Skip to content

Commit f37a382

Browse files
Merge pull request #215471 from Miskatonic-Electronic/patch-15
Update application-gateway-crs-rulegroups-rules.md
2 parents f1003c9 + 14d6d1e commit f37a382

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/web-application-firewall/ag/application-gateway-crs-rulegroups-rules.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -240,7 +240,7 @@ The following rule groups and rules are available when using Web Application Fir
240240
|932110|Remote Command Execution: Windows Command Injection|
241241
|932115|Remote Command Execution: Windows Command Injection|
242242
|932120|Remote Command Execution: Windows PowerShell Command Found|
243-
|932130|Remote Command Execution: Unix Shell Expression or Confluence Vulnerability (CVE-2022-26134) Found|
243+
|932130|Remote Command Execution: Unix Shell Expression or Confluence Vulnerability (CVE-2022-26134) or Text4Shell ([CVE-2022-42889](https://nvd.nist.gov/vuln/detail/CVE-2022-42889)) Found|
244244
|932140|Remote Command Execution: Windows FOR/IF Command Found|
245245
|932150|Remote Command Execution: Direct Unix Command Execution|
246246
|932160|Remote Command Execution: Unix Shell Code Found|
@@ -284,7 +284,7 @@ The following rule groups and rules are available when using Web Application Fir
284284
|941180|Node-Validator Blacklist Keywords|
285285
|941190|XSS Using style sheets|
286286
|941200|XSS using VML frames|
287-
|941210|XSS using obfuscated JavaScript|
287+
|941210|XSS using obfuscated JavaScript or Text4Shell ([CVE-2022-42889](https://nvd.nist.gov/vuln/detail/CVE-2022-42889))|
288288
|941220|XSS using obfuscated VB Script|
289289
|941230|XSS using 'embed' tag|
290290
|941240|XSS using 'import' or 'implementation' attribute|
@@ -497,7 +497,7 @@ The following rule groups and rules are available when using Web Application Fir
497497
|932110|Remote Command Execution: Windows Command Injection|
498498
|932115|Remote Command Execution: Windows Command Injection|
499499
|932120|Remote Command Execution = Windows PowerShell Command Found|
500-
|932130|Remote Command Execution: Unix Shell Expression or Confluence Vulnerability (CVE-2022-26134) Found|
500+
|932130|Remote Command Execution: Unix Shell Expression or Confluence Vulnerability (CVE-2022-26134) or Text4Shell ([CVE-2022-42889](https://nvd.nist.gov/vuln/detail/CVE-2022-42889)) Found|
501501
|932140|Remote Command Execution = Windows FOR/IF Command Found|
502502
|932150|Remote Command Execution: Direct Unix Command Execution|
503503
|932160|Remote Command Execution = Unix Shell Code Found|
@@ -540,7 +540,7 @@ The following rule groups and rules are available when using Web Application Fir
540540
|941180|Node-Validator Blocklist Keywords|
541541
|941190|XSS using style sheets|
542542
|941200|XSS using VML frames|
543-
|941210|XSS using obfuscated JavaScript|
543+
|941210|XSS using obfuscated JavaScript or Text4Shell ([CVE-2022-42889](https://nvd.nist.gov/vuln/detail/CVE-2022-42889))|
544544
|941220|XSS using obfuscated VB Script|
545545
|941230|XSS using 'embed' tag|
546546
|941240|XSS using 'import' or 'implementation' attribute|
@@ -744,7 +744,7 @@ The following rule groups and rules are available when using Web Application Fir
744744
|RuleId|Description|
745745
|---|---|
746746
|932120|Remote Command Execution = Windows PowerShell Command Found|
747-
|932130|**Application Gateway WAF v2**: Remote Command Execution: Unix Shell Expression or Confluence Vulnerability (CVE-2022-26134) Found<br><br>**Application Gateway WAF v1**: Remote Command Execution: Unix Shell Expression|
747+
|932130|**Application Gateway WAF v2**: Remote Command Execution: Unix Shell Expression or Confluence Vulnerability (CVE-2022-26134) or Text4Shell ([CVE-2022-42889](https://nvd.nist.gov/vuln/detail/CVE-2022-42889)) Found<br><br>**Application Gateway WAF v1**: Remote Command Execution: Unix Shell Expression|
748748
|932140|Remote Command Execution = Windows FOR/IF Command Found|
749749
|932160|Remote Command Execution = Unix Shell Code Found|
750750
|932170|Remote Command Execution = Shellshock (CVE-2014-6271)|
@@ -778,7 +778,7 @@ The following rule groups and rules are available when using Web Application Fir
778778
|941180|Node-Validator Blocklist Keywords|
779779
|941190|XSS using style sheets|
780780
|941200|XSS using VML frames|
781-
|941210|XSS using obfuscated JavaScript|
781+
|941210|XSS using obfuscated JavaScript or Text4Shell ([CVE-2022-42889](https://nvd.nist.gov/vuln/detail/CVE-2022-42889))|
782782
|941220|XSS using obfuscated VB Script|
783783
|941230|XSS using 'embed' tag|
784784
|941240|XSS using 'import' or 'implementation' attribute|

0 commit comments

Comments
 (0)