMENT
370384

371385
|RuleId|Description|
@@ -608,6 +622,12 @@ The following rule groups and rules are available when using Web Application Fir
608622
|---|---|
609623
|200004|Possible Multipart Unmatched Boundary.|
610624

625+
### <a name="crs800-30"></a> KNOWN-CVES
626+
|RuleId|Description|
627+
|---|---|
628+
|800100|Rule to help detect and mitigate log4j vulnerability [CVE-2021-44228](https://www.cve.org/CVERecord?id=CVE-2021-44228), [CVE-2021-45046](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046)|
629+
630+
611631
### <a name="crs911-30"></a> REQUEST-911-METHOD-ENFORCEMENT
612632

613633
|RuleId|Description|

0 commit comments

Comments
 (0)