diff --git a/src/content/docs/ddos-protection/change-log/http/2022-04-07.mdx b/src/content/docs/ddos-protection/change-log/http/2022-04-07.mdx index 202e8b7116d106d..2ac446ac2de9d72 100644 --- a/src/content/docs/ddos-protection/change-log/http/2022-04-07.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2022-04-07.mdx @@ -1,7 +1,7 @@ --- -title: '2022-04-07' +title: "2022-04-07" type: table -pcx_content_type: changelog +pcx_content_type: release-notes sidebar: order: 28393 head: @@ -9,26 +9,23 @@ head: content: "2022-04-07" --- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...8ed59b32Global L7 attack mitigationsddos_dynamicddos_dynamicSome attack patterns will be detected more consistently.
Rule IDDescriptionPrevious ActionNew ActionNotes
...8ed59b32Global L7 attack mitigationsddos_dynamicddos_dynamicSome attack patterns will be detected more consistently.
- diff --git a/src/content/docs/ddos-protection/change-log/http/2022-04-12.mdx b/src/content/docs/ddos-protection/change-log/http/2022-04-12.mdx index 78f8ca7c2bc29f3..6d82bcd4fdef7fc 100644 --- a/src/content/docs/ddos-protection/change-log/http/2022-04-12.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2022-04-12.mdx @@ -1,38 +1,40 @@ --- -title: '2022-04-12' -pcx_content_type: changelog +title: "2022-04-12" +pcx_content_type: release-notes sidebar: order: 28388 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...61b90333HTTP requests with unusual HTTP headers or URI path (signature #15).N/Amanaged_challengeThis rule is detecting floods of requests impersonating a browser.
...81b13394HTTP requests with unusual HTTP headers or URI path (signature #2).blockblockUpdated the filter to detect attacks more easily
Rule IDDescriptionPrevious ActionNew ActionNotes
...61b90333 + HTTP requests with unusual HTTP headers or URI path (signature #15). + N/Amanaged_challenge + This rule is detecting floods of requests impersonating a browser. +
...81b13394 + HTTP requests with unusual HTTP headers or URI path (signature #2). + blockblockUpdated the filter to detect attacks more easily
- diff --git a/src/content/docs/ddos-protection/change-log/http/2022-04-21.mdx b/src/content/docs/ddos-protection/change-log/http/2022-04-21.mdx index abb52888c6e033a..1a5a69c4bf2984b 100644 --- a/src/content/docs/ddos-protection/change-log/http/2022-04-21.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2022-04-21.mdx @@ -1,31 +1,27 @@ --- -title: '2022-04-21' -pcx_content_type: changelog +title: "2022-04-21" +pcx_content_type: release-notes sidebar: order: 28379 - --- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...e7dccda4HTTP requests from known botnet (signature #7).blockblockRemove false positives.
Rule IDDescriptionPrevious ActionNew ActionNotes
...e7dccda4HTTP requests from known botnet (signature #7).blockblockRemove false positives.
- diff --git a/src/content/docs/ddos-protection/change-log/http/2022-05-03.mdx b/src/content/docs/ddos-protection/change-log/http/2022-05-03.mdx index a507a18b452974e..05a60fd6af76085 100644 --- a/src/content/docs/ddos-protection/change-log/http/2022-05-03.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2022-05-03.mdx @@ -1,45 +1,46 @@ --- -title: '2022-05-03' -pcx_content_type: changelog +title: "2022-05-03" +pcx_content_type: release-notes sidebar: order: 28367 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...4cc1fcb6BETA - HTTP requests with unusual HTTP headers or URI path (signature #2).logN/A
...81b13394HTTP requests with unusual HTTP headers or URI path (signature #2).blockblockUpdate the rule to catch more attacks than before.
...863134d5HTTP requests from known bad user agents.logblock
Rule IDDescriptionPrevious ActionNew ActionNotes
...4cc1fcb6 + BETA - HTTP requests with unusual HTTP headers or URI path (signature + #2). + logN/A
...81b13394 + HTTP requests with unusual HTTP headers or URI path (signature #2). + blockblockUpdate the rule to catch more attacks than before.
...863134d5HTTP requests from known bad user agents.logblock
- diff --git a/src/content/docs/ddos-protection/change-log/http/2022-05-12.mdx b/src/content/docs/ddos-protection/change-log/http/2022-05-12.mdx index f33a1db1f425c54..ae7bb4193c82bdd 100644 --- a/src/content/docs/ddos-protection/change-log/http/2022-05-12.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2022-05-12.mdx @@ -1,29 +1,29 @@ --- -title: '2022-05-12' -pcx_content_type: changelog +title: "2022-05-12" +pcx_content_type: release-notes sidebar: order: 28358 - --- - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...ad07ec62HTTP requests with unusual HTTP headers or URI path (signature #6).logblock
Rule IDDescriptionPrevious ActionNew ActionNotes
...ad07ec62 + HTTP requests with unusual HTTP headers or URI path (signature #6). + logblock
- diff --git a/src/content/docs/ddos-protection/change-log/http/2022-06-01.mdx b/src/content/docs/ddos-protection/change-log/http/2022-06-01.mdx index 21981851f2adc45..332799737e7c74b 100644 --- a/src/content/docs/ddos-protection/change-log/http/2022-06-01.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2022-06-01.mdx @@ -1,31 +1,27 @@ --- -title: '2022-06-01' -pcx_content_type: changelog +title: "2022-06-01" +pcx_content_type: release-notes sidebar: order: 28338 - --- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...d2f294d7HTTP requests trying to impersonate browsers.managed_challengeddos_dynamicPick different actions depending on attack characteristics.
Rule IDDescriptionPrevious ActionNew ActionNotes
...d2f294d7HTTP requests trying to impersonate browsers.managed_challengeddos_dynamicPick different actions depending on attack characteristics.
- diff --git a/src/content/docs/ddos-protection/change-log/http/2022-06-08.mdx b/src/content/docs/ddos-protection/change-log/http/2022-06-08.mdx index 59d2bc59bd68faa..c81e3290663895e 100644 --- a/src/content/docs/ddos-protection/change-log/http/2022-06-08.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2022-06-08.mdx @@ -1,31 +1,27 @@ --- -title: '2022-06-08' -pcx_content_type: changelog +title: "2022-06-08" +pcx_content_type: release-notes sidebar: order: 28331 - --- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...d2f294d7HTTP requests trying to impersonate browsers.ddos_dynamicddos_dynamicExpanded the filter to catch more attacks.
Rule IDDescriptionPrevious ActionNew ActionNotes
...d2f294d7HTTP requests trying to impersonate browsers.ddos_dynamicddos_dynamicExpanded the filter to catch more attacks.
- diff --git a/src/content/docs/ddos-protection/change-log/http/2022-07-06.mdx b/src/content/docs/ddos-protection/change-log/http/2022-07-06.mdx index c9c9a11da007800..678498ce10e1bd9 100644 --- a/src/content/docs/ddos-protection/change-log/http/2022-07-06.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2022-07-06.mdx @@ -1,42 +1,43 @@ --- -title: '2022-07-06' -pcx_content_type: changelog +title: "2022-07-06" +pcx_content_type: release-notes sidebar: order: 28303 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...444be2c3Location-Aware DDoS Protection (Available only to Enterprise zones with Advanced DDoS service).N/AlogAdded new Location-Aware DDoS Protection for Enterprise accounts that are -subscribed to the Advanced DDoS service. Location Aware DDoS Protection -constantly learns a zone’s traffic levels per country and region over time, -creates a traffic profile and then flags or mitigates traffic that deviates -from the profile.
...863134d5HTTP requests from known bad user agents.blockblockRequests matching this rule will not match any other.
Rule IDDescriptionPrevious ActionNew ActionNotes
...444be2c3 + Location-Aware DDoS Protection (Available only to Enterprise zones with + Advanced DDoS service). + N/Alog + Added new Location-Aware DDoS Protection for Enterprise accounts that + are subscribed to the Advanced DDoS service. Location Aware DDoS + Protection constantly learns a zone’s traffic levels per country and + region over time, creates a traffic profile and then flags or mitigates + traffic that deviates from the profile. +
...863134d5HTTP requests from known bad user agents.blockblockRequests matching this rule will not match any other.
- diff --git a/src/content/docs/ddos-protection/change-log/http/2022-07-08.mdx b/src/content/docs/ddos-protection/change-log/http/2022-07-08.mdx index 89a870ef56b8499..4fd8acbb11b4f81 100644 --- a/src/content/docs/ddos-protection/change-log/http/2022-07-08.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2022-07-08.mdx @@ -1,38 +1,42 @@ --- -title: '2022-07-08' -pcx_content_type: changelog +title: "2022-07-08" +pcx_content_type: release-notes sidebar: order: 28301 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...7d4f6798HTTP requests causing a high request rate to authentication endpoints.blockblockUpdate thresholds for lower sensitivity levels to align with other rules.
...ecd68c61HTTP requests causing a high request rate to search endpoints.ddos_dynamicddos_dynamicUpdate thresholds for lower sensitivity levels to align with other rules.
Rule IDDescriptionPrevious ActionNew ActionNotes
...7d4f6798 + HTTP requests causing a high request rate to authentication endpoints. + blockblock + Update thresholds for lower sensitivity levels to align with other + rules. +
...ecd68c61HTTP requests causing a high request rate to search endpoints.ddos_dynamicddos_dynamic + Update thresholds for lower sensitivity levels to align with other + rules. +
- diff --git a/src/content/docs/ddos-protection/change-log/http/2022-07-18.mdx b/src/content/docs/ddos-protection/change-log/http/2022-07-18.mdx index 466644ba3ef551d..cee0afb29338b49 100644 --- a/src/content/docs/ddos-protection/change-log/http/2022-07-18.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2022-07-18.mdx @@ -1,31 +1,29 @@ --- -title: '2022-07-18' -pcx_content_type: changelog +title: "2022-07-18" +pcx_content_type: release-notes sidebar: order: 28291 - --- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...1712a123HTTP requests with unusual HTTP headers or URI path (signature #16).logblockEnable the rule as scheduled.
Rule IDDescriptionPrevious ActionNew ActionNotes
...1712a123 + HTTP requests with unusual HTTP headers or URI path (signature #16). + logblockEnable the rule as scheduled.
- diff --git a/src/content/docs/ddos-protection/change-log/http/2022-08-02.mdx b/src/content/docs/ddos-protection/change-log/http/2022-08-02.mdx index 75e089ca25fce6a..2de377fd027b014 100644 --- a/src/content/docs/ddos-protection/change-log/http/2022-08-02.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2022-08-02.mdx @@ -1,39 +1,39 @@ --- -title: '2022-08-02' -pcx_content_type: changelog +title: "2022-08-02" +pcx_content_type: release-notes sidebar: order: 28276 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...1712a123HTTP requests with unusual HTTP headers or URI path (signature #16).logblockAllow requests matching this rule to match other rules too in order to -catch more attacks.
...d2f294d7HTTP requests trying to impersonate browsers.ddos_dynamicddos_dynamicExtend the scope of this filter to match a wider set of requests.
Rule IDDescriptionPrevious ActionNew ActionNotes
...1712a123 + HTTP requests with unusual HTTP headers or URI path (signature #16). + logblock + Allow requests matching this rule to match other rules too in order to + catch more attacks. +
...d2f294d7HTTP requests trying to impersonate browsers.ddos_dynamicddos_dynamicExtend the scope of this filter to match a wider set of requests.
- diff --git a/src/content/docs/ddos-protection/change-log/http/2022-08-10.mdx b/src/content/docs/ddos-protection/change-log/http/2022-08-10.mdx index 54ee621a08c982f..8297513235bf0f9 100644 --- a/src/content/docs/ddos-protection/change-log/http/2022-08-10.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2022-08-10.mdx @@ -1,31 +1,27 @@ --- -title: '2022-08-10' -pcx_content_type: changelog +title: "2022-08-10" +pcx_content_type: release-notes sidebar: order: 28268 - --- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...d2f294d7HTTP requests trying to impersonate browsers.ddos_dynamicddos_dynamicRemove false positives.
Rule IDDescriptionPrevious ActionNew ActionNotes
...d2f294d7HTTP requests trying to impersonate browsers.ddos_dynamicddos_dynamicRemove false positives.
- diff --git a/src/content/docs/ddos-protection/change-log/http/2022-08-16.mdx b/src/content/docs/ddos-protection/change-log/http/2022-08-16.mdx index bab47f98bd5a9da..855a107ddebe6aa 100644 --- a/src/content/docs/ddos-protection/change-log/http/2022-08-16.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2022-08-16.mdx @@ -1,38 +1,39 @@ --- -title: '2022-08-16' -pcx_content_type: changelog +title: "2022-08-16" +pcx_content_type: release-notes sidebar: order: 28262 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...1712a123HTTP requests with unusual HTTP headers or URI path (signature #16).blockblockModify the rule to catch more attacks.
...b757316cBETA - HTTP requests with unusual HTTP headers or URI path (signature #16).logN/AObservation filter removed, rule is now merged with ...1712a123
Rule IDDescriptionPrevious ActionNew ActionNotes
...1712a123 + HTTP requests with unusual HTTP headers or URI path (signature #16). + blockblockModify the rule to catch more attacks.
...b757316c + BETA - HTTP requests with unusual HTTP headers or URI path (signature + #16). + logN/AObservation filter removed, rule is now merged with ...1712a123
- diff --git a/src/content/docs/ddos-protection/change-log/http/2022-09-13.mdx b/src/content/docs/ddos-protection/change-log/http/2022-09-13.mdx index 012366e0b6fb42b..8c6484c2db14746 100644 --- a/src/content/docs/ddos-protection/change-log/http/2022-09-13.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2022-09-13.mdx @@ -1,31 +1,30 @@ --- -title: '2022-09-13' -pcx_content_type: changelog +title: "2022-09-13" +pcx_content_type: release-notes sidebar: order: 28234 - --- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...e4fe8e55User-Agent-aware DDoS Protection (Available only to Enterprise zones with Advanced DDoS service).logmanaged_challenge
Rule IDDescriptionPrevious ActionNew ActionNotes
...e4fe8e55 + User-Agent-aware DDoS Protection (Available only to Enterprise zones + with Advanced DDoS service). + logmanaged_challenge
- diff --git a/src/content/docs/ddos-protection/change-log/http/2022-09-14.mdx b/src/content/docs/ddos-protection/change-log/http/2022-09-14.mdx index 12af3f8c1b876b1..f17fdd3bf2b7e20 100644 --- a/src/content/docs/ddos-protection/change-log/http/2022-09-14.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2022-09-14.mdx @@ -1,32 +1,33 @@ --- -title: '2022-09-14' -pcx_content_type: changelog +title: "2022-09-14" +pcx_content_type: release-notes sidebar: order: 28233 - --- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...e4fe8e55User-Agent-aware DDoS Protection (Available only to Enterprise zones with Advanced DDoS service).managed_challengelogThis rule is causing false positive in some rare occurrences, we are -reverting it back to log by default (opt-in).
Rule IDDescriptionPrevious ActionNew ActionNotes
...e4fe8e55 + User-Agent-aware DDoS Protection (Available only to Enterprise zones + with Advanced DDoS service). + managed_challengelog + This rule is causing false positive in some rare occurrences, we are + reverting it back to log by default (opt-in). +
- diff --git a/src/content/docs/ddos-protection/change-log/http/2022-09-19-emergency.mdx b/src/content/docs/ddos-protection/change-log/http/2022-09-19-emergency.mdx index f1d99523b6b0cc3..ca58dff37df5d5b 100644 --- a/src/content/docs/ddos-protection/change-log/http/2022-09-19-emergency.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2022-09-19-emergency.mdx @@ -1,31 +1,27 @@ --- -title: '2022-09-19 - Emergency' -pcx_content_type: changelog +title: "2022-09-19 - Emergency" +pcx_content_type: release-notes sidebar: order: 28228 - --- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...c4bef55cHTTP requests from known botnet (signature #5).ddos_dynamicddos_dynamicUpdate the rule to target previously missed attacks.
Rule IDDescriptionPrevious ActionNew ActionNotes
...c4bef55cHTTP requests from known botnet (signature #5).ddos_dynamicddos_dynamicUpdate the rule to target previously missed attacks.
- diff --git a/src/content/docs/ddos-protection/change-log/http/2022-10-06-emergency.mdx b/src/content/docs/ddos-protection/change-log/http/2022-10-06-emergency.mdx index 51c6b72bab165d3..ed6822ee7e13f4e 100644 --- a/src/content/docs/ddos-protection/change-log/http/2022-10-06-emergency.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2022-10-06-emergency.mdx @@ -1,39 +1,37 @@ --- -title: '2022-10-06 - Emergency' -pcx_content_type: changelog +title: "2022-10-06 - Emergency" +pcx_content_type: release-notes sidebar: order: 28211 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...6fa59d23HTTP requests that are very likely coming from bots.managed_challengeddos_dynamicBlock very large attacks instead of challenging them.
...91b2849eHTTP requests with unusual HTTP headers (signature #13).blockblockSome attacks were only partially mitigated. Now the rule should stop -attacks completely.
Rule IDDescriptionPrevious ActionNew ActionNotes
...6fa59d23HTTP requests that are very likely coming from bots.managed_challengeddos_dynamicBlock very large attacks instead of challenging them.
...91b2849eHTTP requests with unusual HTTP headers (signature #13).blockblock + Some attacks were only partially mitigated. Now the rule should stop + attacks completely. +
- diff --git a/src/content/docs/ddos-protection/change-log/http/2022-10-14.mdx b/src/content/docs/ddos-protection/change-log/http/2022-10-14.mdx index 09b81cf98e4a063..2b44bbd369b63f6 100644 --- a/src/content/docs/ddos-protection/change-log/http/2022-10-14.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2022-10-14.mdx @@ -1,31 +1,27 @@ --- -title: '2022-10-14' -pcx_content_type: changelog +title: "2022-10-14" +pcx_content_type: release-notes sidebar: order: 28203 - --- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...6fa59d23HTTP requests that are very likely coming from bots.ddos_dynamicddos_dynamicBlock more large attacks instead of challenging.
Rule IDDescriptionPrevious ActionNew ActionNotes
...6fa59d23HTTP requests that are very likely coming from bots.ddos_dynamicddos_dynamicBlock more large attacks instead of challenging.
- diff --git a/src/content/docs/ddos-protection/change-log/http/2022-11-02-emergency.mdx b/src/content/docs/ddos-protection/change-log/http/2022-11-02-emergency.mdx index def94ea4814ba2d..16c319fb3c3cf09 100644 --- a/src/content/docs/ddos-protection/change-log/http/2022-11-02-emergency.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2022-11-02-emergency.mdx @@ -1,38 +1,36 @@ --- -title: '2022-11-02 - Emergency' -pcx_content_type: changelog +title: "2022-11-02 - Emergency" +pcx_content_type: release-notes sidebar: order: 28184 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...06a46ce3HTTP requests with unusual HTTP headers or URI path (signature #18).N/AblockN/A
...81b5405cHTTP requests from known botnet (signature #3).blockblockExtend the rule to catch more attacks.
Rule IDDescriptionPrevious ActionNew ActionNotes
...06a46ce3 + HTTP requests with unusual HTTP headers or URI path (signature #18). + N/AblockN/A
...81b5405cHTTP requests from known botnet (signature #3).blockblockExtend the rule to catch more attacks.
- diff --git a/src/content/docs/ddos-protection/change-log/http/2022-12-07-emergency.mdx b/src/content/docs/ddos-protection/change-log/http/2022-12-07-emergency.mdx index 1007c10c9067f0e..c0fe37153e2400a 100644 --- a/src/content/docs/ddos-protection/change-log/http/2022-12-07-emergency.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2022-12-07-emergency.mdx @@ -1,31 +1,29 @@ --- -title: '2022-12-07 - Emergency' -pcx_content_type: changelog +title: "2022-12-07 - Emergency" +pcx_content_type: release-notes sidebar: order: 28149 - --- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...d2f294d7HTTP requests trying to impersonate browsers.ddos_dynamicddos_dynamicRemove a small probability of false positive with worker subrequests.
