Skip to content

Commit 45bfadf

Browse files
committed
2025-07-14 and 2025-07-28 fixed
1 parent c7c1c4c commit 45bfadf

File tree

2 files changed

+1
-25
lines changed

2 files changed

+1
-25
lines changed

src/content/changelog/waf/2025-07-14-waf-release.mdx

Lines changed: 1 addition & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ This week’s vulnerability analysis highlights emerging web application threats
1212

1313
- XSS – Attribute Overloading: A novel cross-site scripting technique where attackers abuse custom or non-standard HTML attributes to smuggle payloads into the DOM. These payloads evade traditional sanitization logic, especially in frameworks that loosely validate attributes or trust unknown tokens.
1414
- XSS – onToggle Event Abuse: Exploits the lesser-used onToggle event (triggered by elements like `<details>`) to execute arbitrary JavaScript when users interact with UI elements. This vector is often overlooked by static analyzers and can be embedded in seemingly benign components.
15-
- SQLi – Obfuscated Boolean Logic: An advanced SQL injection variant that uses non-standard Boolean expressions, comment-based obfuscation, or alternate encodings (for example, `/*!true*/`, `AND/**/1=1`) to bypass basic input validation and WAF signatures. This technique is particularly dangerous in dynamic query construction contexts.
15+
1616

1717
**Impact**
1818

@@ -53,16 +53,5 @@ These vulnerabilities target both user-facing components and back-end databases,
5353
<td>Block</td>
5454
<td>This is a New Detection</td>
5555
</tr>
56-
<tr>
57-
<td>Cloudflare Managed Ruleset</td>
58-
<td>
59-
<RuleID id="7663ea44178441a0b3205c145563445f" />
60-
</td>
61-
<td>100800</td>
62-
<td>SQLi - Obfuscated Boolean</td>
63-
<td>Log</td>
64-
<td>Block</td>
65-
<td>This is a New Detection</td>
66-
</tr>
6756
</tbody>
6857
</table>

src/content/changelog/waf/2025-07-28-waf-release.mdx

Lines changed: 0 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,6 @@ import { RuleID } from "~/components";
88

99
This week’s update spotlights several vulnerabilities across Apache Tomcat, MongoDB, and Fortinet FortiWeb. Several flaws related with a memory leak in Apache Tomcat can lead to a denial-of-service attack. Additionally, a code injection flaw in MongoDB's Mongoose library allows attackers to bypass security controls to access restricted data.
1010

11-
1211
**Key Findings**
1312

1413
- Fortinet FortiWeb (CVE-2025-25257): An improper neutralization of special elements used in a SQL command vulnerability in Fortinet FortiWeb versions allows an unauthenticated attacker to execute unauthorized SQL code or commands.
@@ -88,17 +87,5 @@ These vulnerabilities target user-facing components, web application servers, an
8887
<td>Log</td>
8988
<td>Block</td>
9089
<td>This is a New Detection</td>
91-
</tr>
92-
<tr>
93-
<td>Cloudflare Managed Ruleset</td>
94-
<td>
95-
<RuleID id="9b5c5e13d2ca4253a89769f2194f7b2d" />
96-
</td>
97-
<td>100822</td>
98-
<td>WordPress:Plugin:WPBookit - Remote Code Execution - CVE:CVE-2025-6058</td>
99-
<td>Log</td>
100-
<td>Block</td>
101-
<td>This is a New Detection</td>
102-
</tr>
10390
</tbody>
10491
</table>

0 commit comments

Comments
 (0)