You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/changelogs/waf-general.yaml
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -10,8 +10,8 @@ entries:
10
10
- publish_date: "2024-08-29"
11
11
title: Fixed occasional attack score mismatches
12
12
description: |-
13
-
Fixed an issue causing score mismatches between the global [WAF attack score](/waf/about/waf-attack-score/) and subscores. In certain cases, subscores were higher (not an attack) than expected while the global attack score was lower than expected (attack), leading to false positives.
13
+
Fixed an issue causing score mismatches between the global [WAF attack score](/waf/detections/attack-score/) and subscores. In certain cases, subscores were higher (not an attack) than expected while the global attack score was lower than expected (attack), leading to false positives.
14
14
- publish_date: "2024-05-23"
15
15
title: Improved detection capabilities
16
16
description: |-
17
-
[WAF attack score](/waf/about/waf-attack-score/) now automatically detects and decodes Base64 and JavaScript (Unicode escape sequences) in HTTP requests. This update is available for all customers with access to WAF attack score (Business customers with access to a single field and Enterprise customers).
17
+
[WAF attack score](/waf/detections/attack-score/) now automatically detects and decodes Base64 and JavaScript (Unicode escape sequences) in HTTP requests. This update is available for all customers with access to WAF attack score (Business customers with access to a single field and Enterprise customers).
Copy file name to clipboardExpand all lines: src/content/docs/rules/transform/managed-transforms/index.mdx
+6-7Lines changed: 6 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,15 +3,15 @@ title: Managed Transforms
3
3
pcx_content_type: concept
4
4
sidebar:
5
5
order: 4
6
-
7
6
---
8
7
9
8
Managed Transforms allow you to perform common adjustments to HTTP request and response headers with the click of a button. The available adjustments include:
10
9
11
-
* Add bot protection request headers.
12
-
* Remove or add headers related to the visitor's IP address.
13
-
* Add security-related response headers.
14
-
* Remove "X-Powered-By" response headers.
10
+
- Add bot protection request headers.
11
+
- Remove or add headers related to the visitor's IP address.
12
+
- Add request header when the WAF detects leaked credentials.
13
+
- Add security-related response headers.
14
+
- Remove "X-Powered-By" response headers.
15
15
16
16
For a complete list, refer to [Available Managed Transforms](/rules/transform/managed-transforms/reference/).
17
17
@@ -20,8 +20,7 @@ When you enable a Managed Transform, Cloudflare internally deploys one or more T
20
20
Enabled Managed Transforms will apply to all inbound requests for the zone.
21
21
22
22
:::note
23
-
24
-
The generated internal Transform Rules will not appear in the Transform Rules list in the Cloudflare dashboard.
23
+
The generated internal Transform Rules will not appear in the Transform Rules list in the Cloudflare dashboard.
|`Exposed-Credential-Check: 1`| Previously leaked username and password detected | Pro plan and above |
118
+
|`Exposed-Credential-Check: 2`| Previously leaked username detected | Enterprise plan |
119
+
|`Exposed-Credential-Check: 3`| Similar combination of previously leaked username and password detected | Enterprise plan |
120
+
|`Exposed-Credential-Check: 4`| Previously leaked password detected | All plans |
121
+
122
+
You will only receive this managed header at your origin server if:
123
+
124
+
- The [leaked credentials detection](/waf/detections/leaked-credentials/) in the WAF is turned on.
125
+
- The **Add Leaked Credentials Checks Header** managed transform is turned on.
126
+
- Your Cloudflare plan supports the type of credentials detection. For example, Free plans can only know if a password was previously leaked. In this situation, Cloudflare will add an `Exposed-Credential-Check: 4` header to the request.
Copy file name to clipboardExpand all lines: src/content/docs/ruleset-engine/rules-language/fields/dynamic-fields.mdx
+52-10Lines changed: 52 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,9 @@ Dynamic fields represent computed or derived values, typically related to threat
16
16
17
17
- Access to `cf.bot_management.*` fields requires a Cloudflare Enterprise plan with [Bot Management](/bots/plans/bm-subscription/) enabled.
18
18
19
-
- Access to `cf.waf.content_scan.*` fields requires a Cloudflare Enterprise plan with [WAF content scanning](/waf/about/content-scanning/) enabled.