Rule IDDescriptionPrevious ActionNew ActionNotes
...d2f294d7HTTP requests trying to impersonate browsers.ddos_dynamicddos_dynamic + Remove a small probability of false positive with worker subrequests. +
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-01-30.mdx b/src/content/docs/ddos-protection/change-log/http/2023-01-30.mdx index 6503630683e9f43..741d0693a5fb081 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-01-30.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-01-30.mdx @@ -1,31 +1,29 @@ --- -title: '2023-01-30' -pcx_content_type: changelog +title: "2023-01-30" +pcx_content_type: release-notes sidebar: order: 28095 - --- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...291a3fc7HTTP requests with unusual HTTP headers or URI path (signature #19).logblockNew rule blocking requests with unusual attributes.
Rule IDDescriptionPrevious ActionNew ActionNotes
...291a3fc7 + HTTP requests with unusual HTTP headers or URI path (signature #19). + logblockNew rule blocking requests with unusual attributes.
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-02-20.mdx b/src/content/docs/ddos-protection/change-log/http/2023-02-20.mdx index f60ae9a25bbc3d8..34b9e31a04db226 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-02-20.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-02-20.mdx @@ -1,31 +1,27 @@ --- -title: '2023-02-20' -pcx_content_type: changelog +title: "2023-02-20" +pcx_content_type: release-notes sidebar: order: 28074 - --- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...863134d5HTTP requests from known bad user agents.blockblockDetect more load testing tools as bad
Rule IDDescriptionPrevious ActionNew ActionNotes
...863134d5HTTP requests from known bad user agents.blockblockDetect more load testing tools as bad
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-02-28-emergency.mdx b/src/content/docs/ddos-protection/change-log/http/2023-02-28-emergency.mdx index 12913d0b51cbf06..2fd613bf75da46e 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-02-28-emergency.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-02-28-emergency.mdx @@ -1,32 +1,32 @@ --- -title: '2023-02-28 - Emergency' -pcx_content_type: changelog +title: "2023-02-28 - Emergency" +pcx_content_type: release-notes sidebar: order: 28066 - --- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...97003a74HTTP requests with unusual HTTP headers or URI path (signature #17).logddos_dynamicEnable mitigation on a subset of this rule that is known to only match -attacks.
Rule IDDescriptionPrevious ActionNew ActionNotes
...97003a74 + HTTP requests with unusual HTTP headers or URI path (signature #17). + logddos_dynamic + Enable mitigation on a subset of this rule that is known to only match + attacks. +
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-03-10.mdx b/src/content/docs/ddos-protection/change-log/http/2023-03-10.mdx index c7533cdc2ec1419..617e7be972bee64 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-03-10.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-03-10.mdx @@ -1,38 +1,36 @@ --- -title: '2023-03-10' -pcx_content_type: changelog +title: "2023-03-10" +pcx_content_type: release-notes sidebar: order: 28056 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...97003a74HTTP requests with unusual HTTP headers or URI path (signature #17).ddos_dynamicblockDetect new attacks with unusual HTTP attributes.
...d2f294d7HTTP requests trying to impersonate browsers.ddos_dynamicddos_dynamicExpand the filter to catch more attacks.
Rule IDDescriptionPrevious ActionNew ActionNotes
...97003a74 + HTTP requests with unusual HTTP headers or URI path (signature #17). + ddos_dynamicblockDetect new attacks with unusual HTTP attributes.
...d2f294d7HTTP requests trying to impersonate browsers.ddos_dynamicddos_dynamicExpand the filter to catch more attacks.
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-03-22.mdx b/src/content/docs/ddos-protection/change-log/http/2023-03-22.mdx index f5cd6b1d9182f34..c32ee3d356caeb7 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-03-22.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-03-22.mdx @@ -1,31 +1,30 @@ --- -title: '2023-03-22' -pcx_content_type: changelog +title: "2023-03-22" +pcx_content_type: release-notes sidebar: order: 28044 - --- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...d2f294d7HTTP requests trying to impersonate browsers.ddos_dynamicddos_dynamicMitigate more attacks (action is managed-challenge for smaller attacks, block for large ones).
Rule IDDescriptionPrevious ActionNew ActionNotes
...d2f294d7HTTP requests trying to impersonate browsers.ddos_dynamicddos_dynamic + Mitigate more attacks (action is managed-challenge for smaller attacks, + block for large ones). +
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-04-03.mdx b/src/content/docs/ddos-protection/change-log/http/2023-04-03.mdx index 118f6d54ea09e12..23dd324c87b3ced 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-04-03.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-04-03.mdx @@ -1,31 +1,27 @@ --- -title: '2023-04-03' -pcx_content_type: changelog +title: "2023-04-03" +pcx_content_type: release-notes sidebar: order: 28032 - --- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...cedf44f8HTTP requests with non-standard HTTP methods.logblock
Rule IDDescriptionPrevious ActionNew ActionNotes
...cedf44f8HTTP requests with non-standard HTTP methods.logblock
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-04-17.mdx b/src/content/docs/ddos-protection/change-log/http/2023-04-17.mdx index 0a17660c6f84bc7..27b171d6fd3f099 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-04-17.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-04-17.mdx @@ -1,9 +1,8 @@ --- -title: '2023-04-17' -pcx_content_type: changelog +title: "2023-04-17" +pcx_content_type: release-notes sidebar: order: 28018 - --- Previously, only a subset of rules were exposed publicly. In rare situations, these rules can cause false positives. When this happens, you can customize their behavior using overrides. diff --git a/src/content/docs/ddos-protection/change-log/http/2023-04-21-emergency.mdx b/src/content/docs/ddos-protection/change-log/http/2023-04-21-emergency.mdx index d62ce7533eea89d..3a221ef33adc2d2 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-04-21-emergency.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-04-21-emergency.mdx @@ -1,38 +1,34 @@ --- -title: '2023-04-21 - Emergency' -pcx_content_type: changelog +title: "2023-04-21 - Emergency" +pcx_content_type: release-notes sidebar: order: 28014 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...d2f294d7HTTP requests trying to impersonate browsers.ddos_dynamicddos_dynamicRemove some rare false positives.
...d3fb9259HTTP requests from known botnet (signature #51).N/Ablock
Rule IDDescriptionPrevious ActionNew ActionNotes
...d2f294d7HTTP requests trying to impersonate browsers.ddos_dynamicddos_dynamicRemove some rare false positives.
...d3fb9259HTTP requests from known botnet (signature #51).N/Ablock
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-04-27-emergency.mdx b/src/content/docs/ddos-protection/change-log/http/2023-04-27-emergency.mdx index 80ee884f1182395..7ea7bc7a400d086 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-04-27-emergency.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-04-27-emergency.mdx @@ -1,31 +1,27 @@ --- -title: '2023-04-27 - Emergency' -pcx_content_type: changelog +title: "2023-04-27 - Emergency" +pcx_content_type: release-notes sidebar: order: 28008 - --- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...f2494447HTTP requests attempting to bypass the cache.N/Addos_dynamic
Rule IDDescriptionPrevious ActionNew ActionNotes
...f2494447HTTP requests attempting to bypass the cache.N/Addos_dynamic
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-05-02-emergency.mdx b/src/content/docs/ddos-protection/change-log/http/2023-05-02-emergency.mdx index aec5ede05b23591..fc872811a64ec32 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-05-02-emergency.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-05-02-emergency.mdx @@ -1,31 +1,27 @@ --- -title: '2023-05-02 - Emergency' -pcx_content_type: changelog +title: "2023-05-02 - Emergency" +pcx_content_type: release-notes sidebar: order: 28003 - --- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...d2f294d7HTTP requests trying to impersonate browsers.ddos_dynamicddos_dynamicImprove our capability to efficiently identify some attacks.
Rule IDDescriptionPrevious ActionNew ActionNotes
...d2f294d7HTTP requests trying to impersonate browsers.ddos_dynamicddos_dynamicImprove our capability to efficiently identify some attacks.
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-05-15-emergency.mdx b/src/content/docs/ddos-protection/change-log/http/2023-05-15-emergency.mdx index b89ffef80730184..a8add9da793326c 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-05-15-emergency.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-05-15-emergency.mdx @@ -1,66 +1,66 @@ --- -title: '2023-05-15 - Emergency' -pcx_content_type: changelog +title: "2023-05-15 - Emergency" +pcx_content_type: release-notes sidebar: order: 27990 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...1fc1e601HTTP requests with unusual HTTP headers or URI path (signature #31).N/Ablock
...863134d5HTTP requests from known bad user agents.blockblockWiden detection scope.
...bb3cefd0HTTP requests with unusual HTTP headers or URI path (signature #53).N/Ablock
...d2f294d7HTTP requests trying to impersonate browsers.ddos_dynamicddos_dynamicExtend the rule to catch attacks across multiple subdomains.
...d2f294d7HTTP requests trying to impersonate browsers.ddos_dynamicddos_dynamicExpand the filter to catch more attacks.
...f2494447HTTP requests attempting to bypass the cache.ddos_dynamicddos_dynamicMake rule more accurate when blocking attacks.
Rule IDDescriptionPrevious ActionNew ActionNotes
...1fc1e601 + HTTP requests with unusual HTTP headers or URI path (signature #31). + N/Ablock
...863134d5HTTP requests from known bad user agents.blockblockWiden detection scope.
...bb3cefd0 + HTTP requests with unusual HTTP headers or URI path (signature #53). + N/Ablock
...d2f294d7HTTP requests trying to impersonate browsers.ddos_dynamicddos_dynamicExtend the rule to catch attacks across multiple subdomains.
...d2f294d7HTTP requests trying to impersonate browsers.ddos_dynamicddos_dynamicExpand the filter to catch more attacks.
...f2494447HTTP requests attempting to bypass the cache.ddos_dynamicddos_dynamicMake rule more accurate when blocking attacks.
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-05-16-emergency.mdx b/src/content/docs/ddos-protection/change-log/http/2023-05-16-emergency.mdx index 13c4a2e839ce24b..2a0c2f96f507fe8 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-05-16-emergency.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-05-16-emergency.mdx @@ -1,38 +1,36 @@ --- -title: '2023-05-16 - Emergency' -pcx_content_type: changelog +title: "2023-05-16 - Emergency" +pcx_content_type: release-notes sidebar: order: 27989 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...311e414eHTTP requests with unusual HTTP headers or URI path (signature #33).N/Addos_dynamicStop attacks from an active botnet.
...ad16b3fbHTTP requests from known botnet (signature #54).N/Ablock
Rule IDDescriptionPrevious ActionNew ActionNotes
...311e414e + HTTP requests with unusual HTTP headers or URI path (signature #33). + N/Addos_dynamicStop attacks from an active botnet.
...ad16b3fbHTTP requests from known botnet (signature #54).N/Ablock
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-05-22.mdx b/src/content/docs/ddos-protection/change-log/http/2023-05-22.mdx index d950cd6cd6a12c0..88600abfa5fa8e0 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-05-22.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-05-22.mdx @@ -1,38 +1,36 @@ --- -title: '2023-05-22' -pcx_content_type: changelog +title: "2023-05-22" +pcx_content_type: release-notes sidebar: order: 27983 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...4a95ba67HTTP requests with unusual HTTP headers or URI path (signature #32).loglogImprove the rule accuracy.
...fd5045ffHTTP requests from known botnet (signature #55).N/Ablock
Rule IDDescriptionPrevious ActionNew ActionNotes
...4a95ba67 + HTTP requests with unusual HTTP headers or URI path (signature #32). + loglogImprove the rule accuracy.
...fd5045ffHTTP requests from known botnet (signature #55).N/Ablock
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-05-26.mdx b/src/content/docs/ddos-protection/change-log/http/2023-05-26.mdx index b4597a7d3727127..df55cb4b04b829a 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-05-26.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-05-26.mdx @@ -1,31 +1,29 @@ --- -title: '2023-05-26' -pcx_content_type: changelog +title: "2023-05-26" +pcx_content_type: release-notes sidebar: order: 27979 - --- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...4a95ba67HTTP requests with unusual HTTP headers or URI path (signature #32).logddos_dynamic
Rule IDDescriptionPrevious ActionNew ActionNotes
...4a95ba67 + HTTP requests with unusual HTTP headers or URI path (signature #32). + logddos_dynamic
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-06-05-emergency.mdx b/src/content/docs/ddos-protection/change-log/http/2023-06-05-emergency.mdx index 9f1cb963f67c829..6c044d95f9c9f68 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-06-05-emergency.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-06-05-emergency.mdx @@ -1,31 +1,29 @@ --- -title: '2023-06-05 - Emergency' -pcx_content_type: changelog +title: "2023-06-05 - Emergency" +pcx_content_type: release-notes sidebar: order: 27969 - --- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...6831bff1HTTP requests with unusual HTTP headers or URI path (signature #35).N/AblockStop attacks from an active botnet.
Rule IDDescriptionPrevious ActionNew ActionNotes
...6831bff1 + HTTP requests with unusual HTTP headers or URI path (signature #35). + N/AblockStop attacks from an active botnet.
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-06-06.mdx b/src/content/docs/ddos-protection/change-log/http/2023-06-06.mdx index a56f91e143af4e7..1c7e4ddb955c6ca 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-06-06.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-06-06.mdx @@ -1,38 +1,38 @@ --- -title: '2023-06-06' -pcx_content_type: changelog +title: "2023-06-06" +pcx_content_type: release-notes sidebar: order: 27968 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...6831bff1HTTP requests with unusual HTTP headers or URI path (signature #35).N/Ablock
...72bb7bfdHTTP requests with unusual HTTP headers or URI path (signature #34).N/Ablock
Rule IDDescriptionPrevious ActionNew ActionNotes
...6831bff1 + HTTP requests with unusual HTTP headers or URI path (signature #35). + N/Ablock
...72bb7bfd + HTTP requests with unusual HTTP headers or URI path (signature #34). + N/Ablock
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-06-14-emergency.mdx b/src/content/docs/ddos-protection/change-log/http/2023-06-14-emergency.mdx index 55752ca13a07f91..35526bca6614e5b 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-06-14-emergency.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-06-14-emergency.mdx @@ -1,31 +1,27 @@ --- -title: '2023-06-14 - Emergency' -pcx_content_type: changelog +title: "2023-06-14 - Emergency" +pcx_content_type: release-notes sidebar: order: 27960 - --- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...6fa59d23HTTP requests that are very likely coming from bots.ddos_dynamicddos_dynamicExpand the filter to match more attacks.
Rule IDDescriptionPrevious ActionNew ActionNotes
...6fa59d23HTTP requests that are very likely coming from bots.ddos_dynamicddos_dynamicExpand the filter to match more attacks.
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-06-16.mdx b/src/content/docs/ddos-protection/change-log/http/2023-06-16.mdx index 7b85882ed1f8e51..d43d5f81caa23ae 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-06-16.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-06-16.mdx @@ -1,31 +1,27 @@ --- -title: '2023-06-16' -pcx_content_type: changelog +title: "2023-06-16" +pcx_content_type: release-notes sidebar: order: 27958 - --- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...21e99dcfHTTP requests from known botnet (signature #58).N/Ablock
Rule IDDescriptionPrevious ActionNew ActionNotes
...21e99dcfHTTP requests from known botnet (signature #58).N/Ablock
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-06-19.mdx b/src/content/docs/ddos-protection/change-log/http/2023-06-19.mdx index 95722a75e334afa..e72da8df0c5f859 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-06-19.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-06-19.mdx @@ -1,31 +1,27 @@ --- -title: '2023-06-19' -pcx_content_type: changelog +title: "2023-06-19" +pcx_content_type: release-notes sidebar: order: 27955 - --- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...de244156HTTP requests from known botnet (signature #59).N/Ablock
Rule IDDescriptionPrevious ActionNew ActionNotes
...de244156HTTP requests from known botnet (signature #59).N/Ablock
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-06-28.mdx b/src/content/docs/ddos-protection/change-log/http/2023-06-28.mdx index 3204b48e56ad100..1bbc21539df5ad5 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-06-28.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-06-28.mdx @@ -1,38 +1,37 @@ --- -title: '2023-06-28' -pcx_content_type: changelog +title: "2023-06-28" +pcx_content_type: release-notes sidebar: order: 27946 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...95f78bf0HTTP requests trying to impersonate browsers (pattern #2).logddos_dynamic
...c86adf25HTTP requests with unusual HTTP headers or URI path (signature #38). Only for zones on PRO plan and above.logddos_dynamic
Rule IDDescriptionPrevious ActionNew ActionNotes
...95f78bf0HTTP requests trying to impersonate browsers (pattern #2).logddos_dynamic
...c86adf25 + HTTP requests with unusual HTTP headers or URI path (signature #38). + Only for zones on PRO plan and above. + logddos_dynamic
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-07-06.mdx b/src/content/docs/ddos-protection/change-log/http/2023-07-06.mdx index 125e04dc38331cd..591869680d84fdd 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-07-06.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-07-06.mdx @@ -1,31 +1,27 @@ --- -title: '2023-07-06' -pcx_content_type: changelog +title: "2023-07-06" +pcx_content_type: release-notes sidebar: order: 27938 - --- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...22807318HTTP requests from known botnets.logmanaged_challenge
Rule IDDescriptionPrevious ActionNew ActionNotes
...22807318HTTP requests from known botnets.logmanaged_challenge
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-07-07.mdx b/src/content/docs/ddos-protection/change-log/http/2023-07-07.mdx index 640643180a40f97..1476af394f208cd 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-07-07.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-07-07.mdx @@ -1,38 +1,34 @@ --- -title: '2023-07-07' -pcx_content_type: changelog +title: "2023-07-07" +pcx_content_type: release-notes sidebar: order: 27937 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...22807318HTTP requests from known botnets.logmanaged_challenge
...83dc0d58HTTP requests from known botnet (signature #60).N/Ablock
Rule IDDescriptionPrevious ActionNew ActionNotes
...22807318HTTP requests from known botnets.logmanaged_challenge
...83dc0d58HTTP requests from known botnet (signature #60).N/Ablock
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-07-12-emergency.mdx b/src/content/docs/ddos-protection/change-log/http/2023-07-12-emergency.mdx index 215975364233826..197eb5af55dd8cf 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-07-12-emergency.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-07-12-emergency.mdx @@ -1,31 +1,29 @@ --- -title: '2023-07-12 - Emergency' -pcx_content_type: changelog +title: "2023-07-12 - Emergency" +pcx_content_type: release-notes sidebar: order: 27932 - --- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...0d5872e3HTTP requests with unusual HTTP headers or URI path (signature #40).N/Addos_dynamic
Rule IDDescriptionPrevious ActionNew ActionNotes
...0d5872e3 + HTTP requests with unusual HTTP headers or URI path (signature #40). + N/Addos_dynamic
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-07-17.mdx b/src/content/docs/ddos-protection/change-log/http/2023-07-17.mdx index 3b483b8b104a579..ebb8a3f85b3cf8b 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-07-17.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-07-17.mdx @@ -1,31 +1,29 @@ --- -title: '2023-07-17' -pcx_content_type: changelog +title: "2023-07-17" +pcx_content_type: release-notes sidebar: order: 27927 - --- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...6831bff1HTTP requests with unusual HTTP headers or URI path (signature #35).ddos_dynamicblockImprove the filter to catch more attacks.
Rule IDDescriptionPrevious ActionNew ActionNotes
...6831bff1 + HTTP requests with unusual HTTP headers or URI path (signature #35). + ddos_dynamicblockImprove the filter to catch more attacks.
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-07-31.mdx b/src/content/docs/ddos-protection/change-log/http/2023-07-31.mdx index f368c1d3ec9d65c..196652163298867 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-07-31.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-07-31.mdx @@ -1,46 +1,44 @@ --- -title: '2023-07-31' -pcx_content_type: changelog +title: "2023-07-31" +pcx_content_type: release-notes sidebar: order: 27913 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...9aec0913HTTP requests from known botnet (signature #52).blockblockExpose existing read-only filter publicly as it might cause false positives -in rare cases.
