Skip to content

Commit 9a07af6

Browse files
Merge branch 'production' into patricia/pcx11286-14979-14981
2 parents 464ec06 + 1e1987c commit 9a07af6

File tree

5 files changed

+186
-46
lines changed

5 files changed

+186
-46
lines changed

src/content/changelogs/waf.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ productLink: "/waf/"
55
productArea: Application security
66
productAreaLink: /fundamentals/reference/changelog/security/
77
entries:
8-
- publish_date: "2024-12-09"
9-
scheduled_date: "2024-12-16"
8+
- publish_date: "2024-12-16"
9+
scheduled_date: "2025-01-06"
1010
individual_page: true
1111
scheduled: true
1212
link: "/waf/change-log/scheduled-changes/"

src/content/docs/rules/reference/page-rules-migration.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ becomes a **filter expression** such as:
7272

7373
To help you map existing Page Rules to modern Rules products, this table outlines how Page Rules settings translate to modern Rules and provides examples for common configurations.
7474

75-
Also, to streamline common configurations, the Cloudflare the dashboard now includes dozens of one-click templates, available in **Rules** > **Templates**. These templates enable you to deploy commonly used features — such as redirects, rewrites, and header modifications — instantly, with pre-filled filter expressions and actions. Explore these templates in the dashboard for a faster setup.
75+
Also, to streamline common configurations, the Cloudflare dashboard now includes dozens of one-click templates, available in **Rules** > **Templates**. These templates enable you to deploy commonly used features — such as redirects, rewrites, and header modifications — instantly, with pre-filled filter expressions and actions. Explore these templates in the dashboard for a faster setup.
7676

7777
| Page Rules setting | New implementation uses... | Migration/Replacement instructions |
7878
| --------------------------- | ------------------------------------ | --------------------------------------------------------------------------- |

src/content/docs/style-guide/documentation-content-strategy/content-types/overview.mdx

Lines changed: 20 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,26 @@ Description of external resource related to current product.
9999

100100
## Additional Information
101101

102-
Only use Overview for the first page in a developer documentation set.
102+
Overiew pages are the default "first" page in any nested navigation. In some cases to ensure good information architecture and navigability, you may need to rename or remove Overview pages.
103+
104+
### When to consider removing an Overview page
105+
106+
If the overview acts as a table of contents that provides no additional information or context, this is when to consider removing it altogether.
107+
108+
### How to remove an Overview page
109+
110+
Deleting the `index.mdx` file of an overview page is not possible and will result in a build error. To remove the page from the docs, the index.mdx file will need to be hidden from displaying through sidebar styling changes. To ensure that users do not accidentally access the overview page, a redirect will need to be added as well.
111+
112+
To hide an overview page, set the group.hideIndex property to true in the page's front matter.
113+
114+
```
115+
---
116+
title: Placeholder
117+
sidebar:
118+
group:
119+
hideIndex: true
120+
---
121+
```
103122