19
+
- Access to `cf.waf.content_scan.*` fields requires a Cloudflare Enterprise plan with [malicious uploads detection](/waf/detections/malicious-uploads/) enabled.
20
+
21
+
- Access to fields `cf.waf.auth_detected` and `cf.waf.credential_check.*` depends on your Cloudflare plan and add-ons. For more information, refer to [Leaked credentials detection](/waf/detections/leaked-credentials/).
20
22
21
23
- The `cf.tls_client_auth.*` string fields are only filled in if the request includes a client certificate for [mTLS authentication](/ssl/client-certificates/enable-mtls/).
22
24
@@ -372,69 +374,69 @@ Example:
372
374
373
375
When `true`, the request contains at least one [content object](https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/).
374
376
375
-
For more details, refer to [Uploaded content scanning](/waf/about/content-scanning/).
377
+
For more details, refer to [Malicious uploads detection](/waf/detections/malicious-uploads/).
376
378
377
379
## `cf.waf.content_scan.has_malicious_obj`
378
380
379
381
`cf.waf.content_scan.has_malicious_obj``Boolean`
380
382
381
383
When `true`, the request contains at least one malicious content object.
382
384
383
-
For more details, refer to [Uploaded content scanning](/waf/about/content-scanning/).
385
+
For more details, refer to [Malicious uploads detection](/waf/detections/malicious-uploads/).
384
386
385
387
## `cf.waf.content_scan.num_malicious_obj`
386
388
387
389
`cf.waf.content_scan.num_malicious_obj``Integer`
388
390
389
391
The number of malicious content objects detected in the request (zero or greater).
390
392
391
-
For more details, refer to [Uploaded content scanning](/waf/about/content-scanning/).
393
+
For more details, refer to [Malicious uploads detection](/waf/detections/malicious-uploads/).
392
394
393
395
## `cf.waf.content_scan.has_failed`
394
396
395
397
`cf.waf.content_scan.has_failed``Boolean`
396
398
397
399
When `true`, the file scanner was unable to scan all the content objects detected in the request.
398
400
399
-
For more details, refer to [Uploaded content scanning](/waf/about/content-scanning/).
401
+
For more details, refer to [Malicious uploads detection](/waf/detections/malicious-uploads/).
400
402
401
403
## `cf.waf.content_scan.num_obj`
402
404
403
405
`cf.waf.content_scan.num_obj``Integer`
404
406
405
407
The number of content objects detected in the request (zero or greater).
406
408
407
-
For more details, refer to [Uploaded content scanning](/waf/about/content-scanning/).
409
+
For more details, refer to [Malicious uploads detection](/waf/detections/malicious-uploads/).
408
410
409
411
## `cf.waf.content_scan.obj_sizes`
410
412
411
413
`cf.waf.content_scan.obj_sizes``Array<Integer>`
412
414
413
415
An array of file sizes in bytes, in the order the content objects were detected in the request.
414
416
415
-
For more details, refer to [Uploaded content scanning](/waf/about/content-scanning/).
417
+
For more details, refer to [Malicious uploads detection](/waf/detections/malicious-uploads/).
416
418
417
419
## `cf.waf.content_scan.obj_types`
418
420
419
421
`cf.waf.content_scan.obj_types``Array<String>`
420
422
421
423
An array of file types in the order the content objects were detected in the request. If Cloudflare cannot determine the file type of a content object, the corresponding value in the `obj_types` array will be `application/octet-stream`.
422
424
423
-
For more details, refer to [Uploaded content scanning](/waf/about/content-scanning/).
425
+
For more details, refer to [Malicious uploads detection](/waf/detections/malicious-uploads/).
424
426
425
427
## `cf.waf.content_scan.obj_results`
426
428
427
429
`cf.waf.content_scan.obj_results``Array<String>`
428
430
429
431
An array of scan results in the order the content objects were detected in the request. The possible values are: `clean`, `suspicious`, `infected`, and `not scanned`.
430
432
431
-
For more details, refer to [Uploaded content scanning](/waf/about/content-scanning/).
433
+
For more details, refer to [Malicious uploads detection](/waf/detections/malicious-uploads/).
432
434
433
435
## `cf.waf.score`
434
436
435
437
`cf.waf.score``Number`
436
438
437
-
A global score from 1 to 99 that combines the score of each WAF attack vector into a single score. This is the standard [WAF attack score](/waf/about/waf-attack-score/) to detect variants of attack patterns.