...c5f479f0HTTP requests from known botnet (signature #62).N/Ablock
...d0e36f9cHTTP requests from known botnet (signature #63).N/Ablock
Rule IDDescriptionPrevious ActionNew ActionNotes
...9aec0913HTTP requests from known botnet (signature #52).blockblock + Expose existing read-only filter publicly as it might cause false + positives in rare cases. +
...c5f479f0HTTP requests from known botnet (signature #62).N/Ablock
...d0e36f9cHTTP requests from known botnet (signature #63).N/Ablock
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-08-11-emergency.mdx b/src/content/docs/ddos-protection/change-log/http/2023-08-11-emergency.mdx index 67424fb06886af6..09302755d313c3e 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-08-11-emergency.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-08-11-emergency.mdx @@ -1,59 +1,57 @@ --- -title: '2023-08-11 - Emergency' -pcx_content_type: changelog +title: "2023-08-11 - Emergency" +pcx_content_type: release-notes sidebar: order: 27902 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...1de9523eHTTP requests with unusual HTTP headers or URI path (signature #41).N/Ablock
...22807318HTTP requests from known botnets.managed_challengeddos_dynamic
...aa03a345HTTP requests from known botnet (signature #68).N/Ablock
...efca86ebHTTP requests from known botnet (signature #66).N/Ablock
...f93fb5d6HTTP requests from known botnet (signature #67).N/Ablock
Rule IDDescriptionPrevious ActionNew ActionNotes
...1de9523e + HTTP requests with unusual HTTP headers or URI path (signature #41). + N/Ablock
...22807318HTTP requests from known botnets.managed_challengeddos_dynamic
...aa03a345HTTP requests from known botnet (signature #68).N/Ablock
...efca86ebHTTP requests from known botnet (signature #66).N/Ablock
...f93fb5d6HTTP requests from known botnet (signature #67).N/Ablock
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-08-14.mdx b/src/content/docs/ddos-protection/change-log/http/2023-08-14.mdx index 25ba308aa0557a9..fdfcdde6518d04d 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-08-14.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-08-14.mdx @@ -1,38 +1,34 @@ --- -title: '2023-08-14' -pcx_content_type: changelog +title: "2023-08-14" +pcx_content_type: release-notes sidebar: order: 27899 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...22807318HTTP requests from known botnets.ddos_dynamicmanaged_challengeExpand the filter to catch more attacks.
...d2f294d7HTTP requests trying to impersonate browsers.ddos_dynamicddos_dynamicExpand the filter to catch more attacks.
Rule IDDescriptionPrevious ActionNew ActionNotes
...22807318HTTP requests from known botnets.ddos_dynamicmanaged_challengeExpand the filter to catch more attacks.
...d2f294d7HTTP requests trying to impersonate browsers.ddos_dynamicddos_dynamicExpand the filter to catch more attacks.
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-08-16-emergency.mdx b/src/content/docs/ddos-protection/change-log/http/2023-08-16-emergency.mdx index 9b64485d58b0096..3de588b88ae895f 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-08-16-emergency.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-08-16-emergency.mdx @@ -1,31 +1,27 @@ --- -title: '2023-08-16 - Emergency' -pcx_content_type: changelog +title: "2023-08-16 - Emergency" +pcx_content_type: release-notes sidebar: order: 27897 - --- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...9721fd20HTTP requests trying to impersonate browsers (pattern #3).N/Addos_dynamic
Rule IDDescriptionPrevious ActionNew ActionNotes
...9721fd20HTTP requests trying to impersonate browsers (pattern #3).N/Addos_dynamic
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-08-25-emergency.mdx b/src/content/docs/ddos-protection/change-log/http/2023-08-25-emergency.mdx index 5a35bcb1ed6d124..33b3610aaebb396 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-08-25-emergency.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-08-25-emergency.mdx @@ -1,46 +1,48 @@ --- -title: '2023-08-25 - Emergency' -pcx_content_type: changelog +title: "2023-08-25 - Emergency" +pcx_content_type: release-notes sidebar: order: 27888 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...20c5afb5HTTP requests with unusual HTTP headers or URI path (signature #36).blockblockThis rule was previously readonly, but can cause false positives in rare -cases. It is now possible to override it.
...cb26e2e2HTTP requests from known botnet (signature #69).N/Ablock
...ebff5ef1HTTP requests with unusual HTTP headers or URI path (signature #43).N/Ablock
Rule IDDescriptionPrevious ActionNew ActionNotes
...20c5afb5 + HTTP requests with unusual HTTP headers or URI path (signature #36). + blockblock + This rule was previously readonly, but can cause false positives in rare + cases. It is now possible to override it. +
...cb26e2e2HTTP requests from known botnet (signature #69).N/Ablock
...ebff5ef1 + HTTP requests with unusual HTTP headers or URI path (signature #43). + N/Ablock
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-08-29-emergency.mdx b/src/content/docs/ddos-protection/change-log/http/2023-08-29-emergency.mdx index 13e9a67e2bf149a..944af45b6a1e96d 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-08-29-emergency.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-08-29-emergency.mdx @@ -1,38 +1,36 @@ --- -title: '2023-08-29 - Emergency' -pcx_content_type: changelog +title: "2023-08-29 - Emergency" +pcx_content_type: release-notes sidebar: order: 27884 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...22807318HTTP requests from known botnets.managed_challengeddos_dynamic
...3fe55678HTTP requests with unusual HTTP headers or URI path (signature #44).N/Ablock
Rule IDDescriptionPrevious ActionNew ActionNotes
...22807318HTTP requests from known botnets.managed_challengeddos_dynamic
...3fe55678 + HTTP requests with unusual HTTP headers or URI path (signature #44). + N/Ablock
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-08-30-emergency.mdx b/src/content/docs/ddos-protection/change-log/http/2023-08-30-emergency.mdx index 0314520b02a6c52..fc1fb27a9d7d940 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-08-30-emergency.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-08-30-emergency.mdx @@ -1,38 +1,36 @@ --- -title: '2023-08-30 - Emergency' -pcx_content_type: changelog +title: "2023-08-30 - Emergency" +pcx_content_type: release-notes sidebar: order: 27883 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...22807318HTTP requests from known botnets.ddos_dynamicddos_dynamic
...46082508HTTP requests with unusual HTTP headers or URI path (signature #45).N/Ablock
Rule IDDescriptionPrevious ActionNew ActionNotes
...22807318HTTP requests from known botnets.ddos_dynamicddos_dynamic
...46082508 + HTTP requests with unusual HTTP headers or URI path (signature #45). + N/Ablock
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-09-05-emergency.mdx b/src/content/docs/ddos-protection/change-log/http/2023-09-05-emergency.mdx index 674c5efaf6a6393..1ca90844def67fb 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-09-05-emergency.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-09-05-emergency.mdx @@ -1,45 +1,43 @@ --- -title: '2023-09-05 - Emergency' -pcx_content_type: changelog +title: "2023-09-05 - Emergency" +pcx_content_type: release-notes sidebar: order: 27877 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...22807318HTTP requests from known botnets.ddos_dynamicddos_dynamicExpand filter to catch attacks more comprehensively.
...4346874dHTTP requests with unusual HTTP headers or URI path (signature #46).N/Ablock
...6fe7a312HTTP requests from known botnet (signature #70).N/AblockExpand filter to catch more attacks. It is now configurable.
Rule IDDescriptionPrevious ActionNew ActionNotes
...22807318HTTP requests from known botnets.ddos_dynamicddos_dynamicExpand filter to catch attacks more comprehensively.
...4346874d + HTTP requests with unusual HTTP headers or URI path (signature #46). + N/Ablock
...6fe7a312HTTP requests from known botnet (signature #70).N/AblockExpand filter to catch more attacks. It is now configurable.
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-09-21-emergency.mdx b/src/content/docs/ddos-protection/change-log/http/2023-09-21-emergency.mdx index 452a434ab8851bc..15f4992e018760e 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-09-21-emergency.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-09-21-emergency.mdx @@ -1,45 +1,46 @@ --- -title: '2023-09-21 - Emergency' -pcx_content_type: changelog +title: "2023-09-21 - Emergency" +pcx_content_type: release-notes sidebar: order: 27861 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...1d73128dHTTP requests from known botnet (signature #56).blockblockMake the rule customizable as it might cause false positive in rare cases.
...4a95ba67HTTP requests with unusual HTTP headers or URI path (signature #32).ddos_dynamicddos_dynamicExpand the scope of the rule to catch more attacks.
...6fe7a312HTTP requests from known botnet (signature #70).blockblockUpdate the rule to remove some rare false positives.
Rule IDDescriptionPrevious ActionNew ActionNotes
...1d73128dHTTP requests from known botnet (signature #56).blockblock + Make the rule customizable as it might cause false positive in rare + cases. +
...4a95ba67 + HTTP requests with unusual HTTP headers or URI path (signature #32). + ddos_dynamicddos_dynamicExpand the scope of the rule to catch more attacks.
...6fe7a312HTTP requests from known botnet (signature #70).blockblockUpdate the rule to remove some rare false positives.
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-09-24-emergency.mdx b/src/content/docs/ddos-protection/change-log/http/2023-09-24-emergency.mdx index 70344b6d7cfdced..6b5364dff1b0717 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-09-24-emergency.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-09-24-emergency.mdx @@ -1,45 +1,45 @@ --- -title: '2023-09-24 - Emergency' -pcx_content_type: changelog +title: "2023-09-24 - Emergency" +pcx_content_type: release-notes sidebar: order: 27858 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...0fb54442HTTP requests with unusual HTTP headers or URI path (signature #49).N/Ablock
...3dd5f188HTTP requests from known botnet (signature #71).N/Ablock
...97003a74HTTP requests with unusual HTTP headers or URI path (signature #17).blockblockExpand rule to catch more attacks.
Rule IDDescriptionPrevious ActionNew ActionNotes
...0fb54442 + HTTP requests with unusual HTTP headers or URI path (signature #49). + N/Ablock
...3dd5f188HTTP requests from known botnet (signature #71).N/Ablock
...97003a74 + HTTP requests with unusual HTTP headers or URI path (signature #17). + blockblockExpand rule to catch more attacks.
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-10-09-emergency.mdx b/src/content/docs/ddos-protection/change-log/http/2023-10-09-emergency.mdx index f4a5215ff9ddfc4..3bba7de6f315f28 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-10-09-emergency.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-10-09-emergency.mdx @@ -1,59 +1,61 @@ --- -title: '2023-10-09 - Emergency' -pcx_content_type: changelog +title: "2023-10-09 - Emergency" +pcx_content_type: release-notes sidebar: order: 27843 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...02bbdce1HTTP requests with unusual HTTP headers or URI path (signature #47).N/Ablock
...493cb8a8HTTP requests with unusual HTTP headers or URI path (signature #52).N/Ablock
...5c344623HTTP requests from uncommon clientsN/Ablock
...6363bb1bHTTP requests with unusual HTTP headers or URI path (signature #48).N/Ablock
...c1fbd175HTTP requests trying to impersonate browsers (pattern #4).N/Ablock
Rule IDDescriptionPrevious ActionNew ActionNotes
...02bbdce1 + HTTP requests with unusual HTTP headers or URI path (signature #47). + N/Ablock
...493cb8a8 + HTTP requests with unusual HTTP headers or URI path (signature #52). + N/Ablock
...5c344623HTTP requests from uncommon clientsN/Ablock
...6363bb1b + HTTP requests with unusual HTTP headers or URI path (signature #48). + N/Ablock
...c1fbd175HTTP requests trying to impersonate browsers (pattern #4).N/Ablock
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-10-11.mdx b/src/content/docs/ddos-protection/change-log/http/2023-10-11.mdx index 81756451bc3a175..0279772a9ab0041 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-10-11.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-10-11.mdx @@ -1,32 +1,32 @@ --- -title: '2023-10-11' -pcx_content_type: changelog +title: "2023-10-11" +pcx_content_type: release-notes sidebar: order: 27841 - --- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...35675e08HTTP requests with unusual HTTP headers or URI path (signature #24).blockblockThis rule can cause rare false positives with custom apps sending invalid -headers.
Rule IDDescriptionPrevious ActionNew ActionNotes
...35675e08 + HTTP requests with unusual HTTP headers or URI path (signature #24). + blockblock + This rule can cause rare false positives with custom apps sending + invalid headers. +
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-10-19.mdx b/src/content/docs/ddos-protection/change-log/http/2023-10-19.mdx index baae4e03d78b1f9..c24e2bc509babb0 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-10-19.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-10-19.mdx @@ -1,31 +1,31 @@ --- -title: '2023-10-19' -pcx_content_type: changelog +title: "2023-10-19" +pcx_content_type: release-notes sidebar: order: 27833 - --- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...61bc58d5HTTP requests with unusual HTTP headers or URI path (signature #55).ddos_dynamicddos_dynamicRequests will be challenged by default, larger attacks are blocked.
Rule IDDescriptionPrevious ActionNew ActionNotes
...61bc58d5 + HTTP requests with unusual HTTP headers or URI path (signature #55). + ddos_dynamicddos_dynamic + Requests will be challenged by default, larger attacks are blocked. +
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-11-10-emergency.mdx b/src/content/docs/ddos-protection/change-log/http/2023-11-10-emergency.mdx index d6681652866c74b..a94178739a51058 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-11-10-emergency.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-11-10-emergency.mdx @@ -1,52 +1,54 @@ --- -title: '2023-11-10 - Emergency' -pcx_content_type: changelog +title: "2023-11-10 - Emergency" +pcx_content_type: release-notes sidebar: order: 27811 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...7d0f1e5fHTTP requests from known botnet (signature #72).N/Ablock
...94547a95HTTP requests with unusual HTTP headers or URI path (signature #59).N/Addos_dynamic
...e269dfd6HTTP requests with unusual HTTP headers or URI path (signature #56).logblockEnable filter early to mitigate widespread impact.
...f35a42a0HTTP requests with unusual HTTP headers or URI path (signature #57).logblockEnable filter early to mitigate widespread impact.
Rule IDDescriptionPrevious ActionNew ActionNotes
...7d0f1e5fHTTP requests from known botnet (signature #72).N/Ablock
...94547a95 + HTTP requests with unusual HTTP headers or URI path (signature #59). + N/Addos_dynamic
...e269dfd6 + HTTP requests with unusual HTTP headers or URI path (signature #56). + logblockEnable filter early to mitigate widespread impact.
...f35a42a0 + HTTP requests with unusual HTTP headers or URI path (signature #57). + logblockEnable filter early to mitigate widespread impact.
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-11-13-emergency.mdx b/src/content/docs/ddos-protection/change-log/http/2023-11-13-emergency.mdx index 3a1380718b825f5..a72c547c484ec17 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-11-13-emergency.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-11-13-emergency.mdx @@ -1,52 +1,48 @@ --- -title: '2023-11-13 - Emergency' -pcx_content_type: changelog +title: "2023-11-13 - Emergency" +pcx_content_type: release-notes sidebar: order: 27808 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...22807318HTTP requests from known botnets.ddos_dynamicddos_dynamicImprove this filter to catch more attacks.
...6fe7a312HTTP requests from known botnet (signature #70).blockblock
...7c7a2f25HTTP requests from known botnet (signature #74).N/Ablock
...d2f294d7HTTP requests trying to impersonate browsers.ddos_dynamicddos_dynamic
Rule IDDescriptionPrevious ActionNew ActionNotes
...22807318HTTP requests from known botnets.ddos_dynamicddos_dynamicImprove this filter to catch more attacks.
...6fe7a312HTTP requests from known botnet (signature #70).blockblock
...7c7a2f25HTTP requests from known botnet (signature #74).N/Ablock
...d2f294d7HTTP requests trying to impersonate browsers.ddos_dynamicddos_dynamic
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-11-22.mdx b/src/content/docs/ddos-protection/change-log/http/2023-11-22.mdx index 113c175fd874f57..aaafdec66363918 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-11-22.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-11-22.mdx @@ -1,31 +1,29 @@ --- -title: '2023-11-22' -pcx_content_type: changelog +title: "2023-11-22" +pcx_content_type: release-notes sidebar: order: 27799 - --- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...254da96aHTTP requests with unusual HTTP headers or URI path (signature #58).logblock
Rule IDDescriptionPrevious ActionNew ActionNotes
...254da96a + HTTP requests with unusual HTTP headers or URI path (signature #58). + logblock
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-11-29.mdx b/src/content/docs/ddos-protection/change-log/http/2023-11-29.mdx index 39ee2258076bb29..bff4b191b67c1f9 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-11-29.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-11-29.mdx @@ -1,38 +1,36 @@ --- -title: '2023-11-29' -pcx_content_type: changelog +title: "2023-11-29" +pcx_content_type: release-notes sidebar: order: 27790 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...8ed59b32HTTP requests with unusual HTTP headers or URI path (signature #61).ddos_dynamicddos_dynamicRename rule to avoid confusion.
...61e8d513Global L7 WordPress attack mitigations (Deprecated)ddos_dynamicddos_dynamicMark rule as deprecated.
Rule IDDescriptionPrevious ActionNew ActionNotes
...8ed59b32 + HTTP requests with unusual HTTP headers or URI path (signature #61). + ddos_dynamicddos_dynamicRename rule to avoid confusion.
...61e8d513Global L7 WordPress attack mitigations (Deprecated)ddos_dynamicddos_dynamicMark rule as deprecated.
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-12-08-emergency.mdx b/src/content/docs/ddos-protection/change-log/http/2023-12-08-emergency.mdx index b9a3253464fd827..f712db10765385c 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-12-08-emergency.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-12-08-emergency.mdx @@ -1,38 +1,36 @@ --- -title: '2023-12-08 - Emergency' -pcx_content_type: changelog +title: "2023-12-08 - Emergency" +pcx_content_type: release-notes sidebar: order: 27783 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...6fe7a312HTTP requests from known botnet (signature #70).blockblockUpdated the rule to avoid false positives in some rare circumstances.
...e7a37252HTTP requests from known botnet (signature #75).N/Ablock
Rule IDDescriptionPrevious ActionNew ActionNotes
...6fe7a312HTTP requests from known botnet (signature #70).blockblock + Updated the rule to avoid false positives in some rare circumstances. +
...e7a37252HTTP requests from known botnet (signature #75).N/Ablock
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-12-14-emergency.mdx b/src/content/docs/ddos-protection/change-log/http/2023-12-14-emergency.mdx index 23a4d0f7970482e..b4e9601249eb41a 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-12-14-emergency.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-12-14-emergency.mdx @@ -1,31 +1,27 @@ --- -title: '2023-12-14 - Emergency' -pcx_content_type: changelog +title: "2023-12-14 - Emergency" +pcx_content_type: release-notes sidebar: order: 27777 - --- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...6fe7a312HTTP requests from known botnet (signature #70).blockblockTweak the rule to avoid false positives in some rare cases.
Rule IDDescriptionPrevious ActionNew ActionNotes
...6fe7a312HTTP requests from known botnet (signature #70).blockblockTweak the rule to avoid false positives in some rare cases.
- diff --git a/src/content/docs/ddos-protection/change-log/http/2023-12-19-emergency.mdx b/src/content/docs/ddos-protection/change-log/http/2023-12-19-emergency.mdx index 1a02499e496e07c..a84aaadfff1115a 100644 --- a/src/content/docs/ddos-protection/change-log/http/2023-12-19-emergency.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2023-12-19-emergency.mdx @@ -1,45 +1,43 @@ --- -title: '2023-12-19 - Emergency' -pcx_content_type: changelog +title: "2023-12-19 - Emergency" +pcx_content_type: release-notes sidebar: order: 27772 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...1fc1e601HTTP requests with unusual HTTP headers or URI path (signature #31).blockblockAdd more characteristics to the unusual HTTP headers or URI path.
...22807318HTTP requests from known botnets.logddos_dynamicExtend the rule to catch more attacks.
