Skip to content

Commit 9071f66

Browse files
authored
Release-Jan-6-2025 (#19013)
* Release-Jan-6-2025 * Rules updated
1 parent 9f15f5f commit 9071f66

File tree

3 files changed

+289
-216
lines changed

3 files changed

+289
-216
lines changed

src/content/changelogs/waf.yaml

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,11 +5,14 @@ productLink: "/waf/"
55
productArea: Application security
66
productAreaLink: /fundamentals/reference/changelog/security/
77
entries:
8-
- publish_date: "2024-12-16"
9-
scheduled_date: "2025-01-06"
8+
- publish_date: "2025-01-06"
9+
scheduled_date: "2025-01-13"
1010
individual_page: true
1111
scheduled: true
1212
link: "/waf/change-log/scheduled-changes/"
13+
- publish_date: "2025-01-06"
14+
individual_page: true
15+
link: "/waf/change-log/2025-01-06/"
1316
- publish_date: "2024-10-21"
1417
individual_page: true
1518
link: "/waf/change-log/2024-10-21/"
Lines changed: 268 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,268 @@
1+
---
2+
title: "2025-01-06"
3+
type: table
4+
pcx_content_type: changelog
5+
sidebar:
6+
order: 806
7+
tableOfContents: false
8+
---
9+
10+
import { RuleID } from "~/components";
11+
12+
<table style="width: 100%">
13+
<thead>
14+
<tr>
15+
<th>Ruleset</th>
16+
<th>Rule ID</th>
17+
<th>Legacy Rule ID</th>
18+
<th>Description</th>
19+
<th>Previous Action</th>
20+
<th>New Action</th>
21+
<th>Comments</th>
22+
</tr>
23+
</thead>
24+
<tbody>
25+
<tr>
26+
<td>Cloudflare Specials</td>
27+
<td>
28+
<RuleID id="3a321b10270b42549ac201009da08beb" />
29+
</td>
30+
<td>100678</td>
31+
<td>Pandora FMS - Remote Code Execution - CVE:CVE-2024-11320</td>
32+
<td>Log</td>
33+
<td>Block</td>
34+
<td>New Detection</td>
35+
</tr>
36+
<tr>
37+
<td>Cloudflare Specials</td>
38+
<td>
39+
<RuleID id="1fe510368b4a47dda90363c2ecdf3d02" />
40+
</td>
41+
<td>100679</td>
42+
<td>Palo Alto Networks - Remote Code Execution - CVE:CVE-2024-0012, CVE:CVE-2024-9474</td>
43+
<td>Log</td>
44+
<td>Block</td>
45+
<td>New Detection</td>
46+
</tr>
47+
<tr>
48+
<td>Cloudflare Specials</td>
49+
<td>
50+
<RuleID id="b7ba636927b44ee288b9a697a40f2a35" />
51+
</td>
52+
<td>100680</td>
53+
<td>Ivanti - Command Injection - CVE:CVE-2024-37397</td>
54+
<td>Log</td>
55+
<td>Block</td>
56+
<td>New Detection</td>
57+
</tr>
58+
<tr>
59+
<td>Cloudflare Specials</td>
60+
<td>
61+
<RuleID id="6bd9b07c8acc4beeb17c8bee58ae3c89" />
62+
</td>
63+
<td>100681</td>
64+
<td>Really Simple Security - Auth Bypass - CVE:CVE-2024-10924</td>
65+
<td>Log</td>
66+
<td>Block</td>
67+
<td>New Detection</td>
68+
</tr>
69+
<tr>
70+
<td>Cloudflare Specials</td>
71+
<td>
72+
<RuleID id="c86e79e15a4a4307870f6f77e37f2da6" />
73+
</td>
74+
<td>100682</td>
75+
<td>Magento - XXE - CVE:CVE-2024-34102</td>
76+
<td>Log</td>
77+
<td>Block</td>
78+
<td>New Detection</td>
79+
</tr>
80+
<tr>
81+
<td>Cloudflare Specials</td>
82+
<td>
83+
<RuleID id="945f41b48be9485f953116015054c752" />
84+
</td>
85+
<td>100683</td>
86+
<td>CyberPanel - Remote Code Execution - CVE:CVE-2024-51567</td>
87+
<td>Log</td>
88+
<td>Block</td>
89+
<td>New Detection</td>
90+
</tr>
91+
<tr>
92+
<td>Cloudflare Specials</td>
93+
<td>
94+
<RuleID id="aec9a2e554a34a8fa547d069dfe93d7b" />
95+
</td>
96+
<td>100684</td>
97+
<td>Microsoft SharePoint - Remote Code Execution - CVE:CVE-2024-38094, CVE:CVE-2024-38024, CVE:CVE-2024-38023</td>
98+
<td>Log</td>
99+
<td>Block</td>
100+
<td>New Detection</td>
101+
</tr>
102+
<tr>
103+
<td>Cloudflare Specials</td>
104+
<td>
105+
<RuleID id="e614dd46c1ce404da1909e841454c856" />
106+
</td>
107+
<td>100685</td>
108+
<td>CyberPanel - Remote Code Execution - CVE:CVE-2024-51568</td>
109+
<td>Log</td>
110+
<td>Block</td>
111+
<td>New Detection</td>
112+
</tr>
113+
<tr>
114+
<td>Cloudflare Specials</td>
115+
<td>
116+
<RuleID id="685a4edf68f740b4a2c80d45e92362e5" />
117+
</td>
118+
<td>100686</td>
119+
<td>Seeyon - Remote Code Execution</td>
120+