104123
## Examples
105124

src/content/docs/waf/change-log/scheduled-changes.mdx

Lines changed: 162 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -24,29 +24,29 @@ import { RuleID } from "~/components";
2424
<tbody>
2525
<tr>
2626
<td>2024-12-09</td>
27-
<td>2024-12-16</td>
27+
<td>2025-01-06</td>
2828
<td>Block</td>
29-
<td>100683</td>
29+
<td>100678</td>
3030
<td>
31-
<RuleID id="945f41b48be9485f953116015054c752" />
31+
<RuleID id="3a321b10270b42549ac201009da08beb" />
3232
</td>
33-
<td>CyberPanel - Remote Code Execution - CVE:CVE-2024-51567</td>
33+
<td>Pandora FMS - Remote Code Execution - CVE:CVE-2024-11320</td>
3434
<td>This is a New Detection</td>
3535
</tr>
3636
<tr>
3737
<td>2024-12-09</td>
38-
<td>2024-12-16</td>
38+
<td>2025-01-06</td>
3939
<td>Block</td>
40-
<td>100685</td>
40+
<td>100679</td>
4141
<td>
42-
<RuleID id="e614dd46c1ce404da1909e841454c856" />
42+
<RuleID id="1fe510368b4a47dda90363c2ecdf3d02" />
4343
</td>
44-
<td>CyberPanel - Remote Code Execution - CVE:CVE-2024-51568</td>
44+
<td>Palo Alto Networks - Remote Code Execution - CVE:CVE-2024-0012, CVE:CVE-2024-9474</td>
4545
<td>This is a New Detection</td>
4646
</tr>
4747
<tr>
4848
<td>2024-12-09</td>
49-
<td>2024-12-16</td>
49+
<td>2025-01-06</td>
5050
<td>Block</td>
5151
<td>100680</td>
5252
<td>
@@ -57,91 +57,212 @@ import { RuleID } from "~/components";
5757
</tr>
5858
<tr>
5959
<td>2024-12-09</td>
60-
<td>2024-12-16</td>
60+
<td>2025-01-06</td>
6161
<td>Block</td>
62-
<td>100682</td>
62+
<td>100681</td>
6363
<td>
64-
<RuleID id="c86e79e15a4a4307870f6f77e37f2da6" />
64+
<RuleID id="6bd9b07c8acc4beeb17c8bee58ae3c89" />
6565
</td>
66-
<td>Magento - XXE - CVE:CVE-2024-34102</td>
66+
<td>Really Simple Security - Auth Bypass - CVE:CVE-2024-10924</td>
6767
<td>This is a New Detection</td>
6868
</tr>
6969
<tr>
7070
<td>2024-12-09</td>
71-
<td>2024-12-16</td>
71+
<td>2025-01-06</td>
7272
<td>Block</td>
73-
<td>100684</td>
73+
<td>100682</td>
7474
<td>
75-
<RuleID id="aec9a2e554a34a8fa547d069dfe93d7b" />
75+
<RuleID id="c86e79e15a4a4307870f6f77e37f2da6" />
7676
</td>
77-
<td>Microsoft SharePoint - Remote Code Execution - CVE:CVE-2024-38094, CVE:CVE-2024-38024, CVE:CVE-2024-38023</td>
77+
<td>Magento - XXE - CVE:CVE-2024-34102</td>
7878
<td>This is a New Detection</td>
7979
</tr>
8080
<tr>
8181
<td>2024-12-09</td>
82-
<td>2024-12-16</td>
82+
<td>2025-01-06</td>
8383
<td>Block</td>
84-
<td>100679</td>
84+
<td>100683</td>
8585
<td>
86-
<RuleID id="1fe510368b4a47dda90363c2ecdf3d02" />
86+
<RuleID id="945f41b48be9485f953116015054c752" />
8787
</td>
88-
<td>Palo Alto Networks - Remote Code Execution - CVE:CVE-2024-0012, CVE:CVE-2024-9474</td>
88+
<td>CyberPanel - Remote Code Execution - CVE:CVE-2024-51567</td>
8989
<td>This is a New Detection</td>
9090
</tr>
9191
<tr>
9292
<td>2024-12-09</td>
93-
<td>2024-12-16</td>
93+
<td>2025-01-06</td>
9494
<td>Block</td>
95-
<td>100678</td>
95+
<td>100684</td>
9696
<td>
97-
<RuleID id="3a321b10270b42549ac201009da08beb" />
97+
<RuleID id="aec9a2e554a34a8fa547d069dfe93d7b" />
9898
</td>
99-
<td>Pandora FMS - Remote Code Execution - CVE:CVE-2024-11320</td>
99+