...d2f294d7HTTP requests trying to impersonate browsers.ddos_dynamicddos_dynamicChange the rule to catch more attacks.
Rule IDDescriptionPrevious ActionNew ActionNotes
...1fc1e601 + HTTP requests with unusual HTTP headers or URI path (signature #31). + blockblockAdd more characteristics to the unusual HTTP headers or URI path.
...22807318HTTP requests from known botnets.logddos_dynamicExtend the rule to catch more attacks.
...d2f294d7HTTP requests trying to impersonate browsers.ddos_dynamicddos_dynamicChange the rule to catch more attacks.
- diff --git a/src/content/docs/ddos-protection/change-log/http/2024-01-05.mdx b/src/content/docs/ddos-protection/change-log/http/2024-01-05.mdx index dc6a8fc9e1a3d8f..d980f3b53fb01d8 100644 --- a/src/content/docs/ddos-protection/change-log/http/2024-01-05.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2024-01-05.mdx @@ -1,59 +1,57 @@ --- -title: '2024-01-05' -pcx_content_type: changelog +title: "2024-01-05" +pcx_content_type: release-notes sidebar: order: 27755 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...2de94fb2HTTP requests with unusual HTTP headers or URI path (signature #3).blockblockFine-tune the characteristics of the unusual requests.
...177059f1HTTP requests from known botnet (signature #31).blockN/ARemoved due to false positives.
...6fe7a312HTTP requests from known botnet (signature #70).blockN/ARemoved due to false positives.
...82c0ed5fHTTP requests from known botnet (signature #77).N/Ablock
...e4f3ea4dHTTP requests from known botnet (signature #76).N/Ablock
Rule IDDescriptionPrevious ActionNew ActionNotes
...2de94fb2 + HTTP requests with unusual HTTP headers or URI path (signature #3). + blockblockFine-tune the characteristics of the unusual requests.
...177059f1HTTP requests from known botnet (signature #31).blockN/ARemoved due to false positives.
...6fe7a312HTTP requests from known botnet (signature #70).blockN/ARemoved due to false positives.
...82c0ed5fHTTP requests from known botnet (signature #77).N/Ablock
...e4f3ea4dHTTP requests from known botnet (signature #76).N/Ablock
- diff --git a/src/content/docs/ddos-protection/change-log/http/2024-01-23.mdx b/src/content/docs/ddos-protection/change-log/http/2024-01-23.mdx index 686dac420f2e23e..9ad85b9fd56619b 100644 --- a/src/content/docs/ddos-protection/change-log/http/2024-01-23.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2024-01-23.mdx @@ -1,45 +1,45 @@ --- -title: '2024-01-23' -pcx_content_type: changelog +title: "2024-01-23" +pcx_content_type: release-notes sidebar: order: 27737 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...1fc1e601HTTP requests with unusual HTTP headers or URI path (signature #31).blockblockAdd more characteristics to the unusual HTTP headers or URI path.
...2de94fb2HTTP requests with unusual HTTP headers or URI path (signature #3).ddos_dynamicblockExpand rule scope to catch more attacks.
...2f8d9a4fHTTP requests from known botnet (signature #78).N/Ablock
Rule IDDescriptionPrevious ActionNew ActionNotes
...1fc1e601 + HTTP requests with unusual HTTP headers or URI path (signature #31). + blockblockAdd more characteristics to the unusual HTTP headers or URI path.
...2de94fb2 + HTTP requests with unusual HTTP headers or URI path (signature #3). + ddos_dynamicblockExpand rule scope to catch more attacks.
...2f8d9a4fHTTP requests from known botnet (signature #78).N/Ablock
- diff --git a/src/content/docs/ddos-protection/change-log/http/2024-01-25.mdx b/src/content/docs/ddos-protection/change-log/http/2024-01-25.mdx index 4b0e7f3d3b6d409..341b59fba3b49a7 100644 --- a/src/content/docs/ddos-protection/change-log/http/2024-01-25.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2024-01-25.mdx @@ -1,31 +1,29 @@ --- -title: '2024-01-25' -pcx_content_type: changelog +title: "2024-01-25" +pcx_content_type: release-notes sidebar: order: 27735 - --- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...1fc1e601HTTP requests with unusual HTTP headers or URI path (signature #31).blockblockAdd more characteristics to the unusual HTTP headers or URI path.
Rule IDDescriptionPrevious ActionNew ActionNotes
...1fc1e601 + HTTP requests with unusual HTTP headers or URI path (signature #31). + blockblockAdd more characteristics to the unusual HTTP headers or URI path.
- diff --git a/src/content/docs/ddos-protection/change-log/http/2024-01-26-emergency.mdx b/src/content/docs/ddos-protection/change-log/http/2024-01-26-emergency.mdx index 8cc2e2be274a2a6..1358a0c9d289d17 100644 --- a/src/content/docs/ddos-protection/change-log/http/2024-01-26-emergency.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2024-01-26-emergency.mdx @@ -1,38 +1,38 @@ --- -title: '2024-01-26 - Emergency' -pcx_content_type: changelog +title: "2024-01-26 - Emergency" +pcx_content_type: release-notes sidebar: order: 27734 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...3ad719cdHTTP requests from known botnet (signature #79).N/Addos_dynamic
...61bc58d5HTTP requests with unusual HTTP headers or URI path (signature #55).managed_challengemanaged_challengeExpanded the scope of the rule to catch attacks more consistently.
Rule IDDescriptionPrevious ActionNew ActionNotes
...3ad719cdHTTP requests from known botnet (signature #79).N/Addos_dynamic
...61bc58d5 + HTTP requests with unusual HTTP headers or URI path (signature #55). + managed_challengemanaged_challenge + Expanded the scope of the rule to catch attacks more consistently. +
- diff --git a/src/content/docs/ddos-protection/change-log/http/2024-02-05-emergency.mdx b/src/content/docs/ddos-protection/change-log/http/2024-02-05-emergency.mdx index 442d3edf01afb83..ef4e8da4956e21b 100644 --- a/src/content/docs/ddos-protection/change-log/http/2024-02-05-emergency.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2024-02-05-emergency.mdx @@ -1,31 +1,27 @@ --- -title: '2024-02-05 - Emergency' -pcx_content_type: changelog +title: "2024-02-05 - Emergency" +pcx_content_type: release-notes sidebar: order: 27724 - --- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...22807318HTTP requests from known botnets.ddos_dynamicddos_dynamicExtend the rule to catch more attacks.
Rule IDDescriptionPrevious ActionNew ActionNotes
...22807318HTTP requests from known botnets.ddos_dynamicddos_dynamicExtend the rule to catch more attacks.
- diff --git a/src/content/docs/ddos-protection/change-log/http/2024-02-06-emergency.mdx b/src/content/docs/ddos-protection/change-log/http/2024-02-06-emergency.mdx index 239e0d7e3ab760a..86c9143700c6c23 100644 --- a/src/content/docs/ddos-protection/change-log/http/2024-02-06-emergency.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2024-02-06-emergency.mdx @@ -1,6 +1,6 @@ --- title: '2024-02-06 - Emergency' -pcx_content_type: changelog +pcx_content_type: release-notes sidebar: order: 27723 diff --git a/src/content/docs/ddos-protection/change-log/http/2024-02-08-emergency.mdx b/src/content/docs/ddos-protection/change-log/http/2024-02-08-emergency.mdx index fb5a400b4155dec..8efa7620877d978 100644 --- a/src/content/docs/ddos-protection/change-log/http/2024-02-08-emergency.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2024-02-08-emergency.mdx @@ -1,31 +1,27 @@ --- -title: '2024-02-08 - Emergency' -pcx_content_type: changelog +title: "2024-02-08 - Emergency" +pcx_content_type: release-notes sidebar: order: 27721 - --- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...3a679c52Requests coming from known bad sources.ddos_dynamicmanaged_challengeExpand the rule to mitigate on all zones.
Rule IDDescriptionPrevious ActionNew ActionNotes
...3a679c52Requests coming from known bad sources.ddos_dynamicmanaged_challengeExpand the rule to mitigate on all zones.
- diff --git a/src/content/docs/ddos-protection/change-log/http/2024-02-12.mdx b/src/content/docs/ddos-protection/change-log/http/2024-02-12.mdx index 8fa0bdf336de91a..db3345ece5c60f9 100644 --- a/src/content/docs/ddos-protection/change-log/http/2024-02-12.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2024-02-12.mdx @@ -1,31 +1,29 @@ --- -title: '2024-02-12' -pcx_content_type: changelog +title: "2024-02-12" +pcx_content_type: release-notes sidebar: order: 27717 - --- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...c47bdca6HTTP requests with unusual HTTP headers or URI path (signature #62).N/Ablock
Rule IDDescriptionPrevious ActionNew ActionNotes
...c47bdca6 + HTTP requests with unusual HTTP headers or URI path (signature #62). + N/Ablock
- diff --git a/src/content/docs/ddos-protection/change-log/http/2024-02-19.mdx b/src/content/docs/ddos-protection/change-log/http/2024-02-19.mdx index 481ea071830e145..a34e4d0a4f09c40 100644 --- a/src/content/docs/ddos-protection/change-log/http/2024-02-19.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2024-02-19.mdx @@ -1,45 +1,41 @@ --- -title: '2024-02-19' -pcx_content_type: changelog +title: "2024-02-19" +pcx_content_type: release-notes sidebar: order: 27710 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...0fbfd5aeHTTP requests from known botnet (signature #32).blockddos_dynamic
...22807318HTTP requests from known botnets.ddos_dynamicddos_dynamicExpand rule logic to catch more attacks.
...3ad719cdHTTP requests from known botnet (signature #79).ddos_dynamicddos_dynamicExpand the rule scope to catch more attacks.
Rule IDDescriptionPrevious ActionNew ActionNotes
...0fbfd5aeHTTP requests from known botnet (signature #32).blockddos_dynamic
...22807318HTTP requests from known botnets.ddos_dynamicddos_dynamicExpand rule logic to catch more attacks.
...3ad719cdHTTP requests from known botnet (signature #79).ddos_dynamicddos_dynamicExpand the rule scope to catch more attacks.
- diff --git a/src/content/docs/ddos-protection/change-log/http/2024-02-26-emergency.mdx b/src/content/docs/ddos-protection/change-log/http/2024-02-26-emergency.mdx index b85272605bbca38..054d481e565bf9a 100644 --- a/src/content/docs/ddos-protection/change-log/http/2024-02-26-emergency.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2024-02-26-emergency.mdx @@ -1,38 +1,38 @@ --- -title: '2024-02-26 - Emergency' -pcx_content_type: changelog +title: "2024-02-26 - Emergency" +pcx_content_type: release-notes sidebar: order: 27703 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...6831bff1HTTP requests with unusual HTTP headers or URI path (signature #35).blockblockExtend the rule to catch attacks more comprehensively.
...e269dfd6HTTP requests with unusual HTTP headers or URI path (signature #56).blockblockExtend the rule to catch attacks more comprehensively.
Rule IDDescriptionPrevious ActionNew ActionNotes
...6831bff1 + HTTP requests with unusual HTTP headers or URI path (signature #35). + blockblockExtend the rule to catch attacks more comprehensively.
...e269dfd6 + HTTP requests with unusual HTTP headers or URI path (signature #56). + blockblockExtend the rule to catch attacks more comprehensively.
- diff --git a/src/content/docs/ddos-protection/change-log/http/2024-02-27.mdx b/src/content/docs/ddos-protection/change-log/http/2024-02-27.mdx index 1eb5821003a5fc0..0acabc3483da520 100644 --- a/src/content/docs/ddos-protection/change-log/http/2024-02-27.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2024-02-27.mdx @@ -1,206 +1,213 @@ --- -title: '2024-02-27' -pcx_content_type: changelog +title: "2024-02-27" +pcx_content_type: release-notes sidebar: order: 27702 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...0c9175b8HTTP requests from known botnet (signature #47).blockN/ARule removed due to inactivity.
...0fb54442HTTP requests with unusual HTTP headers or URI path (signature #49).blockN/ARule removed due to inactivity.
...1b60260fHTTP requests from known botnet (signature #45).blockN/ARule removed due to inactivity.
...21e99dcfHTTP requests from known botnet (signature #58).blockN/ARule removed due to inactivity.
...3f7952daHTTP requests from known botnet (signature #21).blockN/ARule removed due to inactivity.
...5a158253HTTP requests from known botnet (signature #27).blockN/ARule removed due to inactivity.
...5f1469cbHTTP requests with unusual HTTP headers or URI path (signature #28).blockN/ARule removed due to inactivity.
...71cb9beaHTTP requests from known botnet (signature #39).blockN/ARule removed due to inactivity.
...72d115bdHTTP requests from known botnet (signature #23).blockN/ARule removed due to inactivity.
...8586375fHTTP requests with unusual HTTP headers or URI path (signature #22).blockN/ARule removed due to inactivity.
...8857b788HTTP requests from known botnet (signature #30).blockN/ARule removed due to inactivity.
...8bf63869HTTP requests from known botnet (signature #50).blockN/ARule removed due to inactivity.
...9630955eHTTP requests from known botnet (signature #64).blockN/ARule removed due to inactivity.
...9641efe0HTTP requests with unusual HTTP headers or URI path (signature #29).blockN/ARule removed due to inactivity.
...aa03a345HTTP requests from known botnet (signature #68).blockN/ARule removed due to inactivity.
...b60b2bc0HTTP requests from known botnet (signature #28).blockN/ARule removed due to inactivity.
...bbf0073eHTTP requests from known botnet (signature #25).blockN/ARule removed due to inactivity.
...c5f479f0HTTP requests from known botnet (signature #62).blockN/ARule removed due to inactivity.
...c92eba7cHTTP requests from known botnet (signature #65).blockN/ARule removed due to inactivity.
...dea7a346HTTP requests from known botnet (signature #35).blockN/ARule removed due to inactivity.
...e4fe8e55Adaptive DDoS Protection based on User-Agents (Available only to Enterprise zones with Advanced DDoS service).ddos_dynamicddos_dynamicMitigate attacks by default instead of only logging.
...ea99fbb6HTTP requests from known botnet (signature #46).blockN/ARule removed due to inactivity.
...f6120981HTTP requests from known botnet (signature #20).blockN/ARule removed due to inactivity.
...f9da654aHTTP requests from known botnet (signature #26).blockN/ARule removed due to inactivity.
...fd5045ffHTTP requests from known botnet (signature #55).blockN/ARule removed due to inactivity.
...fd551e2bHTTP requests from known botnet (signature #41).blockN/ARule removed due to inactivity.
Rule IDDescriptionPrevious ActionNew ActionNotes
...0c9175b8HTTP requests from known botnet (signature #47).blockN/ARule removed due to inactivity.
...0fb54442 + HTTP requests with unusual HTTP headers or URI path (signature #49). + blockN/ARule removed due to inactivity.
...1b60260fHTTP requests from known botnet (signature #45).blockN/ARule removed due to inactivity.
...21e99dcfHTTP requests from known botnet (signature #58).blockN/ARule removed due to inactivity.
...3f7952daHTTP requests from known botnet (signature #21).blockN/ARule removed due to inactivity.
...5a158253HTTP requests from known botnet (signature #27).blockN/ARule removed due to inactivity.
...5f1469cb + HTTP requests with unusual HTTP headers or URI path (signature #28). + blockN/ARule removed due to inactivity.
...71cb9beaHTTP requests from known botnet (signature #39).blockN/ARule removed due to inactivity.
...72d115bdHTTP requests from known botnet (signature #23).blockN/ARule removed due to inactivity.
...8586375f + HTTP requests with unusual HTTP headers or URI path (signature #22). + blockN/ARule removed due to inactivity.
...8857b788HTTP requests from known botnet (signature #30).blockN/ARule removed due to inactivity.
...8bf63869HTTP requests from known botnet (signature #50).blockN/ARule removed due to inactivity.
...9630955eHTTP requests from known botnet (signature #64).blockN/ARule removed due to inactivity.
...9641efe0 + HTTP requests with unusual HTTP headers or URI path (signature #29). + blockN/ARule removed due to inactivity.
...aa03a345HTTP requests from known botnet (signature #68).blockN/ARule removed due to inactivity.
...b60b2bc0HTTP requests from known botnet (signature #28).blockN/ARule removed due to inactivity.
...bbf0073eHTTP requests from known botnet (signature #25).blockN/ARule removed due to inactivity.
...c5f479f0HTTP requests from known botnet (signature #62).blockN/ARule removed due to inactivity.
...c92eba7cHTTP requests from known botnet (signature #65).blockN/ARule removed due to inactivity.
...dea7a346HTTP requests from known botnet (signature #35).blockN/ARule removed due to inactivity.
...e4fe8e55 + Adaptive DDoS Protection based on User-Agents (Available only to + Enterprise zones with Advanced DDoS service). + ddos_dynamicddos_dynamicMitigate attacks by default instead of only logging.
...ea99fbb6HTTP requests from known botnet (signature #46).blockN/ARule removed due to inactivity.
...f6120981HTTP requests from known botnet (signature #20).blockN/ARule removed due to inactivity.
...f9da654aHTTP requests from known botnet (signature #26).blockN/ARule removed due to inactivity.
...fd5045ffHTTP requests from known botnet (signature #55).blockN/ARule removed due to inactivity.
...fd551e2bHTTP requests from known botnet (signature #41).blockN/ARule removed due to inactivity.
- diff --git a/src/content/docs/ddos-protection/change-log/http/2024-04-02.mdx b/src/content/docs/ddos-protection/change-log/http/2024-04-02.mdx index fdb8dce263742ac..a758a77c4076644 100644 --- a/src/content/docs/ddos-protection/change-log/http/2024-04-02.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2024-04-02.mdx @@ -1,31 +1,27 @@ --- -title: '2024-04-02' -pcx_content_type: changelog +title: "2024-04-02" +pcx_content_type: release-notes sidebar: order: 27674 - --- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...d2f294d7HTTP requests trying to impersonate browsers.ddos_dynamicddos_dynamicUpdate the rule to match to block attacks more consistently.
Rule IDDescriptionPrevious ActionNew ActionNotes
...d2f294d7HTTP requests trying to impersonate browsers.ddos_dynamicddos_dynamicUpdate the rule to match to block attacks more consistently.