<td>Log</td>
121+
<td>Block</td>
122+
<td>New Detection</td>
123+
</tr>
124+
<tr>
125+
<td>Cloudflare Specials</td>
126+
<td>
127+
<RuleID id="204f9d948a124829acb86555b9f1c9f8" />
128+
</td>
129+
<td>100687</td>
130+
<td>WordPress - Remote Code Execution - CVE:CVE-2024-10781, CVE:CVE-2024-10542</td>
131+
<td>Log</td>
132+
<td>Block</td>
133+
<td>New Detection</td>
134+
</tr>
135+
<tr>
136+
<td>Cloudflare Specials</td>
137+
<td>
138+
<RuleID id="19587024724e49329d5b482d0d7ca374" />
139+
</td>
140+
<td>100688</td>
141+
<td>ProjectSend - Remote Code Execution - CVE:CVE-2024-11680</td>
142+
<td>Log</td>
143+
<td>Block</td>
144+
<td>New Detection</td>
145+
</tr>
146+
<tr>
147+
<td>Cloudflare Specials</td>
148+
<td>
149+
<RuleID id="fa49213e55484f6c824e0682a5260b70" />
150+
</td>
151+
<td>100689</td>
152+
<td>Palo Alto GlobalProtect - Remote Code Execution - CVE:CVE-2024-5921</td>
153+
<td>Log</td>
154+
<td>Block</td>
155+
<td>New Detection</td>
156+
</tr>
157+
<tr>
158+
<td>Cloudflare Specials</td>
159+
<td>
160+
<RuleID id="11b5fc23e85b41ca90316bddd007118b" />
161+
</td>
162+
<td>100690</td>
163+
<td>Ivanti - Remote Code Execution - CVE:CVE-2024-37404</td>
164+
<td>Log</td>
165+
<td>Block</td>
166+
<td>New Detection</td>
167+
</tr>
168+
<tr>
169+
<td>Cloudflare Specials</td>
170+
<td>
171+
<RuleID id="aaeada52bcc840598515de6cc3e49f64" />
172+
</td>
173+
<td>100691</td>
174+
<td>Array Networks - Remote Code Execution - CVE:CVE-2023-28461</td>
175+
<td>Log</td>
176+
<td>Block</td>
177+
<td>New Detection</td>
178+
</tr>
179+
<tr>
180+
<td>Cloudflare Specials</td>
181+
<td>
182+
<RuleID id="e2c7ce1ecd6847219f8d9aedfcc6f5bb" />
183+
</td>
184+
<td>100692</td>
185+
<td>CyberPanel - Remote Code Execution - CVE:CVE-2024-51378</td>
186+
<td>Log</td>
187+
<td>Block</td>
188+
<td>New Detection</td>
189+
</tr>
190+
<tr>
191+
<td>Cloudflare Specials</td>
192+
<td>
193+
<RuleID id="84d481b1f49c4735afa2fb2bb615335e" />
194+
</td>
195+
<td>100693</td>
196+
<td>Symfony Profiler - Auth Bypass - CVE:CVE-2024-50340</td>
197+
<td>Log</td>
198+
<td>Block</td>
199+
<td>New Detection</td>
200+
</tr>
201+
<tr>
202+
<td>Cloudflare Specials</td>
203+
<td>
204+
<RuleID id="9f258f463f9f4b26ad07e3c209d08c8a" />
205+
</td>
206+
<td>100694</td>
207+
<td>Citrix Virtual Apps - Remote Code Execution - CVE:CVE-2024-8069</td>
208+
<td>Log</td>
209+
<td>Block</td>
210+
<td>New Detection</td>
211+
</tr>
212+
<tr>
213+
<td>Cloudflare Specials</td>
214+
<td>
215+
<RuleID id="b490d6edcfec4028aef45cf08aafb2f5" />
216+
</td>
217+
<td>100695</td>
218+
<td>MSMQ Service - Remote Code Execution - CVE:CVE-2023-21554</td>
219+
<td>Log</td>
220+
<td>Block</td>
221+
<td>New Detection</td>
222+
</tr>
223+
<tr>
224+
<td>Cloudflare Specials</td>
225+
<td>
226+
<RuleID id="c8f65bc9eeef4665820ecfe411b7a8c7" />
227+
</td>
228+
<td>100696</td>
229+
<td>Nginxui - Remote Code Execution - CVE:CVE-2024-49368</td>
230+
<td>Log</td>
231+
<td>Block</td>
232+
<td>New Detection</td>
233+
</tr>
234+
<tr>
235+
<td>Cloudflare Specials</td>
236+
<td>
237+
<RuleID id="d5f2e133e34640198d06d7b345954c7e" />
238+
</td>
239+
<td>100697</td>
240+
<td>Apache ShardingSphere - Remote Code Execution - CVE:CVE-2022-22733</td>
241+
<td>Log</td>
242+
<td>Block</td>
243+
<td>New Detection</td>
244+
</tr>
245+
<tr>
246+
<td>Cloudflare Specials</td>
247+
<td>
248+
<RuleID id="c34432e257074cffa9fa15f3f5311209" />
249+
</td>
250+
<td>100698</td>
251+
<td>Mitel MiCollab - Auth Bypass - CVE:CVE-2024-41713</td>
252+
<td>Log</td>
253+
<td>Block</td>
254+
<td>New Detection</td>
255+
</tr>
256+
<tr>
257+
<td>Cloudflare Specials</td>
258+
<td>
259+
<RuleID id="3bda15acd73a4b55a5f60cd2b3e5e46e" />
260+
</td>
261+
<td>100699</td>
262+
<td>Apache Solr - Auth Bypass - CVE:CVE-2024-45216</td>
263+
<td>Log</td>
264+
<td>Block</td>
265+
<td>New Detection</td>
266+
</tr>
267+
</tbody>
268+
</table>

0 commit comments

Comments
 (0)