<td>Microsoft SharePoint - Remote Code Execution - CVE:CVE-2024-38094, CVE:CVE-2024-38024, CVE:CVE-2024-38023</td>
100100
<td>This is a New Detection</td>
101101
</tr>
102102
<tr>
103103
<td>2024-12-09</td>
104-
<td>2024-12-16</td>
104+
<td>2025-01-06</td>
105105
<td>Block</td>
106-
<td>100688</td>
106+
<td>100685</td>
107107
<td>
108-
<RuleID id="19587024724e49329d5b482d0d7ca374" />
108+
<RuleID id="e614dd46c1ce404da1909e841454c856" />
109109
</td>
110-
<td>ProjectSend - Remote Code Execution - CVE:CVE-2024-11680</td>
110+
<td>CyberPanel - Remote Code Execution - CVE:CVE-2024-51568</td>
111111
<td>This is a New Detection</td>
112112
</tr>
113113
<tr>
114114
<td>2024-12-09</td>
115-
<td>2024-12-16</td>
115+
<td>2025-01-06</td>
116116
<td>Block</td>
117-
<td>100681</td>
117+
<td>100686</td>
118118
<td>
119-
<RuleID id="6bd9b07c8acc4beeb17c8bee58ae3c89" />
119+
<RuleID id="685a4edf68f740b4a2c80d45e92362e5" />
120120
</td>
121-
<td>Really Simple Security - Auth Bypass - CVE:CVE-2024-10924</td>
121+
<td>Seeyon - Remote Code Execution</td>
122122
<td>This is a New Detection</td>
123123
</tr>
124124
<tr>
125125
<td>2024-12-09</td>
126-
<td>2024-12-16</td>
126+
<td>2025-01-06</td>
127127
<td>Block</td>
128-
<td>100686</td>
128+
<td>100687</td>
129129
<td>
130-
<RuleID id="685a4edf68f740b4a2c80d45e92362e5" />
130+
<RuleID id="204f9d948a124829acb86555b9f1c9f8" />
131131
</td>
132-
<td>Seeyon - Remote Code Execution</td>
132+
<td>WordPress - Remote Code Execution - CVE:CVE-2024-10781, CVE:CVE-2024-10542</td>
133133
<td>This is a New Detection</td>
134134
</tr>
135135
<tr>
136136
<td>2024-12-09</td>
137-
<td>2024-12-16</td>
137+
<td>2025-01-06</td>
138138
<td>Block</td>
139-
<td>100687</td>
139+
<td>100688</td>
140140
<td>
141-
<RuleID id="204f9d948a124829acb86555b9f1c9f8" />
141+
<RuleID id="19587024724e49329d5b482d0d7ca374" />
142142
</td>
143-
<td>WordPress - Remote Code Execution - CVE:CVE-2024-10781, CVE:CVE-2024-10542</td>
143+
<td>ProjectSend - Remote Code Execution - CVE:CVE-2024-11680</td>
144144
<td>This is a New Detection</td>
145145
</tr>
146+
<tr>
147+
<td>2024-12-16</td>
148+
<td>2025-01-06</td>
149+
<td>Block</td>
150+
<td>100689</td>
151+
<td>
152+
<RuleID id="fa49213e55484f6c824e0682a5260b70" />
153+
</td>
154+
<td>Palo Alto GlobalProtect - Remote Code Execution - CVE:CVE-2024-5921</td>
155+
<td>This is a New Detection</td>
156+
</tr>
157+
<tr>
158+
<td>2024-12-16</td>
159+
<td>2025-01-06</td>
160+
<td>Block</td>
161+
<td>100690</td>
162+
<td>
163+
<RuleID id="11b5fc23e85b41ca90316bddd007118b" />
164+
</td>
165+
<td>Ivanti - Remote Code Execution - CVE:CVE-2024-37404</td>
166+
<td>This is a New Detection</td>
167+
</tr>
168+
<tr>
169+
<td>2024-12-16</td>
170+
<td>2025-01-06</td>
171+
<td>Block</td>
172+
<td>100691</td>
173+
<td>
174+
<RuleID id="aaeada52bcc840598515de6cc3e49f64" />
175+
</td>
176+
<td>Array Networks - Remote Code Execution - CVE:CVE-2023-28461</td>
177+
<td>This is a New Detection</td>
178+
</tr>
179+
<tr>
180+
<td>2024-12-16</td>
181+
<td>2025-01-06</td>
182+
<td>Block</td>
183+
<td>100692</td>
184+
<td>
185+
<RuleID id="e2c7ce1ecd6847219f8d9aedfcc6f5bb" />
186+
</td>
187+
<td>CyberPanel - Remote Code Execution - CVE:CVE-2024-51378</td>