- diff --git a/src/content/docs/ddos-protection/change-log/http/2024-04-04-emergency.mdx b/src/content/docs/ddos-protection/change-log/http/2024-04-04-emergency.mdx index 3903c7c88f4e8f5..2947fbab7b293f4 100644 --- a/src/content/docs/ddos-protection/change-log/http/2024-04-04-emergency.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2024-04-04-emergency.mdx @@ -1,38 +1,34 @@ --- -title: '2024-04-04 - Emergency' -pcx_content_type: changelog +title: "2024-04-04 - Emergency" +pcx_content_type: release-notes sidebar: order: 27665 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...177059f1HTTP requests from known botnet (signature #31).logN/A
...7b231fb2HTTP requests from known botnet (signature #81).N/Ablock
Rule IDDescriptionPrevious ActionNew ActionNotes
...177059f1HTTP requests from known botnet (signature #31).logN/A
...7b231fb2HTTP requests from known botnet (signature #81).N/Ablock
- diff --git a/src/content/docs/ddos-protection/change-log/http/2024-04-16-emergency.mdx b/src/content/docs/ddos-protection/change-log/http/2024-04-16-emergency.mdx index 1329012395e400c..90e005c3fb2e834 100644 --- a/src/content/docs/ddos-protection/change-log/http/2024-04-16-emergency.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2024-04-16-emergency.mdx @@ -1,38 +1,44 @@ --- -title: '2024-04-16 - Emergency' -pcx_content_type: changelog +title: "2024-04-16 - Emergency" +pcx_content_type: release-notes sidebar: order: 27653 - --- import { RuleID } from "~/components"; - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
HTTP requests with unusual HTTP headers or URI path (signature #64).N/Ablock
HTTP requests with unusual HTTP headers or URI path (signature #65).N/Ablock
Rule IDDescriptionPrevious ActionNew ActionNotes
+ + + HTTP requests with unusual HTTP headers or URI path (signature #64). + N/Ablock
+ + + HTTP requests with unusual HTTP headers or URI path (signature #65). + N/Ablock
- diff --git a/src/content/docs/ddos-protection/change-log/http/2024-04-19.mdx b/src/content/docs/ddos-protection/change-log/http/2024-04-19.mdx index c4b8ffdb608b4d0..f59f49033c6424e 100644 --- a/src/content/docs/ddos-protection/change-log/http/2024-04-19.mdx +++ b/src/content/docs/ddos-protection/change-log/http/2024-04-19.mdx @@ -1,31 +1,33 @@ --- -title: '2024-04-19' -pcx_content_type: changelog +title: "2024-04-19" +pcx_content_type: release-notes sidebar: order: 27650 - --- -import { RuleID } from "~/components" +import { RuleID } from "~/components"; - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
HTTP requests with unusual HTTP headers or URI path (signature #66).N/Ablock
Rule IDDescriptionPrevious ActionNew ActionNotes
+ + + HTTP requests with unusual HTTP headers or URI path (signature #66). + N/Ablock
- diff --git a/src/content/docs/ddos-protection/change-log/http/index.mdx b/src/content/docs/ddos-protection/change-log/http/index.mdx index 0923645f09da740..492da91df7906d2 100644 --- a/src/content/docs/ddos-protection/change-log/http/index.mdx +++ b/src/content/docs/ddos-protection/change-log/http/index.mdx @@ -1,6 +1,6 @@ --- -title: 'HTTP DDoS managed ruleset' -pcx_content_type: concept +title: "HTTP DDoS managed ruleset" +pcx_content_type: changelog sidebar_toc: true release_notes_file_name: - ddos-http @@ -9,11 +9,15 @@ sidebar: head: - tag: title content: Changelog for the HTTP DDoS managed ruleset - --- -import { LinkButton } from "~/components" +import { LinkButton } from "~/components"; This section contains past and upcoming changes to the [HTTP DDoS Attack Protection managed ruleset](/ddos-protection/managed-rulesets/http/). -View scheduled changes + + View scheduled changes + diff --git a/src/content/docs/ddos-protection/change-log/http/scheduled-changes.mdx b/src/content/docs/ddos-protection/change-log/http/scheduled-changes.mdx index 0177d10935f5e3c..2eef352c3796d40 100644 --- a/src/content/docs/ddos-protection/change-log/http/scheduled-changes.mdx +++ b/src/content/docs/ddos-protection/change-log/http/scheduled-changes.mdx @@ -1,38 +1,36 @@ --- -pcx_content_type: changelog -title: 'Scheduled changes' +pcx_content_type: release-notes +title: "Scheduled changes" sidebar: order: 2 head: - tag: title content: Scheduled changes — HTTP DDoS - --- -import { RuleID } from "~/components" +import { RuleID } from "~/components"; - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + +
Announcement DateChange DateRule IDDescriptionPrevious ActionNew ActionNotes
N/AN/AN/AN/AN/AN/AN/A
Announcement DateChange DateRule IDDescriptionPrevious ActionNew ActionNotes
N/AN/AN/AN/AN/AN/AN/A
- diff --git a/src/content/docs/ddos-protection/change-log/index.mdx b/src/content/docs/ddos-protection/change-log/index.mdx index fd26f252c4c7c5e..ba2999cc1bd7ce1 100644 --- a/src/content/docs/ddos-protection/change-log/index.mdx +++ b/src/content/docs/ddos-protection/change-log/index.mdx @@ -1,5 +1,5 @@ --- -title: 'Changelog' +title: "Changelog" pcx_content_type: changelog release_notes_file_name: - ddos-network @@ -11,7 +11,6 @@ sidebar: head: - tag: title content: Changelog for global changes to DDoS protection - --- Cloudflare has a regular cadence of releasing updates and new rules to the DDoS managed rulesets. The updates either improve a rule's accuracy, lower false positives rates, or increase the protection due to a change in the threat landscape. diff --git a/src/content/docs/ddos-protection/change-log/network/2022-04-12.mdx b/src/content/docs/ddos-protection/change-log/network/2022-04-12.mdx index 7e348d68562898b..a78ed4460da2363 100644 --- a/src/content/docs/ddos-protection/change-log/network/2022-04-12.mdx +++ b/src/content/docs/ddos-protection/change-log/network/2022-04-12.mdx @@ -1,31 +1,27 @@ --- -title: '2022-04-12' -pcx_content_type: changelog +title: "2022-04-12" +pcx_content_type: release-notes sidebar: order: 28388 - --- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...89e250ceIPv4 GRE encapsulated IP or PPP (Inner protocol 0x0800 or 0x880B)ddos_dynamicddos_dynamic
Rule IDDescriptionPrevious ActionNew ActionNotes
...89e250ceIPv4 GRE encapsulated IP or PPP (Inner protocol 0x0800 or 0x880B)ddos_dynamicddos_dynamic
- diff --git a/src/content/docs/ddos-protection/change-log/network/2022-09-16.mdx b/src/content/docs/ddos-protection/change-log/network/2022-09-16.mdx index 908f07bbaf478ea..a9b2b2859d848d9 100644 --- a/src/content/docs/ddos-protection/change-log/network/2022-09-16.mdx +++ b/src/content/docs/ddos-protection/change-log/network/2022-09-16.mdx @@ -1,38 +1,37 @@ --- -title: '2022-09-16' -pcx_content_type: changelog +title: "2022-09-16" +pcx_content_type: release-notes sidebar: order: 28231 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...11456494IPv6 GRE miscellaneous inner protocols (Inner protocols other than 0x0800 or 0x880B)blockN/A
...800534deIPv6 GRE encapsulated IP or PPP (Inner protocol 0x0800 or 0x880B)ddos_dynamicN/A
Rule IDDescriptionPrevious ActionNew ActionNotes
...11456494 + IPv6 GRE miscellaneous inner protocols (Inner protocols other than + 0x0800 or 0x880B) + blockN/A
...800534deIPv6 GRE encapsulated IP or PPP (Inner protocol 0x0800 or 0x880B)ddos_dynamicN/A
- diff --git a/src/content/docs/ddos-protection/change-log/network/2022-09-21.mdx b/src/content/docs/ddos-protection/change-log/network/2022-09-21.mdx index 563922d9f1f8e25..9213001d874d0e7 100644 --- a/src/content/docs/ddos-protection/change-log/network/2022-09-21.mdx +++ b/src/content/docs/ddos-protection/change-log/network/2022-09-21.mdx @@ -1,87 +1,110 @@ --- -title: '2022-09-21' -pcx_content_type: changelog +title: "2022-09-21" +pcx_content_type: release-notes sidebar: order: 28226 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...58e4914aAdaptive DDoS Protection for UDP (Available only to Enterprise accounts).loglogUpdate UDP profiling rule tag and threshold
...76d5e15cAdaptive DDoS Protection for Other IPv6 Protocols (Available only to Enterprise accounts).loglogUpdate other IPv6 protos profiling rule tag and threshold
...8de83ef6Adaptive DDoS Protection for IPv6 GRE (Available only to Enterprise accounts).loglogUpdate IPv6 GRE profiling rule tag and threshold
...938e978cAdaptive DDoS Protection for IPv6 ESP (Available only to Enterprise accounts).loglogUpdate IPv6 ESP profiling rule tag and threshold
...9c173480Adaptive DDoS Protection for ICMP (Available only to Enterprise accounts).loglogUpdate ICMP profiling rule tag and threshold
...ad8078b8Adaptive DDoS Protection for IPv4 GRE (Available only to Enterprise accounts).loglogUpdate IPv4 GRE profiling rule tag and threshold
...ae3f5e4eAdaptive DDoS Protection for ICMPv6 (Available only to Enterprise accounts).loglogUpdate ICMPv6 profiling rule tag and threshold
...c7dc52dfAdaptive DDoS Protection for Other IPv4 Protocols (Available only to Enterprise accounts).loglogUpdate other IPv4 protos profiling rule tag and threshold
...e4e7541cAdaptive DDoS Protection for IPv4 ESP (Available only to Enterprise accounts).loglogUpdate IPv4 ESP profiling rule tag and threshold
Rule IDDescriptionPrevious ActionNew ActionNotes
...58e4914a + Adaptive DDoS Protection for UDP (Available only to Enterprise + accounts). + loglogUpdate UDP profiling rule tag and threshold
...76d5e15c + Adaptive DDoS Protection for Other IPv6 Protocols (Available only to + Enterprise accounts). + loglogUpdate other IPv6 protos profiling rule tag and threshold
...8de83ef6 + Adaptive DDoS Protection for IPv6 GRE (Available only to Enterprise + accounts). + loglogUpdate IPv6 GRE profiling rule tag and threshold
...938e978c + Adaptive DDoS Protection for IPv6 ESP (Available only to Enterprise + accounts). + loglogUpdate IPv6 ESP profiling rule tag and threshold
...9c173480 + Adaptive DDoS Protection for ICMP (Available only to Enterprise + accounts). + loglogUpdate ICMP profiling rule tag and threshold
...ad8078b8 + Adaptive DDoS Protection for IPv4 GRE (Available only to Enterprise + accounts). + loglogUpdate IPv4 GRE profiling rule tag and threshold
...ae3f5e4e + Adaptive DDoS Protection for ICMPv6 (Available only to Enterprise + accounts). + loglogUpdate ICMPv6 profiling rule tag and threshold
...c7dc52df + Adaptive DDoS Protection for Other IPv4 Protocols (Available only to + Enterprise accounts). + loglogUpdate other IPv4 protos profiling rule tag and threshold
...e4e7541c + Adaptive DDoS Protection for IPv4 ESP (Available only to Enterprise + accounts). + loglogUpdate IPv4 ESP profiling rule tag and threshold
- diff --git a/src/content/docs/ddos-protection/change-log/network/2022-10-06.mdx b/src/content/docs/ddos-protection/change-log/network/2022-10-06.mdx index 224f2bc1b930f34..a90d09b2262e888 100644 --- a/src/content/docs/ddos-protection/change-log/network/2022-10-06.mdx +++ b/src/content/docs/ddos-protection/change-log/network/2022-10-06.mdx @@ -1,101 +1,124 @@ --- -title: '2022-10-06' -pcx_content_type: changelog +title: "2022-10-06" +pcx_content_type: release-notes sidebar: order: 28211 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...34228119IPv4 UDP SIP trafficlogN/A
...58e4914aAdaptive DDoS Protection for UDP (Available only to Enterprise accounts).logN/A
...76d5e15cAdaptive DDoS Protection for Other IPv6 Protocols (Available only to Enterprise accounts).logN/A
...8de83ef6Adaptive DDoS Protection for IPv6 GRE (Available only to Enterprise accounts).logN/A
...938e978cAdaptive DDoS Protection for IPv6 ESP (Available only to Enterprise accounts).logN/A
...9c173480Adaptive DDoS Protection for ICMP (Available only to Enterprise accounts).logN/A
...ad8078b8Adaptive DDoS Protection for IPv4 GRE (Available only to Enterprise accounts).logN/A
...ae3f5e4eAdaptive DDoS Protection for ICMPv6 (Available only to Enterprise accounts).logN/A
...c7dc52dfAdaptive DDoS Protection for Other IPv4 Protocols (Available only to Enterprise accounts).logN/A
...e4e7541cAdaptive DDoS Protection for IPv4 ESP (Available only to Enterprise accounts).logN/A
...ea9e05c3IPv6 UDP SIP trafficlogN/A
Rule IDDescriptionPrevious ActionNew ActionNotes
...34228119IPv4 UDP SIP trafficlogN/A
...58e4914a + Adaptive DDoS Protection for UDP (Available only to Enterprise + accounts). + logN/A
...76d5e15c + Adaptive DDoS Protection for Other IPv6 Protocols (Available only to + Enterprise accounts). + logN/A
...8de83ef6 + Adaptive DDoS Protection for IPv6 GRE (Available only to Enterprise + accounts). + logN/A
...938e978c + Adaptive DDoS Protection for IPv6 ESP (Available only to Enterprise + accounts). + logN/A
...9c173480 + Adaptive DDoS Protection for ICMP (Available only to Enterprise + accounts). + logN/A
...ad8078b8 + Adaptive DDoS Protection for IPv4 GRE (Available only to Enterprise + accounts). + logN/A
...ae3f5e4e + Adaptive DDoS Protection for ICMPv6 (Available only to Enterprise + accounts). + logN/A
...c7dc52df + Adaptive DDoS Protection for Other IPv4 Protocols (Available only to + Enterprise accounts). + logN/A
...e4e7541c + Adaptive DDoS Protection for IPv4 ESP (Available only to Enterprise + accounts). + logN/A
...ea9e05c3IPv6 UDP SIP trafficlogN/A
- diff --git a/src/content/docs/ddos-protection/change-log/network/2022-10-24.mdx b/src/content/docs/ddos-protection/change-log/network/2022-10-24.mdx index d2a6e45fdf12738..2959618a01cb578 100644 --- a/src/content/docs/ddos-protection/change-log/network/2022-10-24.mdx +++ b/src/content/docs/ddos-protection/change-log/network/2022-10-24.mdx @@ -1,31 +1,30 @@ --- -title: '2022-10-24' -pcx_content_type: changelog +title: "2022-10-24" +pcx_content_type: release-notes sidebar: order: 28193 - --- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...e4e7541cAdaptive DDoS Protection for IPv4 ESP (Available only to Enterprise accounts).loglogLower sensitivity to avoid false positives
Rule IDDescriptionPrevious ActionNew ActionNotes
...e4e7541c + Adaptive DDoS Protection for IPv4 ESP (Available only to Enterprise + accounts). + loglogLower sensitivity to avoid false positives
- diff --git a/src/content/docs/ddos-protection/change-log/network/2022-12-02.mdx b/src/content/docs/ddos-protection/change-log/network/2022-12-02.mdx index e5a99edffb2160c..e5201ff08906f70 100644 --- a/src/content/docs/ddos-protection/change-log/network/2022-12-02.mdx +++ b/src/content/docs/ddos-protection/change-log/network/2022-12-02.mdx @@ -1,87 +1,110 @@ --- -title: '2022-12-02' -pcx_content_type: changelog +title: "2022-12-02" +pcx_content_type: release-notes sidebar: order: 28154 - --- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...58e4914aAdaptive DDoS Protection for UDP (Available only to Enterprise accounts).loglogLower sensitivity to avoid false positives
...76d5e15cAdaptive DDoS Protection for Other IPv6 Protocols (Available only to Enterprise accounts).loglogLower sensitivity to avoid false positives
...8de83ef6Adaptive DDoS Protection for IPv6 GRE (Available only to Enterprise accounts).loglogLower sensitivity to avoid false positives
...938e978cAdaptive DDoS Protection for IPv6 ESP (Available only to Enterprise accounts).loglogLower sensitivity to avoid false positives
...9c173480Adaptive DDoS Protection for ICMP (Available only to Enterprise accounts).loglogLower sensitivity to avoid false positives
...ad8078b8Adaptive DDoS Protection for IPv4 GRE (Available only to Enterprise accounts).loglogLower sensitivity to avoid false positives
...ae3f5e4eAdaptive DDoS Protection for ICMPv6 (Available only to Enterprise accounts).loglogLower sensitivity to avoid false positives
...c7dc52dfAdaptive DDoS Protection for Other IPv4 Protocols (Available only to Enterprise accounts).loglogLower sensitivity to avoid false positives
...e4e7541cAdaptive DDoS Protection for IPv4 ESP (Available only to Enterprise accounts).loglogLower sensitivity to avoid false positives
Rule IDDescriptionPrevious ActionNew ActionNotes
...58e4914a + Adaptive DDoS Protection for UDP (Available only to Enterprise + accounts). + loglogLower sensitivity to avoid false positives
...76d5e15c + Adaptive DDoS Protection for Other IPv6 Protocols (Available only to + Enterprise accounts). + loglogLower sensitivity to avoid false positives
...8de83ef6 + Adaptive DDoS Protection for IPv6 GRE (Available only to Enterprise + accounts). + loglogLower sensitivity to avoid false positives
...938e978c + Adaptive DDoS Protection for IPv6 ESP (Available only to Enterprise + accounts). + loglogLower sensitivity to avoid false positives
...9c173480 + Adaptive DDoS Protection for ICMP (Available only to Enterprise + accounts). + loglogLower sensitivity to avoid false positives
...ad8078b8 + Adaptive DDoS Protection for IPv4 GRE (Available only to Enterprise + accounts). + loglogLower sensitivity to avoid false positives
...ae3f5e4e + Adaptive DDoS Protection for ICMPv6 (Available only to Enterprise + accounts). + loglogLower sensitivity to avoid false positives
...c7dc52df + Adaptive DDoS Protection for Other IPv4 Protocols (Available only to + Enterprise accounts). + loglogLower sensitivity to avoid false positives
...e4e7541c + Adaptive DDoS Protection for IPv4 ESP (Available only to Enterprise + accounts). + loglogLower sensitivity to avoid false positives
- diff --git a/src/content/docs/ddos-protection/change-log/network/2023-04-17.mdx b/src/content/docs/ddos-protection/change-log/network/2023-04-17.mdx index d109899a6e372c0..91af47daebd80eb 100644 --- a/src/content/docs/ddos-protection/change-log/network/2023-04-17.mdx +++ b/src/content/docs/ddos-protection/change-log/network/2023-04-17.mdx @@ -1,9 +1,8 @@ --- -title: '2023-04-17' -pcx_content_type: changelog +title: "2023-04-17" +pcx_content_type: release-notes sidebar: order: 28018 - --- Previously, only a subset of rules were exposed publicly. In rare situations, these rules can cause false positives. When this happens, you can customize their behavior using overrides. diff --git a/src/content/docs/ddos-protection/change-log/network/2023-07-31.mdx b/src/content/docs/ddos-protection/change-log/network/2023-07-31.mdx index 6c09d770f7d889d..8a491e227af7cb3 100644 --- a/src/content/docs/ddos-protection/change-log/network/2023-07-31.mdx +++ b/src/content/docs/ddos-protection/change-log/network/2023-07-31.mdx @@ -1,31 +1,30 @@ --- -title: '2023-07-31' -pcx_content_type: changelog +title: "2023-07-31" +pcx_content_type: release-notes sidebar: order: 27913 - --- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...aa772b5cAdaptive DDoS Protection for Location-Based UDP (Available only to Enterprise accounts).N/AlogEnable UDP geolocation Adaptive DDoS rule
Rule IDDescriptionPrevious ActionNew ActionNotes
...aa772b5c + Adaptive DDoS Protection for Location-Based UDP (Available only to + Enterprise accounts). + N/AlogEnable UDP geolocation Adaptive DDoS rule
- diff --git a/src/content/docs/ddos-protection/change-log/network/2024-03-12.mdx b/src/content/docs/ddos-protection/change-log/network/2024-03-12.mdx index 03168a651a235bd..42c8deb70ad19b4 100644 --- a/src/content/docs/ddos-protection/change-log/network/2024-03-12.mdx +++ b/src/content/docs/ddos-protection/change-log/network/2024-03-12.mdx @@ -1,32 +1,33 @@ --- -title: '2024-03-12' -pcx_content_type: changelog +title: "2024-03-12" +pcx_content_type: release-notes sidebar: order: 27688 - --- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
Rule IDDescriptionPrevious ActionNew ActionNotes
...85fa2e98Adaptive DDoS Protection for UDP Destination Ports (Available only to Enterprise accounts).N/AlogEnable rule that uses a customer's UDP destination port profile to -mitigate traffic (log mode by default).
