Skip to content

Commit 2afe95f

Browse files
committed
[Rules] Add managed transform related to malicious uploads detection
1 parent d057057 commit 2afe95f

File tree

1 file changed

+15
-1
lines changed

1 file changed

+15
-1
lines changed

src/content/docs/rules/transform/managed-transforms/reference.mdx

Lines changed: 15 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@ For example, consider an incoming request proxied by two CDNs (`CDN_1` and `CDN_
111111
With **Remove visitor IP headers** enabled, the `x-forwarded-for` header sent to the origin server will be:<br/>
112112
`x-forwarded-for: <THIRD_PARTY_CDN_2_IP>`
113113

114-
### Add Leaked Credentials Checks Header
114+
### Add leaked credentials checks header
115115

116116
Adds an `Exposed-Credential-Check` request header whenever the WAF detects leaked credentials in the incoming request.
117117

@@ -130,6 +130,20 @@ You will only receive this managed header at your origin server if:
130130
- The **Add Leaked Credentials Checks Header** managed transform is turned on.
131131
- Your Cloudflare plan supports the type of credentials detection. For example, Free plans can only know if a password was previously leaked. In this situation, Cloudflare will add an `Exposed-Credential-Check: 4` header to the request.
132132

133+
### Add malicious uploads detection header
134+
135+
Adds a `Malicious-Uploads-Detection` request header indicating the outcome of scanning uploaded content for malicious signatures.
136+
137+
The header can have one of the following values:
138+
139+
| Header + Value | Description |
140+
| -------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
141+
| `Malicious-Uploads-Detection: 1` | The request contains at least one malicious content object ([`cf.waf.content_scan.has_malicious_obj`](/ruleset-engine/rules-language/fields/dynamic-fields/#cfwafcontent_scanhas_malicious_obj) is `true`). |
142+
| `Malicious-Uploads-Detection: 2` | The file scanner was unable to scan all the content objects detected in the request ([`cf.waf.content_scan.has_failed`](/ruleset-engine/rules-language/fields/dynamic-fields/#cfwafcontent_scanhas_failed) is `true`). |
143+
| `Malicious-Uploads-Detection: 3` | The request contains at least one content object ([`cf.waf.content_scan.has_obj`](/ruleset-engine/rules-language/fields/dynamic-fields/#cfwafcontent_scanhas_obj) is `true`). |
144+
145+
For more information, refer to [Malicious uploads detection](/waf/detections/malicious-uploads/).
146+
133147
## HTTP response headers
134148

135149
### Remove "X-Powered-By" headers

0 commit comments

Comments
 (0)