439
+
A global score from 1 to 99 that combines the score of each WAF attack vector into a single score. This is the standard [WAF attack score](/waf/detections/attack-score/) to detect variants of attack patterns.
438
440
439
441
## `cf.waf.score.sqli`
440
442
@@ -460,6 +462,46 @@ An attack score from 1 to 99 classifying the command injection or Remote Code Ex
460
462
461
463
The attack score class of the current request, based on the WAF attack score. Can have one of the following values: `attack`, `likely_attack`, `likely_clean`, `clean`.
462
464
465
+
## `cf.waf.auth_detected`
466
+
467
+
`cf.waf.auth_detected``Boolean`
468
+
469
+
When `true`, the Cloudflare WAF detected authentication credentials in the request.
470
+
471
+
Only available when [leaked credentials detection](/waf/detections/leaked-credentials/) is enabled.
Copy file name to clipboardExpand all lines: src/content/docs/waf/analytics/security-analytics.mdx
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ Use the Security Analytics dashboard to:
18
18
- View the traffic distribution for your domain.
19
19
- Understand which traffic is being mitigated by Cloudflare security products, and where non-mitigated traffic is being served from (Cloudflare global network or origin server).
20
20
- Analyze suspicious traffic and create tailored WAF custom rules based on applied filters.
21
-
- Learn more about Cloudflare’s security scores (<GlossaryTooltipterm="attack score"link="/waf/about/waf-attack-score/">attack score</GlossaryTooltip>, [bot score](/bots/concepts/bot-score/), [uploaded content scanning](/waf/about/content-scanning/) results) with real data.
21
+
- Learn more about Cloudflare’s security scores (<GlossaryTooltipterm="attack score"link="/waf/detections/attack-score/">attack score</GlossaryTooltip>, [bot score](/bots/concepts/bot-score/), [uploaded content scanning](/waf/detections/malicious-uploads/) results) with real data.
22
22
-[Find an appropriate rate limit](/waf/rate-limiting-rules/find-rate-limit/) for incoming traffic.
23
23
24
24
If you need to modify existing security-related rules you already configured, consider also using the [Security Events](/waf/analytics/security-events/) dashboard. This dashboard displays information about requests affected by Cloudflare security products.
@@ -92,7 +92,7 @@ To apply the filters for an insight to the data displayed in the Security Analyt
92
92
93
93
The **Attack likelihood**, **Bot likelihood**, and **Malicious uploads** sections display statistics related to WAF attack scores, bot scores, and WAF content scanning scores of incoming requests for the selected time frame.
94
94
95
-
You can examine different traffic segments according to the current metric (attack, bot, or content scanning). To apply score filters for different segments, select the buttons below the traffic chart. For example, select **Likely attack** under **Attack likelihood** to filter requests that are likely an attack (requests with WAF attack score values between 21 and 50).
95
+
You can examine different traffic segments according to the current metric (attack score, bot score, or content scanning). To apply score filters for different segments, select the buttons below the traffic chart. For example, select **Likely attack** under **Attack likelihood** to filter requests that are likely an attack (requests with WAF attack score values between 21 and 50).
96
96
97
97
Additionally, you can use the slider tool below the chart to filter incoming requests according to the current metric. This allows you to filter traffic groups outside the predefined segments.
98
98
@@ -106,7 +106,7 @@ The main chart displays the following data for the selected time frame, accordin
106
106
-**Served by Cloudflare**: Requests served by the Cloudflare global network such as cached content and redirects.
107
107
-**Served by origin**: Requests served by your origin server.
108
108
109
-
-**Attack likelihood**: [WAF attack score](/waf/about/waf-attack-score/) analysis of incoming requests, classifying them as _Clean_, _Likely clean_, _Likely attack_, or _Attack_.
109
+
-**Attack likelihood**: [WAF attack score](/waf/detections/attack-score/) analysis of incoming requests, classifying them as _Clean_, _Likely clean_, _Likely attack_, or _Attack_.
110
110
111
111
-**Bot likelihood**: [Bot score](/bots/concepts/bot-score/) analysis of incoming requests, classifying them as _Automated_, _Likely automated_, or _Likely human_.
0 commit comments