Rule IDDescriptionPrevious ActionNew ActionNotes
...85fa2e98 + Adaptive DDoS Protection for UDP Destination Ports (Available only to + Enterprise accounts). + N/Alog + Enable rule that uses a customer's UDP destination port profile to + mitigate traffic (log mode by default). +
- diff --git a/src/content/docs/ddos-protection/change-log/network/index.mdx b/src/content/docs/ddos-protection/change-log/network/index.mdx index a1b0157cb86bae1..2daf924d5516580 100644 --- a/src/content/docs/ddos-protection/change-log/network/index.mdx +++ b/src/content/docs/ddos-protection/change-log/network/index.mdx @@ -1,6 +1,6 @@ --- -title: 'Network-layer DDoS managed ruleset' -pcx_content_type: concept +title: "Network-layer DDoS managed ruleset" +pcx_content_type: changelog sidebar_toc: true release_notes_file_name: - ddos-network @@ -9,10 +9,9 @@ sidebar: head: - tag: title content: Changelog for the Network-layer DDoS managed ruleset - --- -import { LinkButton } from "~/components" +import { LinkButton } from "~/components"; This section contains past and upcoming changes to the [Network-layer DDoS Attack Protection managed ruleset](/ddos-protection/managed-rulesets/network/). @@ -21,4 +20,9 @@ This section contains past and upcoming changes to the [Network-layer DDoS Attac The Network-layer DDoS Attack Protection managed ruleset protects Cloudflare customers on all plans. However, only [Magic transit](/magic-transit/) and [Spectrum](/spectrum/) customers on an Enterprise plan can customize the managed ruleset. ::: -View scheduled changes + + View scheduled changes + diff --git a/src/content/docs/ddos-protection/change-log/network/scheduled-changes.mdx b/src/content/docs/ddos-protection/change-log/network/scheduled-changes.mdx index 24b89eacb372259..a768c5047f61938 100644 --- a/src/content/docs/ddos-protection/change-log/network/scheduled-changes.mdx +++ b/src/content/docs/ddos-protection/change-log/network/scheduled-changes.mdx @@ -1,38 +1,34 @@ --- -pcx_content_type: changelog -title: 'Scheduled changes' +pcx_content_type: release-notes +title: "Scheduled changes" sidebar: order: 2 head: - tag: title content: Scheduled changes — Network-layer DDoS - --- - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + +
Announcement DateChange DateRule IDDescriptionPrevious ActionNew ActionNotes
N/AN/AN/AN/AN/AN/AN/A
Announcement DateChange DateRule IDDescriptionPrevious ActionNew ActionNotes
N/AN/AN/AN/AN/AN/AN/A
- diff --git a/src/content/docs/waf/change-log/2025-01-06.mdx b/src/content/docs/waf/change-log/2025-01-06.mdx index 785bda8625b2aef..666a26e371d042e 100644 --- a/src/content/docs/waf/change-log/2025-01-06.mdx +++ b/src/content/docs/waf/change-log/2025-01-06.mdx @@ -1,7 +1,7 @@ --- title: "2025-01-06" type: table -pcx_content_type: changelog +pcx_content_type: release-notes sidebar: order: 806 tableOfContents: false @@ -39,7 +39,10 @@ import { RuleID } from "~/components"; 100679 - Palo Alto Networks - Remote Code Execution - CVE:CVE-2024-0012, CVE:CVE-2024-9474 + + Palo Alto Networks - Remote Code Execution - CVE:CVE-2024-0012, + CVE:CVE-2024-9474 + Log Block New Detection @@ -94,7 +97,10 @@ import { RuleID } from "~/components"; 100684 - Microsoft SharePoint - Remote Code Execution - CVE:CVE-2024-38094, CVE:CVE-2024-38024, CVE:CVE-2024-38023 + + Microsoft SharePoint - Remote Code Execution - CVE:CVE-2024-38094, + CVE:CVE-2024-38024, CVE:CVE-2024-38023 + Log Block New Detection @@ -127,7 +133,10 @@ import { RuleID } from "~/components"; 100687 - WordPress - Remote Code Execution - CVE:CVE-2024-10781, CVE:CVE-2024-10542 + + WordPress - Remote Code Execution - CVE:CVE-2024-10781, + CVE:CVE-2024-10542 + Log Block New Detection @@ -149,7 +158,9 @@ import { RuleID } from "~/components"; 100689 - Palo Alto GlobalProtect - Remote Code Execution - CVE:CVE-2024-5921 + + Palo Alto GlobalProtect - Remote Code Execution - CVE:CVE-2024-5921 + Log Block New Detection @@ -237,7 +248,9 @@ import { RuleID } from "~/components"; 100697 - Apache ShardingSphere - Remote Code Execution - CVE:CVE-2022-22733 + + Apache ShardingSphere - Remote Code Execution - CVE:CVE-2022-22733 + Log Block New Detection @@ -265,4 +278,4 @@ import { RuleID } from "~/components"; New Detection - \ No newline at end of file + diff --git a/src/content/docs/waf/change-log/2025-01-13.mdx b/src/content/docs/waf/change-log/2025-01-13.mdx index de8e7c9e9aa73ba..90272f945d02afa 100644 --- a/src/content/docs/waf/change-log/2025-01-13.mdx +++ b/src/content/docs/waf/change-log/2025-01-13.mdx @@ -1,7 +1,7 @@ --- title: "2025-01-13" type: table -pcx_content_type: changelog +pcx_content_type: release-notes sidebar: order: 805 tableOfContents: false @@ -28,7 +28,9 @@ import { RuleID } from "~/components"; 100704 - Cleo Harmony - Auth Bypass - CVE:CVE-2024-55956, CVE:CVE-2024-55953 + + Cleo Harmony - Auth Bypass - CVE:CVE-2024-55956, CVE:CVE-2024-55953 + Log Block New Detection @@ -61,7 +63,10 @@ import { RuleID } from "~/components"; 100707 - FortiWLM - Remote Code Execution - CVE:CVE-2023-48782, CVE:CVE-2023-34993, CVE:CVE-2023-34990 + + FortiWLM - Remote Code Execution - CVE:CVE-2023-48782, + CVE:CVE-2023-34993, CVE:CVE-2023-34990 + Log Block New Detection @@ -78,4 +83,4 @@ import { RuleID } from "~/components"; - \ No newline at end of file + diff --git a/src/content/docs/waf/change-log/2025-01-21.mdx b/src/content/docs/waf/change-log/2025-01-21.mdx index 7aa47b227c975d1..4cb1cec9d9fd2e8 100644 --- a/src/content/docs/waf/change-log/2025-01-21.mdx +++ b/src/content/docs/waf/change-log/2025-01-21.mdx @@ -1,7 +1,7 @@ --- title: "2025-01-21" type: table -pcx_content_type: changelog +pcx_content_type: release-notes sidebar: order: 804 tableOfContents: false @@ -31,7 +31,9 @@ import { RuleID } from "~/components"; Command Injection - Nslookup Log Block - This was released as + + This was released as + Cloudflare Managed Rulesets @@ -42,7 +44,9 @@ import { RuleID } from "~/components"; Web Shell Activity Log Block - This was released as + + This was released as + - \ No newline at end of file + diff --git a/src/content/docs/waf/change-log/2025-02-11.mdx b/src/content/docs/waf/change-log/2025-02-11.mdx index 53e37b831f28dc9..d261357d582cc8c 100644 --- a/src/content/docs/waf/change-log/2025-02-11.mdx +++ b/src/content/docs/waf/change-log/2025-02-11.mdx @@ -1,7 +1,7 @@ --- title: "2025-02-11" type: table -pcx_content_type: changelog +pcx_content_type: release-notes sidebar: order: 803 tableOfContents: false @@ -50,7 +50,10 @@ import { RuleID } from "~/components"; 100710 - Progress Software WhatsUp Gold - Directory Traversal - CVE:CVE-2024-12105 + + Progress Software WhatsUp Gold - Directory Traversal - + CVE:CVE-2024-12105 + Log Block This is a New Detection @@ -89,4 +92,4 @@ import { RuleID } from "~/components"; This is a New Detection - \ No newline at end of file + diff --git a/src/content/docs/waf/change-log/2025-02-18.mdx b/src/content/docs/waf/change-log/2025-02-18.mdx new file mode 100644 index 000000000000000..c8dd010cb67caff --- /dev/null +++ b/src/content/docs/waf/change-log/2025-02-18.mdx @@ -0,0 +1,81 @@ +--- +title: "2025-02-18" +type: table +pcx_content_type: release-notes +sidebar: + order: 802 +tableOfContents: false +--- + +import { RuleID } from "~/components"; + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
RulesetRule IDLegacy Rule IDDescriptionPrevious ActionNew ActionComments
Cloudflare Managed Rulesets + + 100715FortiOS - Auth Bypass - CVE:CVE-2024-55591LogBlockThis is a New Detection
Cloudflare Managed Rulesets + + 100716Ivanti - Auth Bypass - CVE:CVE-2021-44529LogBlockThis is a New Detection
Cloudflare Managed Rulesets + + 100717SimpleHelp - Auth Bypass - CVE:CVE-2024-57727LogBlockThis is a New Detection
Cloudflare Managed Rulesets + + 100718SonicWall SSLVPN - Auth Bypass - CVE:CVE-2024-53704LogBlockThis is a New Detection
Cloudflare Managed Rulesets + + 100719Yeti Platform - Auth Bypass - CVE:CVE-2024-46507LogBlockThis is a New Detection
\ No newline at end of file diff --git a/src/content/docs/waf/change-log/general-updates.mdx b/src/content/docs/waf/change-log/general-updates.mdx index f476bf7a5e2526b..8c142cf47cc3852 100644 --- a/src/content/docs/waf/change-log/general-updates.mdx +++ b/src/content/docs/waf/change-log/general-updates.mdx @@ -1,6 +1,6 @@ --- title: "General updates" -pcx_content_type: concept +pcx_content_type: changelog release_notes_file_name: - waf-general release_notes_name: WAF diff --git a/src/content/docs/waf/change-log/historical-2018.mdx b/src/content/docs/waf/change-log/historical-2018.mdx index 30ff7b464edadc2..1c48430a6f8af94 100644 --- a/src/content/docs/waf/change-log/historical-2018.mdx +++ b/src/content/docs/waf/change-log/historical-2018.mdx @@ -1,5 +1,5 @@ --- -pcx_content_type: changelog +pcx_content_type: release-notes title: "Historical (2018)" sidebar: order: 10050 diff --git a/src/content/docs/waf/change-log/historical-2019.mdx b/src/content/docs/waf/change-log/historical-2019.mdx index b7077702326edda..22e4da600fd9f31 100644 --- a/src/content/docs/waf/change-log/historical-2019.mdx +++ b/src/content/docs/waf/change-log/historical-2019.mdx @@ -1,6 +1,6 @@ --- -pcx_content_type: changelog -title: 'Historical (2019)' +pcx_content_type: release-notes +title: "Historical (2019)" sidebar: order: 10049 head: [] @@ -9,2543 +9,2543 @@ tableOfContents: false --- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
RulesetRule IDDescriptionChange DateOld ActionNew Action
Cloudflare Specials100242 - Block Citrix Netscaler ADC - - - CVE-2019-19781 - - Emergency, 2019-12-16N/ABlock
Cloudflare Specials100009CB - Improvement in Equation-like SQLi. Merge 100009CB_BETA into 100009CB. - 2019-12-16BlockBlock
Cloudflare Specials100191 - Improvement CVE-2019-11043 detection. Merge 100191_BETA into 100191. - 2019-12-16BlockBlock
Cloudflare OWASP9802140Minor change to reduce Gutenberg false positivesEmergency, 2019-11-25Scoring basedScoring based
Cloudflare OWASP9802140_JSONMinor change to reduce Gutenberg false positivesEmergency, 2019-11-25Scoring basedScoring based
Cloudflare OWASP9802141Minor change to reduce Gutenberg false positivesEmergency, 2019-11-25Scoring basedScoring based
Cloudflare OWASP9802141_JSONMinor change to reduce Gutenberg false positivesEmergency, 2019-11-25Scoring basedScoring based
Cloudflare OWASP960034Reduce false positives for requests made with HTTP 2 and 3Emergency, 2019-11-25Scoring basedScoring based
Cloudflare Specials100148Disable outdated XSS rule by default2019-11-12BlockDisable
Cloudflare Specials100035CUpdate valid Googlebot IP rangesEmergency, 2019-11-07BlockBlock
Cloudflare Specials100035DUpdate valid Googlebot IP rangesEmergency, 2019-11-07DisabledDisabled
Cloudflare Specials100139AImprove XSS detection. Merge 100139A_BETA into 100139A.2019-11-04DisableDisable
Cloudflare Specials100139BImprove XSS detection. Merge 100139B_BETA into 100139B.2019-11-04BlockBlock
Cloudflare Specials100139CImprove XSS detection. Merge 100139C_BETA into 100139C.2019-11-04BlockBlock
Cloudflare Specials100139DImprove XSS detection2019-11-04N/ABlock
Cloudflare Specials100173Improve XSS detection2019-11-04N/ABlock
Cloudflare Specials100030SVGDisable outdated XSS rule by default2019-11-04BlockDisable
Cloudflare Specials100021CDisable outdated XSS rule by default2019-11-04BlockDisable
Cloudflare Specials100021CEDisable outdated XSS rule by default2019-11-04BlockDisable
Cloudflare Specials100021CBDisable outdated XSS rule by default2019-11-04BlockDisable
Cloudflare Specials100021DDisable outdated XSS rule by default2019-11-04BlockDisable
Cloudflare Specials100107Disable outdated XSS rule by default2019-11-04BlockDisable
Cloudflare Specials100030Disable outdated XSS rule by default2019-11-04BlockDisable
Cloudflare Specials100030ARGS_STRICTDisable outdated XSS rule by default2019-11-04ChallengeDisable
Cloudflare Specials100021Disable outdated XSS rule by default2019-11-04ChallengeDisable
Cloudflare Specials100021BDisable outdated XSS rule by default2019-11-04BlockDisable
Cloudflare Specials100021EDisable outdated XSS rule by default2019-11-04ChallengeDisable
Cloudflare Specials100090Disable outdated XSS rule by default2019-11-04BlockDisable
Cloudflare Specials100091Disable outdated XSS rule by default2019-11-04BlockDisable
Cloudflare Specials100091BDisable outdated XSS rule by default2019-11-04BlockDisable
Cloudflare Specials100092Disable outdated XSS rule by default2019-11-04BlockDisable
Cloudflare Specials100170Improve XSS detection. Merge 100170_BETA into 100170.2019-11-04BlockBlock
Cloudflare Specials100021HDisable outdated XSS rule by default2019-11-04BlockDisable
Cloudflare Specials100044Disabled obsolete rule by default. Merge 100044_BETA into 100044.2019-11-04BlockDisable
Cloudflare Specials100174Improve XSS detection2019-11-04N/ABlock
Cloudflare Specials100135BReduced false positive rate. Merge 100135B_BETA into 100135B.2019-11-04BlockBlock
Cloudflare Specials100191Block CVE-2019-11043Emergency, 2019-10-27N/ABlock
Cloudflare Specials100035C - Improve Fake Google Bot detection. Merge 100035C_BETA into 100035C. - Emergency, 2019-10-23BlockBlock
Cloudflare Specials100009CB - Improve Comparison-like SQL Injection detection. Merge 100009CB_BETA - into 100009CB. - 2019-10-21BlockBlock
Cloudflare Specials100026Improve PHP Code Injection and File Upload detection2019-10-21BlockBlock
Cloudflare Specials100186Block vBulletin vulnerability CVE-2019-171322019-10-21LogBlock
Cloudflare Specials100187Block vBulletin vulnerability CVE-2019-171322019-10-21LogBlock
Cloudflare Specials100035D - Improve Fake Google Bot detection. Merge 100035D_BETA into 100035D. - Change originally scheduled for 2019-10-21. - Emergency, 2019-10-17DisableDisable
Cloudflare Specials100035 - Improve Fake Google Bot detection. Merge 100035_BETA into 100035. Change - originally scheduled for 2019-10-21. - Emergency, 2019-10-17BlockBlock
Cloudflare Specials100035C - Improve Fake Google Bot detection. Merge 100035C_BETA into 100035C. - Change originally scheduled for 2019-10-21. - Emergency, 2019-10-17BlockBlock
Cloudflare Specials100035B - Improve Fake Bing Bot detection. Merge 100035B_BETA into 100035B. Change - originally scheduled for 2019-10-21. - Emergency, 2019-10-17BlockBlock
Cloudflare Specials100035Y - Improve Fake Yandex Bot detection. Merge 100035Y_BETA into 100035Y. - Change originally scheduled for 2019-10-21. - Emergency, 2019-10-17BlockBlock
Cloudflare Specials100035U - Improve Fake Baidu Bot detection. Merge 100035U_BETA into 100035U. - Change originally scheduled for 2019-10-21. - Emergency, 2019-10-17BlockBlock
Cloudflare Specials100135AImprove XSS detection. Merge 100135A_UBETA into 100135A.2019-10-14BlockBlock
Cloudflare Specials100135BImprove XSS detection. Merge 100135B_UBETA into 100135B.2019-10-14DisableBlock
Cloudflare Specials100135CImprove XSS detection. Merge 100135C_UBETA into 100135C.2019-10-14BlockBlock
Cloudflare Specials100136AImprove XSS detection. Merge 100136A_UBETA into 100136A.2019-10-14BlockBlock
Cloudflare Specials100136BImprove XSS detection. Merge 100136B_UBETA into 100136B.2019-10-14BlockBlock
Cloudflare Specials100136CImprove XSS detection. Merge 100136C_UBETA into 100136C.2019-10-14BlockBlock
Cloudflare Specials100167Improve XSS and HTML Injection detection2019-10-14N/ABlock
Cloudflare Specials100168Improve XSS and HTML Injection detection2019-10-14N/ABlock
Cloudflare Specials100169Improve XSS and HTML Injection detection2019-10-14N/ADisable
Cloudflare Specials100170Improve XSS and HTML Injection detection2019-10-14N/ABlock
Cloudflare Specials100171Improve XSS and HTML Injection detection2019-10-14N/ADisable
Cloudflare Specials100172Improve XSS and HTML Injection detection2019-10-14N/ABlock
Cloudflare WordPressWP0015 - Disables outdated WordPress rule by default. If this rule's action is - set to anything other than the default, this change will have no effect. - 2019-10-07BlockDisable
Cloudflare Specials100008EImprove SQLi protection2019-09-30BlockBlock
Cloudflare Specials100008ESQLi improvement2019-09-30BlockBlock
Cloudflare Specials100166 - Block vBulletin - - CVE-2019-16759 - - Emergency, 2019-09-26NoneBlock
Cloudflare OWASP9002140OWASP WordPress improvement2019-09-23Scoring basedScoring based
Cloudflare OWASP9002140_JSONOWASP WordPress improvement2019-09-23Scoring basedScoring based
Cloudflare OWASP9002141OWASP WordPress improvement2019-09-23Scoring basedScoring based
Cloudflare OWASP9002141_JSONOWASP WordPress improvement2019-09-23Scoring basedScoring based
Cloudflare Specials100162 - SQLi improvement on - SELECT FROM TABLE - statements - 2019-09-23N/ABlock
Cloudflare Specials100160JBoss protection improvement2019-09-16N/ABlock
Cloudflare OWASP9002140Small improvement to Gutenberg exception rules2019-09-09N/AScoring based
Cloudflare OWASP9002140_JSONSmall improvement to Gutenberg exception rules2019-09-09N/AScoring based
Cloudflare OWASP9002141Small improvement to Gutenberg exception rules2019-09-09N/AScoring based
Cloudflare OWASP9002141_JSONSmall improvement to Gutenberg exception rules2019-09-09N/AScoring based
Cloudflare Specials100158 - SQL Injection - Obfuscated - SELECT - expressions - 2019-09-09LogBlock
Cloudflare OWASPURI-973326Small improvement in OWASP rule2019-09-09Scoring basedScoring based
Cloudflare OWASP973326Small improvement in OWASP rule2019-09-09Scoring basedScoring based
Cloudflare OWASPURI-950901Remove OWASP rule2019-09-02Scoring basedN/A
Cloudflare OWASP959151Small improvement in OWASP rule2019-09-02BlockBlock
Cloudflare OWASP950901Remove OWASP rule2019-09-02Scoring basedN/A
Cloudflare DrupalD0003BDisable rule by default2019-07-29BlockDisable
Cloudflare Specials100005ADisable rule by default2019-07-29LogDisable
Cloudflare Specials100007NDisable rule by default2019-07-29LogDisable
Cloudflare Specials100009DBETADisable rule by default2019-07-29LogDisable
Cloudflare Specials100009IDisable rule by default2019-07-29LogDisable
Cloudflare Specials100009LDisable rule by default2019-07-29LogDisable
Cloudflare Specials100010BDisable rule by default2019-07-29LogDisable
Cloudflare Specials100021CDDisable rule by default2019-07-29LogDisable
Cloudflare Specials100030_BETADisable rule by default2019-07-29LogDisable
Cloudflare Specials100030ARGS_LOOSEDisable rule by default2019-07-29LogDisable
Cloudflare Specials100035B2Disable rule by default2019-07-29LogDisable
Cloudflare Specials100035DDisable rule by default2019-07-29LogDisable
Cloudflare Specials100042Disable rule by default2019-07-29LogDisable
Cloudflare Specials100056_BETADisable rule by default2019-07-29LogDisable