188+
<td>This is a New Detection</td>
189+
</tr>
190+
<tr>
191+
<td>2024-12-16</td>
192+
<td>2025-01-06</td>
193+
<td>Block</td>
194+
<td>100693</td>
195+
<td>
196+
<RuleID id="84d481b1f49c4735afa2fb2bb615335e" />
197+
</td>
198+
<td>Symfony Profiler - Auth Bypass - CVE:CVE-2024-50340</td>
199+
<td>This is a New Detection</td>
200+
</tr>
201+
<tr>
202+
<td>2024-12-16</td>
203+
<td>2025-01-06</td>
204+
<td>Block</td>
205+
<td>100694</td>
206+
<td>
207+
<RuleID id="9f258f463f9f4b26ad07e3c209d08c8a" />
208+
</td>
209+
<td>Citrix Virtual Apps - Remote Code Execution - CVE:CVE-2024-8069</td>
210+
<td>This is a New Detection</td>
211+
</tr>
212+
<tr>
213+
<td>2024-12-16</td>
214+
<td>2025-01-06</td>
215+
<td>Block</td>
216+
<td>100695</td>
217+
<td>
218+
<RuleID id="b490d6edcfec4028aef45cf08aafb2f5" />
219+
</td>
220+
<td>MSMQ Service - Remote Code Execution - CVE:CVE-2023-21554</td>
221+
<td>This is a New Detection</td>
222+
</tr>
223+
<tr>
224+
<td>2024-12-16</td>
225+
<td>2025-01-06</td>
226+
<td>Block</td>
227+
<td>100696</td>
228+
<td>
229+
<RuleID id="c8f65bc9eeef4665820ecfe411b7a8c7" />
230+
</td>
231+
<td>Nginxui - Remote Code Execution - CVE:CVE-2024-49368</td>
232+
<td>This is a New Detection</td>
233+
</tr>
234+
<tr>
235+
<td>2024-12-16</td>
236+
<td>2025-01-06</td>
237+
<td>Block</td>
238+
<td>100697</td>
239+
<td>
240+
<RuleID id="d5f2e133e34640198d06d7b345954c7e" />
241+
</td>
242+
<td>Apache ShardingSphere - Remote Code Execution - CVE:CVE-2022-22733</td>
243+
<td>This is a New Detection</td>
244+
</tr>
245+
<tr>
246+
<td>2024-12-16</td>
247+
<td>2025-01-06</td>
248+
<td>Block</td>
249+
<td>100698</td>
250+
<td>
251+
<RuleID id="c34432e257074cffa9fa15f3f5311209" />
252+
</td>
253+
<td>Mitel MiCollab - Auth Bypass - CVE:CVE-2024-41713</td>
254+
<td>This is a New Detection</td>
255+
</tr>
256+
<tr>
257+
<td>2024-12-16</td>
258+
<td>2025-01-06</td>
259+
<td>Block</td>
260+
<td>100699</td>
261+
<td>
262+
<RuleID id="3bda15acd73a4b55a5f60cd2b3e5e46e" />
263+
</td>
264+
<td>Apache Solr - Auth Bypass - CVE:CVE-2024-45216</td>
265+
<td>This is a New Detection</td>
266+
</tr>
146267
</tbody>
147268
</table>

src/content/docs/workflows/build/workers-api.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -186,7 +186,7 @@ Create (trigger) a new instance of the given Workflow.
186186

187187
* <code>create(options?: WorkflowInstanceCreateOptions): Promise&lt;WorkflowInstance&gt;</code>
188188

189-
* `options` - optional properties to pass when creating an instance, includng a user-provided ID and payload parameters.
189+
* `options` - optional properties to pass when creating an instance, including a user-provided ID and payload parameters.
190190

191191
An ID is automatically generated, but a user-provided ID can be specified (up to 64 characters [^1]). This can be useful when mapping Workflows to users, merchants or other identifiers in your system. You can also provide a JSON object as the `params` property, allowing you to pass data for the Workflow instance to act on as its [`WorkflowEvent`](/workflows/build/events-and-parameters/).
192192

0 commit comments

Comments
 (0)