Skip to content

Commit 5313fe5

Browse files
authored
[WAF] Update malicious uploads example (#21360)
1 parent 8873967 commit 5313fe5

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

src/content/docs/waf/detections/malicious-uploads/example-rules.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,10 +40,10 @@ This custom rule example blocks requests addressed at `/upload` with uploaded co
4040

4141
This custom rule example blocks requests with uploaded content objects over 15 MB in size (the current content scanning limit):
4242

43-
- Expression: `any(cf.waf.content_scan.obj_sizes[*] >= 15000000)`
43+
- Expression: `any(cf.waf.content_scan.obj_sizes[*] >= 15728640)`
4444
- Action: _Block_
4545

46-
In this example, you must also test for equality because currently any file over 15 MB will be handled internally as if it had a size of 15 MB. This means that using the `>` (greater than) [comparison operator](/ruleset-engine/rules-language/operators/#comparison-operators) would not work for this particular rule — you should use `>=` (greater than or equal) instead.
46+
In this example, you must also test for equality because currently any file over 15 MB will be handled internally as if it had a size of 15 MB (15,728,640 bytes). This means that using the `>` (greater than) [comparison operator](/ruleset-engine/rules-language/operators/#comparison-operators) would not work for this particular rule — you should use `>=` (greater than or equal) instead.
4747

4848
---
4949

0 commit comments

Comments
 (0)