Cloudflare Specials100057Disable rule by default2019-07-29LogDisable
Cloudflare Specials100059Disable rule by default2019-07-29LogDisable
Cloudflare Specials100061Disable rule by default2019-07-29LogDisable
Cloudflare Specials100062Disable rule by default2019-07-29LogDisable
Cloudflare Specials100062_BETADisable rule by default2019-07-29LogDisable
Cloudflare Specials100064Disable rule by default2019-07-29LogDisable
Cloudflare Specials100066Disable rule by default2019-07-29LogDisable
Cloudflare Specials100067Disable rule by default2019-07-29LogDisable
Cloudflare Specials100068Disable rule by default2019-07-29LogDisable
Cloudflare Specials100075Disable rule by default2019-07-29LogDisable
Cloudflare Specials100077Disable rule by default2019-07-29LogDisable
Cloudflare Specials100078BDisable rule by default2019-07-29LogDisable
Cloudflare Specials100083Disable rule by default2019-07-29LogDisable
Cloudflare Specials100084Disable rule by default2019-07-29LogDisable
Cloudflare Specials100085Disable rule by default2019-07-29LogDisable
Cloudflare Specials100086Disable rule by default2019-07-29LogDisable
Cloudflare Specials100088CDisable rule by default2019-07-29LogDisable
Cloudflare Specials100093Disable rule by default2019-07-29LogDisable
Cloudflare Specials100096BEVILDisable rule by default2019-07-29LogDisable
Cloudflare Specials100096BHTMLDisable rule by default2019-07-29LogDisable
Cloudflare Specials100096EVILDisable rule by default2019-07-29LogDisable
Cloudflare Specials100096HTMLDisable rule by default2019-07-29LogDisable
Cloudflare Specials100098Disable rule by default2019-07-29LogDisable
Cloudflare Specials100105Disable rule by default2019-07-29LogDisable
Cloudflare Specials100106BDisable rule by default2019-07-29LogDisable
Cloudflare Specials100107ARGSDisable rule by default2019-07-29LogDisable
Cloudflare Specials100108Disable rule by default2019-07-29LogDisable
Cloudflare Specials100108ARGSDisable rule by default2019-07-29LogDisable
Cloudflare Specials100109Disable rule by default2019-07-29LogDisable
Cloudflare Specials100109BDisable rule by default2019-07-29LogDisable
Cloudflare Specials100111Disable rule by default2019-07-29LogDisable
Cloudflare Specials100115Disable rule by default2019-07-29LogDisable
Cloudflare Specials100119Disable rule by default2019-07-29LogDisable
Cloudflare Specials100122Disable rule by default2019-07-29LogDisable
Cloudflare Specials100123BDisable rule by default2019-07-29LogDisable
Cloudflare Specials100126Disable rule by default2019-07-29LogDisable
Cloudflare Specials100131Disable rule by default2019-07-29LogDisable
Cloudflare Specials100133Disable rule by default2019-07-29LogDisable
Cloudflare Specials100135BDisable rule by default2019-07-29LogDisable
Cloudflare Specials100137Disable rule by default2019-07-29LogDisable
Cloudflare Specials100139ADisable rule by default2019-07-29LogDisable
Cloudflare Specials100140Disable rule by default2019-07-29LogDisable
Cloudflare Specials100146Disable rule by default2019-07-29LogDisable
Cloudflare Specials100146BDisable rule by default2019-07-29LogDisable
Cloudflare Specials100149Disable rule by default2019-07-29LogDisable
Cloudflare Specials100158Disable rule by default2019-07-29LogDisable
Cloudflare MiscellaneousCFMISC0004Disable rule by default2019-07-29LogDisable
Cloudflare MiscellaneousCFMISC0004BDisable rule by default2019-07-29LogDisable
Cloudflare MiscellaneousCFMISC0016BDisable rule by default2019-07-29LogDisable
Cloudflare DrupalD0005Disable rule by default2019-07-29LogDisable
Cloudflare DrupalD0016Disable rule by default2019-07-29LogDisable
Cloudflare PHPPHP100008Disable rule by default2019-07-29LogDisable
Cloudflare PHPPHP100009Disable rule by default2019-07-29LogDisable
Cloudflare PHPPHP100010Disable rule by default2019-07-29LogDisable
Cloudflare PHPPHP100011ARGSDisable rule by default2019-07-29LogDisable
Cloudflare PHPPHP100011COOKIEDisable rule by default2019-07-29LogDisable
Cloudflare WordPressWP0012Disable rule by default2019-07-29LogDisable
Cloudflare WordPressWP0025CDisable rule by default2019-07-29LogDisable
Cloudflare WordPressWP0028Disable rule by default2019-07-29LogDisable
Cloudflare WordPressWP0030Disable rule by default2019-07-29LogDisable
Cloudflare Specials100136AImprove XSS JavaScript URI detection and reduce false positives2019-07-29BlockBlock
Cloudflare Specials100136BImprove XSS JavaScript URI detection and reduce false positives2019-07-29BlockBlock
Cloudflare Specials100136CImprove XSS JavaScript URI detection and reduce false positives2019-07-29BlockBlock
Cloudflare Specials100135A - Improve XSS JavaScript Events detection and reduce false positives - 2019-07-29BlockBlock
Cloudflare Specials100135B - Improve XSS JavaScript Events detection and reduce false positives - 2019-07-29LogBlock
Cloudflare Specials100135C - Improve XSS JavaScript Events detection and reduce false positives - 2019-07-29BlockBlock
Cloudflare OWASP9002140Reduce WAF false positives for the Gutenberg WordPress editor2019-07-24N/AScoring based
Cloudflare OWASP9002140_JSONReduce WAF false positives for the Gutenberg WordPress editor2019-07-24N/AScoring based
Cloudflare OWASP9002141Reduce WAF false positives for the Gutenberg WordPress editor2019-07-24N/AScoring based
Cloudflare OWASP9002141_JSONReduce WAF false positives for the Gutenberg WordPress editor2019-07-24N/AScoring based
Cloudflare Specials100030Improve XSS HTML Script Tag detection2019-07-22BlockBlock
Cloudflare Specials100153 - Block Oracle WebLogic - Command Injection - - - CVE-2019-2729 - - 2019-06-27BlockBlock
Cloudflare OWASP9002140AImprove 9002140A2019-06-19Scoring basedScoring based
Cloudflare OWASP9002140BImprove 9002140B2019-06-19Scoring basedScoring based
Cloudflare OWASP9002140AImprove 9002140A2019-06-17Scoring basedScoring based
Cloudflare OWASP9002140AImprove 9002140B2019-06-17Scoring basedScoring based
Cloudflare WordPressWP0033Easy WP SMTP - Deserialization2019-06-17LogBlock
Cloudflare Specials100156XSS, HTML Injection - Malicious HTML Encoding2019-06-17LogBlock
Cloudflare OWASP9002140B_BETAImprove 9002140B2019-06-10Scoring basedScoring based
Cloudflare Specials100005Improved shell variable normalization2019-06-10BlockBlock
Cloudflare Specials100007NSImproved shell variable normalization2019-06-10BlockBlock
Cloudflare Specials100155 - PHPCMS - Dangerous File Upload - - - CVE-2018-14399 - - 2019-06-10LogBlock
Cloudflare Specials100096BHTMLXSS, HTML Injection - Body2019-06-03N/ALog
Cloudflare Specials100096BEVILXSS, HTML Injection - Body2019-06-03N/ALog
Cloudflare OWASP9002140A - New OWASP rules to allow requests from the WordPress's Gutenberg editor - 2019-06-03N/AScoring based
Cloudflare OWASP9002140B - New OWASP rules to allow requests from the WordPress's Gutenberg editor - 2019-06-03N/AScoring based
AllAllImprove Rule Descriptions2019-05-28N/AN/A
Cloudflare Specials100157 - Microsoft SharePoint Deserialization - - - CVE-2019-0604 - - (Strict) - 2019-05-28BlockBlock
Cloudflare Specials100053Potential FI or Alias/Rewrite Bypass - Double Slash in URL2019-05-20DisableDisable
Cloudflare Specials100122ARGSDangerous stream wrappers2019-05-20BlockDeprecated
Cloudflare Specials100122ARGS_GETDangerous stream wrappers2019-05-20BlockDeprecated
Cloudflare Specials100122Dangerous stream wrappers2019-05-20LogBlock
Cloudflare Specials100157 - Microsoft SharePoint Deserialization - - - CVE-2019-0604 - - 2019-05-13N/ABlock
Cloudflare Specials100154 - WordPress Social Warfare RCE/XSS ( - - CVE-2019-9978 - - ) - 2019-05-13LogBlock
Cloudflare OWASP9002140Reduce OWASP false positives2019-05-13LogAllow
Cloudflare Specials100008Improve SQLi detection2019-05-13BlockBlock
Cloudflare Specials100135AImprove XSS detection and reduce false positives2019-05-07BlockBlock
Cloudflare Specials100135BImprove XSS detection and reduce false positives2019-05-07LogBlock
Cloudflare Specials100135CImprove XSS detection and reduce false positives2019-05-07BlockBlock
Cloudflare Specials100136AImprove XSS detection and reduce false positives2019-05-07BlockBlock
Cloudflare Specials100136BImprove XSS detection and reduce false positives2019-05-07BlockBlock
Cloudflare Specials100153 - Block Oracle WebLogic - - CVE-2019-2725 - - , - - CVE-2017-10271 - - , - - CVE-2017-3506 - - 2019-05-07N/ABlock
Cloudflare Specials100148Improve inline XSS detection2019-05-07LogBlock
Cloudflare Specials100105HEADERSPHP serialization in headers, excluding Cookies2019-05-07N/ABlock
Cloudflare Specials100146CPotential SSRF attack2019-05-07LogBlock
Cloudflare Specials100106PostgreSQL COPY Injection2019-05-07BlockBlock
Cloudflare Specials100139AHTML Injection, XSS or Code Injection via data URI2019-05-07N/ALog
Cloudflare Specials100139BHTML Injection, XSS or Code Injection via data URI2019-05-07N/ABlock
Cloudflare Specials100139CHTML Injection, XSS or Code Injection via data URI2019-05-07N/ABlock
Cloudflare Specials100105REFERERPHP serialization in Referer header2019-04-29N/ABlock
Cloudflare Specials100152 - Joomla - - CVE-2019-10945 - - 2019-04-29N/ABlock
Cloudflare Specials100144NoSQL Injection attack (Expression vector)2019-04-29LogBlock
Cloudflare Specials100143NoSQL Injection attack (comparison vector)2019-04-29LogBlock
Cloudflare Specials100148Improve XSS inline detection2019-04-29LogBlock
Cloudflare Specials100135AImprove XSS detection2019-04-22BlockBlock
Cloudflare Specials100135BImprove XSS detection2019-04-22BlockBlock
Cloudflare Specials100136AImprove XSS detection2019-04-22BlockBlock
Cloudflare Specials100136BImprove XSS detection2019-04-22BlockBlock
Cloudflare Specials100097GImprove SQLi blocking2019-04-22LogBlock
Cloudflare WordPressWP0034WordPress zero day XSS2019-04-22N/ABlock
Cloudflare Specials100010AImprove SQLi detection2019-04-22BlockBlock
Cloudflare PHPPHP100013Blocks PHP CGI attack by default2019-04-22LogBlock
Cloudflare Specials100150 - Block - - CVE-2019-10842 - - 2019-04-22N/ABlock
Cloudflare Specials100142NoSQL Injection attack (array vector)2019-04-15LogBlock
Cloudflare Specials100135AImprove XSS event detection2019-04-08N/AN/A
Cloudflare Specials100135BImprove XSS event detection2019-04-08N/AN/A
Cloudflare Specials100135CImprove XSS event detection2019-04-08N/AN/A
Cloudflare Specials100030SVGImprove XSS event detection2019-04-08N/AN/A
Cloudflare Specials100021CImprove XSS event detection2019-04-08N/AN/A
Cloudflare Specials100021CEImprove XSS event detection2019-04-08N/AN/A
Cloudflare Specials100021CBImprove XSS event detection2019-04-08N/AN/A
Cloudflare Specials100021CDImprove XSS event detection2019-04-08N/AN/A
Cloudflare Specials100021CD2Improve XSS event detection2019-04-08N/AN/A
Cloudflare Specials100021CD3Improve XSS event detection2019-04-08N/AN/A
Cloudflare DrupalD0020BETAImprove blocking of SA-CORE-2019-0032019-04-08LogBlock
Cloudflare DrupalD0017Improve blocking of SA-CORE-2019-0032019-04-08LogBlock
Cloudflare DrupalD0017Improve blocking of SA-CORE-2019-0032019-04-08LogDeleted
Cloudflare DrupalD0018Improve blocking of SA-CORE-2019-0032019-04-08LogDeleted
Cloudflare DrupalD0019Improve blocking of SA-CORE-2019-0032019-04-08LogDeleted
Cloudflare DrupalD0021Improve blocking of SA-CORE-2019-0032019-04-08LogDeleted
Cloudflare Specials100127Improve blocking of SA-CORE-2019-0032019-04-08LogDeleted
Cloudflare Specials100128Improve blocking of SA-CORE-2019-0032019-04-08LogDeleted
Cloudflare Specials100135AImprove XSS detection using JavaScript URI2019-04-08N/ABlock
Cloudflare Specials100135BImprove XSS detection using JavaScript URI2019-04-08N/ALog
Cloudflare Specials100135CImprove XSS detection using JavaScript URI2019-04-08N/ABlock
Cloudflare Specials100123AImprove invalid UTF-8 detection2019-04-08N/ABlock
Cloudflare Specials100123BImprove invalid UTF-8 detection2019-04-08N/ALog
Cloudflare Specials100130Executable file upload attempt2019-04-08LogBlock
Cloudflare Specials100136AImprove XSS detection using JavaScript events2019-04-01N/ABlock
Cloudflare Specials100136BImprove XSS detection using JavaScript events2019-04-01N/ABlock
Cloudflare Specials100136CImprove XSS detection using JavaScript events2019-04-01N/ABlock
Cloudflare Specials100120BETA2Reduce 100120's false positives2019-04-01LogBlock
Cloudflare WordPressWP0032BETAReduce false positives for WP00322019-04-01LogBlock
Cloudflare Specials100122ARGSBlock use of stream wrappers in all arguments2019-04-01LogBlock
Cloudflare Specials100132 - Protection for Apache Tika Command Injection - - CVE-2018-1335 - - 2019-04-01LogBlock
Cloudflare PHPPHP100006Improve PHP webshell attempt detection.2019-04-01LogBlock
Cloudflare Specials100005 - Merge LFI 100005_BETA into 100005. Mitigates - - CVE-2018-9126 - - , - - CVE-2011-1892 - - . - 2019-04-01BlockBlock
Cloudflare Specials100005USuperseded by 1000052019-04-01BlockBlock
Cloudflare Specials100005URSuperseded by 1000052019-04-01BlockBlock
Cloudflare Specials100134 - Ruby on Rails File Disclosure - - CVE-2019-5418 - - 2019-04-01LogBlock
Cloudflare Specials100120BETAImprove 100120's coverage of SQLi2019-03-25LogBlock
Cloudflare Specials100130BExecutable file with fake extension upload attempt2019-03-25LogBlock
Cloudflare Specials100021CB - Improves XSS event detection using alternate syntax \`, brackets, and - parentheses. - 2019-03-18LogBlock
Cloudflare Specials100021AImprove XSS detection in Referer Header2019-03-18ChallengeBlock
Cloudflare Specials100030SVGImprove XSS event detection2019-03-18ChallengeBlock
Cloudflare Specials100021CImprove XSS event detection2019-03-18BlockBlock
Cloudflare Specials100021CEImprove XSS event detection2019-03-18BlockBlock
Cloudflare Specials100021CBImprove XSS event detection2019-03-18BlockBlock
Cloudflare Specials100122ARGS_GETBlock use of stream wrappers in GET arguments (RFI/RCE)2019-03-18LogBlock
Cloudflare Specials100125Block AngularJS Sandbox attacks2019-03-18LogBlock
Cloudflare Specials100021DImprove XSS detection2019-03-18ChallengeBlock
Cloudflare WordPressWP0031 - WordPress RCE - - - CVE-2019-8942 - - , - - CVE-2019-8943 - - 2019-03-11N/ABlock
Cloudflare Specials100021CBImprove XSS event detection2019-03-11ChallengeBlock
Cloudflare Specials100021CImprove XSS event detection2019-03-11BlockBlock
Cloudflare Specials100008EImprove SQLi probing2019-03-04BlockBlock
Cloudflare Specials100123UTF-8 Invalid Characters detection (URL)2019-03-04LogBlock
Cloudflare Specials100008EImprove SQLi probe detection2019-02-18N/ABlock
Cloudflare Specials100063_BETAReduce false positives for 1000632019-02-18LogBlock
Cloudflare Specials100021HImprove XSS2019-02-18LogBlock
Cloudflare Specials100021GDelete XSS rule2019-02-18BlockDeleted
Cloudflare Specials100124AUTF-8 Invalid Characters detection2019-02-11N/ADisable
Cloudflare Specials100124BUTF-8 Invalid Characters detection2019-02-11N/ADisable
Cloudflare Specials100008Moved rule out of BETA2019-02-08BlockBlock
Cloudflare Specials100011Block requests with null bytes2019-02-04N/ADisable
Cloudflare Specials100020Blocked SQLi with mysql comments2019-02-04LogBlock
Cloudflare Specials100120BBlocked SQLi with mysql comments2019-02-04LogBlock
Cloudflare Specials100120CBlocked SQLi with mysql comments2019-02-04N/ADisable
Cloudflare Specials100054 - Block - - CVE-2017-5638 - - RCE attempts - 2019-02-04LogBlock
Cloudflare Specials100009CReduce 100009C false positives2019-01-28BlockBlock
Cloudflare Specials100007Improved RCE detection2019-01-28BlockBlock
Cloudflare PHPPHP100012 - Detect - - CVE-2017-9841 - - 2019-01-28N/ABlock
Cloudflare Specials100112BBlock requests with duplicated User-Agent headers2019-01-21N/ADisable
Cloudflare Specials100009JReduce 100009J false positives2019-01-21BlockBlock
Cloudflare Specials100114Improved XSS probing detection2019-01-21LogBlock
Cloudflare Specials100005Improved LFI detection2019-01-21LogBlock
Cloudflare DrupalD0015Drupal SA-CORE-2019-002 vulnerabilityEmergency, 2019-01-17N/ABlock
Cloudflare DrupalD0016Drupal SA-CORE-2019-002 vulnerabilityEmergency, 2019-01-17N/ALog
Cloudflare PHPPHP100011Improved PHP code injection detection in URI and headers2019-01-14LogBlock
Cloudflare Specials100121ARGS_GETUse of multiple percent-encoding level in URI arguments2019-01-07N/ADisable
Cloudflare Specials100121URIUse of multiple percent-encoding level in URI2019-01-07N/ADisable
Cloudflare Specials100021CD3XSS reflection with JavaScript events2019-01-02N/ADisable
Cloudflare Specials100068BImprove SQLi detection2019-01-02LogBlock
Cloudflare Specials100021_BETAImprove XSS detection2019-01-02LogChallenge
\ No newline at end of file + + + Ruleset + Rule ID + Description + Change Date + Old Action + New Action + + + + + Cloudflare Specials + 100242 + + Block Citrix Netscaler ADC - + + CVE-2019-19781 + + + Emergency, 2019-12-16 + N/A + Block + + + Cloudflare Specials + 100009CB + + Improvement in Equation-like SQLi. Merge 100009CB_BETA into 100009CB. + + 2019-12-16 + Block + Block + + + Cloudflare Specials + 100191 + + Improvement CVE-2019-11043 detection. Merge 100191_BETA into 100191. + + 2019-12-16 + Block + Block + + + Cloudflare OWASP + 9802140 + Minor change to reduce Gutenberg false positives + Emergency, 2019-11-25 + Scoring based + Scoring based + + + Cloudflare OWASP + 9802140_JSON + Minor change to reduce Gutenberg false positives + Emergency, 2019-11-25 + Scoring based + Scoring based + + + Cloudflare OWASP + 9802141 + Minor change to reduce Gutenberg false positives + Emergency, 2019-11-25 + Scoring based + Scoring based + + + Cloudflare OWASP + 9802141_JSON + Minor change to reduce Gutenberg false positives + Emergency, 2019-11-25 + Scoring based + Scoring based + + + Cloudflare OWASP + 960034 + Reduce false positives for requests made with HTTP 2 and 3 + Emergency, 2019-11-25 + Scoring based + Scoring based + + + Cloudflare Specials + 100148 + Disable outdated XSS rule by default + 2019-11-12 + Block + Disable + + + Cloudflare Specials + 100035C + Update valid Googlebot IP ranges + Emergency, 2019-11-07 + Block + Block + + + Cloudflare Specials + 100035D + Update valid Googlebot IP ranges + Emergency, 2019-11-07 + Disabled + Disabled + + + Cloudflare Specials + 100139A + Improve XSS detection. Merge 100139A_BETA into 100139A. + 2019-11-04 + Disable + Disable + + + Cloudflare Specials + 100139B + Improve XSS detection. Merge 100139B_BETA into 100139B. + 2019-11-04 + Block + Block + + + Cloudflare Specials + 100139C + Improve XSS detection. Merge 100139C_BETA into 100139C. + 2019-11-04 + Block + Block + + + Cloudflare Specials + 100139D + Improve XSS detection + 2019-11-04 + N/A + Block + + + Cloudflare Specials + 100173 + Improve XSS detection + 2019-11-04 + N/A + Block + + + Cloudflare Specials + 100030SVG + Disable outdated XSS rule by default + 2019-11-04 + Block + Disable + + + Cloudflare Specials + 100021C + Disable outdated XSS rule by default + 2019-11-04 + Block + Disable + + + Cloudflare Specials + 100021CE + Disable outdated XSS rule by default + 2019-11-04 + Block + Disable + + + Cloudflare Specials + 100021CB + Disable outdated XSS rule by default + 2019-11-04 + Block + Disable + + + Cloudflare Specials + 100021D + Disable outdated XSS rule by default + 2019-11-04 + Block + Disable + + + Cloudflare Specials + 100107 + Disable outdated XSS rule by default + 2019-11-04 + Block + Disable + + + Cloudflare Specials + 100030 + Disable outdated XSS rule by default + 2019-11-04 + Block + Disable + + + Cloudflare Specials + 100030ARGS_STRICT + Disable outdated XSS rule by default + 2019-11-04 + Challenge + Disable + + + Cloudflare Specials + 100021 + Disable outdated XSS rule by default + 2019-11-04 + Challenge + Disable + + + Cloudflare Specials + 100021B + Disable outdated XSS rule by default + 2019-11-04 + Block + Disable + + + Cloudflare Specials + 100021E + Disable outdated XSS rule by default + 2019-11-04 + Challenge + Disable + + + Cloudflare Specials + 100090 + Disable outdated XSS rule by default + 2019-11-04 + Block + Disable + + + Cloudflare Specials + 100091 + Disable outdated XSS rule by default + 2019-11-04 + Block + Disable + + + Cloudflare Specials + 100091B + Disable outdated XSS rule by default + 2019-11-04 + Block + Disable + + + Cloudflare Specials + 100092 + Disable outdated XSS rule by default + 2019-11-04 + Block + Disable + + + Cloudflare Specials + 100170 + Improve XSS detection. Merge 100170_BETA into 100170. + 2019-11-04 + Block + Block + + + Cloudflare Specials + 100021H + Disable outdated XSS rule by default + 2019-11-04 + Block + Disable + + + Cloudflare Specials + 100044 + Disabled obsolete rule by default. Merge 100044_BETA into 100044. + 2019-11-04 + Block + Disable + + + Cloudflare Specials + 100174 + Improve XSS detection + 2019-11-04 + N/A + Block + + + Cloudflare Specials + 100135B + Reduced false positive rate. Merge 100135B_BETA into 100135B. + 2019-11-04 + Block + Block + + + Cloudflare Specials + 100191 + Block CVE-2019-11043 + Emergency, 2019-10-27 + N/A + Block + + + Cloudflare Specials + 100035C + + Improve Fake Google Bot detection. Merge 100035C_BETA into 100035C. + + Emergency, 2019-10-23 + Block + Block + + + Cloudflare Specials + 100009CB + + Improve Comparison-like SQL Injection detection. Merge 100009CB_BETA + into 100009CB. + + 2019-10-21 + Block + Block + + + Cloudflare Specials + 100026 + Improve PHP Code Injection and File Upload detection + 2019-10-21 + Block + Block + + + Cloudflare Specials + 100186 + Block vBulletin vulnerability CVE-2019-17132 + 2019-10-21 + Log + Block + + + Cloudflare Specials + 100187 + Block vBulletin vulnerability CVE-2019-17132 + 2019-10-21 + Log + Block + + + Cloudflare Specials + 100035D + + Improve Fake Google Bot detection. Merge 100035D_BETA into 100035D. + Change originally scheduled for 2019-10-21. + + Emergency, 2019-10-17 + Disable + Disable + + + Cloudflare Specials + 100035 + + Improve Fake Google Bot detection. Merge 100035_BETA into 100035. Change + originally scheduled for 2019-10-21. + + Emergency, 2019-10-17 + Block + Block + + + Cloudflare Specials + 100035C + + Improve Fake Google Bot detection. Merge 100035C_BETA into 100035C. + Change originally scheduled for 2019-10-21. + + Emergency, 2019-10-17 + Block + Block + + + Cloudflare Specials + 100035B + + Improve Fake Bing Bot detection. Merge 100035B_BETA into 100035B. Change + originally scheduled for 2019-10-21. + + Emergency, 2019-10-17 + Block + Block + + + Cloudflare Specials + 100035Y + + Improve Fake Yandex Bot detection. Merge 100035Y_BETA into 100035Y. + Change originally scheduled for 2019-10-21. + + Emergency, 2019-10-17 + Block + Block + + + Cloudflare Specials + 100035U + + Improve Fake Baidu Bot detection. Merge 100035U_BETA into 100035U. + Change originally scheduled for 2019-10-21. + + Emergency, 2019-10-17 + Block + Block + + + Cloudflare Specials + 100135A + Improve XSS detection. Merge 100135A_UBETA into 100135A. + 2019-10-14 + Block + Block + + + Cloudflare Specials + 100135B + Improve XSS detection. Merge 100135B_UBETA into 100135B. + 2019-10-14 + Disable + Block + + + Cloudflare Specials + 100135C + Improve XSS detection. Merge 100135C_UBETA into 100135C. + 2019-10-14 + Block + Block + + + Cloudflare Specials + 100136A + Improve XSS detection. Merge 100136A_UBETA into 100136A. + 2019-10-14 + Block + Block + + + Cloudflare Specials + 100136B + Improve XSS detection. Merge 100136B_UBETA into 100136B. + 2019-10-14 + Block + Block + + + Cloudflare Specials + 100136C + Improve XSS detection. Merge 100136C_UBETA into 100136C. + 2019-10-14 + Block + Block + + + Cloudflare Specials + 100167 + Improve XSS and HTML Injection detection + 2019-10-14 + N/A + Block + + + Cloudflare Specials + 100168 + Improve XSS and HTML Injection detection + 2019-10-14 + N/A + Block + + + Cloudflare Specials + 100169 + Improve XSS and HTML Injection detection + 2019-10-14 + N/A + Disable + + + Cloudflare Specials + 100170 + Improve XSS and HTML Injection detection + 2019-10-14 + N/A + Block + + + Cloudflare Specials + 100171 + Improve XSS and HTML Injection detection + 2019-10-14 + N/A + Disable + + + Cloudflare Specials + 100172 + Improve XSS and HTML Injection detection + 2019-10-14 + N/A + Block + + + Cloudflare WordPress + WP0015 + + Disables outdated WordPress rule by default. If this rule's action is + set to anything other than the default, this change will have no effect. + + 2019-10-07 + Block + Disable + + + Cloudflare Specials + 100008E + Improve SQLi protection + 2019-09-30 + Block + Block + + + Cloudflare Specials + 100008E + SQLi improvement + 2019-09-30 + Block + Block + + + Cloudflare Specials + 100166 + + Block vBulletin + + CVE-2019-16759 + + + Emergency, 2019-09-26 + None + Block + + + Cloudflare OWASP + 9002140 + OWASP WordPress improvement + 2019-09-23 + Scoring based + Scoring based + + + Cloudflare OWASP + 9002140_JSON + OWASP WordPress improvement + 2019-09-23 + Scoring based + Scoring based + + + Cloudflare OWASP + 9002141 + OWASP WordPress improvement + 2019-09-23 + Scoring based + Scoring based + + + Cloudflare OWASP + 9002141_JSON + OWASP WordPress improvement + 2019-09-23 + Scoring based + Scoring based + + + Cloudflare Specials + 100162 + + SQLi improvement on + SELECT FROM TABLE + statements + + 2019-09-23 + N/A + Block + + + Cloudflare Specials + 100160 + JBoss protection improvement + 2019-09-16 + N/A + Block + + + Cloudflare OWASP + 9002140 + Small improvement to Gutenberg exception rules + 2019-09-09 + N/A + Scoring based + + + Cloudflare OWASP + 9002140_JSON + Small improvement to Gutenberg exception rules + 2019-09-09 + N/A + Scoring based + + + Cloudflare OWASP + 9002141 + Small improvement to Gutenberg exception rules + 2019-09-09 + N/A + Scoring based + + + Cloudflare OWASP + 9002141_JSON + Small improvement to Gutenberg exception rules + 2019-09-09 + N/A + Scoring based + + + Cloudflare Specials + 100158 + + SQL Injection - Obfuscated + SELECT + expressions + + 2019-09-09 + Log + Block + + + Cloudflare OWASP + URI-973326 + Small improvement in OWASP rule + 2019-09-09 + Scoring based + Scoring based + + + Cloudflare OWASP + 973326 + Small improvement in OWASP rule + 2019-09-09 + Scoring based + Scoring based + + + Cloudflare OWASP + URI-950901 + Remove OWASP rule + 2019-09-02 + Scoring based + N/A + + + Cloudflare OWASP + 959151 + Small improvement in OWASP rule + 2019-09-02 + Block + Block + + + Cloudflare OWASP + 950901 + Remove OWASP rule + 2019-09-02 + Scoring based + N/A + + + Cloudflare Drupal + D0003B + Disable rule by default + 2019-07-29 + Block + Disable + + + Cloudflare Specials + 100005A + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100007N + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100009DBETA + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100009I + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100009L + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100010B + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100021CD + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100030_BETA + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100030ARGS_LOOSE + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100035B2 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100035D + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100042 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100056_BETA + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100057 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100059 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100061 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100062 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100062_BETA + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100064 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100066 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100067 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100068 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100075 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100077 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100078B + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100083 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100084 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100085 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100086 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100088C + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100093 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100096BEVIL + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100096BHTML + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100096EVIL + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100096HTML + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100098 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100105 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100106B + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100107ARGS + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100108 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100108ARGS + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100109 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100109B + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100111 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100115 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100119 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100122 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100123B + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100126 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100131 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100133 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100135B + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100137 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100139A + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100140 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100146 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100146B + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100149 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100158 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Miscellaneous + CFMISC0004 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Miscellaneous + CFMISC0004B + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Miscellaneous + CFMISC0016B + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Drupal + D0005 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Drupal + D0016 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare PHP + PHP100008 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare PHP + PHP100009 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare PHP + PHP100010 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare PHP + PHP100011ARGS + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare PHP + PHP100011COOKIE + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare WordPress + WP0012 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare WordPress + WP0025C + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare WordPress + WP0028 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare WordPress + WP0030 + Disable rule by default + 2019-07-29 + Log + Disable + + + Cloudflare Specials + 100136A + Improve XSS JavaScript URI detection and reduce false positives + 2019-07-29 + Block + Block + + + Cloudflare Specials + 100136B + Improve XSS JavaScript URI detection and reduce false positives + 2019-07-29 + Block + Block + + + Cloudflare Specials + 100136C + Improve XSS JavaScript URI detection and reduce false positives + 2019-07-29 + Block + Block + + + Cloudflare Specials + 100135A + + Improve XSS JavaScript Events detection and reduce false positives + + 2019-07-29 + Block + Block + + + Cloudflare Specials + 100135B + + Improve XSS JavaScript Events detection and reduce false positives + + 2019-07-29 + Log + Block + + + Cloudflare Specials + 100135C + + Improve XSS JavaScript Events detection and reduce false positives + + 2019-07-29 + Block + Block + + + Cloudflare OWASP + 9002140 + Reduce WAF false positives for the Gutenberg WordPress editor + 2019-07-24 + N/A + Scoring based + + + Cloudflare OWASP + 9002140_JSON + Reduce WAF false positives for the Gutenberg WordPress editor + 2019-07-24 + N/A + Scoring based + + + Cloudflare OWASP + 9002141 + Reduce WAF false positives for the Gutenberg WordPress editor + 2019-07-24 + N/A + Scoring based + + + Cloudflare OWASP + 9002141_JSON + Reduce WAF false positives for the Gutenberg WordPress editor + 2019-07-24 + N/A + Scoring based + + + Cloudflare Specials + 100030 + Improve XSS HTML Script Tag detection + 2019-07-22 + Block + Block + + + Cloudflare Specials + 100153 + + Block Oracle WebLogic - Command Injection - + + CVE-2019-2729 + + + 2019-06-27 + Block + Block + + + Cloudflare OWASP + 9002140A + Improve 9002140A + 2019-06-19 + Scoring based + Scoring based + + + Cloudflare OWASP + 9002140B + Improve 9002140B + 2019-06-19 + Scoring based + Scoring based + + + Cloudflare OWASP + 9002140A + Improve 9002140A + 2019-06-17 + Scoring based + Scoring based + + + Cloudflare OWASP + 9002140A + Improve 9002140B + 2019-06-17 + Scoring based + Scoring based + + + Cloudflare WordPress + WP0033 + Easy WP SMTP - Deserialization + 2019-06-17 + Log + Block + + + Cloudflare Specials + 100156 + XSS, HTML Injection - Malicious HTML Encoding + 2019-06-17 + Log + Block + + + Cloudflare OWASP + 9002140B_BETA + Improve 9002140B + 2019-06-10 + Scoring based + Scoring based + + + Cloudflare Specials + 100005 + Improved shell variable normalization + 2019-06-10 + Block + Block + + + Cloudflare Specials + 100007NS + Improved shell variable normalization + 2019-06-10 + Block + Block + + + Cloudflare Specials + 100155 + + PHPCMS - Dangerous File Upload - + + CVE-2018-14399 + + + 2019-06-10 + Log + Block + + + Cloudflare Specials + 100096BHTML + XSS, HTML Injection - Body + 2019-06-03 + N/A + Log + + + Cloudflare Specials + 100096BEVIL + XSS, HTML Injection - Body + 2019-06-03 + N/A + Log + + + Cloudflare OWASP + 9002140A + + New OWASP rules to allow requests from the WordPress's Gutenberg editor + + 2019-06-03 + N/A + Scoring based + + + Cloudflare OWASP + 9002140B + + New OWASP rules to allow requests from the WordPress's Gutenberg editor + + 2019-06-03 + N/A + Scoring based + + + All + All + Improve Rule Descriptions + 2019-05-28 + N/A + N/A + + + Cloudflare Specials + 100157 + + Microsoft SharePoint Deserialization - + + CVE-2019-0604 + + (Strict) + + 2019-05-28 + Block + Block + + + Cloudflare Specials + 100053 + Potential FI or Alias/Rewrite Bypass - Double Slash in URL + 2019-05-20 + Disable + Disable + + + Cloudflare Specials + 100122ARGS + Dangerous stream wrappers + 2019-05-20 + Block + Deprecated + + + Cloudflare Specials + 100122ARGS_GET + Dangerous stream wrappers + 2019-05-20 + Block + Deprecated + + + Cloudflare Specials + 100122 + Dangerous stream wrappers + 2019-05-20 + Log + Block + + + Cloudflare Specials + 100157 + + Microsoft SharePoint Deserialization - + + CVE-2019-0604 + + + 2019-05-13 + N/A + Block + + + Cloudflare Specials + 100154 + + WordPress Social Warfare RCE/XSS ( + + CVE-2019-9978 + + ) + + 2019-05-13 + Log + Block + + + Cloudflare OWASP + 9002140 + Reduce OWASP false positives + 2019-05-13 + Log + Allow + + + Cloudflare Specials + 100008 + Improve SQLi detection + 2019-05-13 + Block + Block + + + Cloudflare Specials + 100135A + Improve XSS detection and reduce false positives + 2019-05-07 + Block + Block + + + Cloudflare Specials + 100135B + Improve XSS detection and reduce false positives + 2019-05-07 + Log + Block + + + Cloudflare Specials + 100135C + Improve XSS detection and reduce false positives + 2019-05-07 + Block + Block + + + Cloudflare Specials + 100136A + Improve XSS detection and reduce false positives + 2019-05-07 + Block + Block + + + Cloudflare Specials + 100136B + Improve XSS detection and reduce false positives + 2019-05-07 + Block + Block + + + Cloudflare Specials + 100153 + + Block Oracle WebLogic + + CVE-2019-2725 + + , + + CVE-2017-10271 + + , + + CVE-2017-3506 + + + 2019-05-07 + N/A + Block + + + Cloudflare Specials + 100148 + Improve inline XSS detection + 2019-05-07 + Log + Block + + + Cloudflare Specials + 100105HEADERS + PHP serialization in headers, excluding Cookies + 2019-05-07 + N/A + Block + + + Cloudflare Specials + 100146C + Potential SSRF attack + 2019-05-07 + Log + Block + + + Cloudflare Specials + 100106 + PostgreSQL COPY Injection + 2019-05-07 + Block + Block + + + Cloudflare Specials + 100139A + HTML Injection, XSS or Code Injection via data URI + 2019-05-07 + N/A + Log + + + Cloudflare Specials + 100139B + HTML Injection, XSS or Code Injection via data URI + 2019-05-07 + N/A + Block + + + Cloudflare Specials + 100139C + HTML Injection, XSS or Code Injection via data URI + 2019-05-07 + N/A + Block + + + Cloudflare Specials + 100105REFERER + PHP serialization in Referer header + 2019-04-29 + N/A + Block + + + Cloudflare Specials + 100152 + + Joomla + + CVE-2019-10945 + + + 2019-04-29 + N/A + Block + + + Cloudflare Specials + 100144 + NoSQL Injection attack (Expression vector) + 2019-04-29 + Log + Block + + + Cloudflare Specials + 100143 + NoSQL Injection attack (comparison vector) + 2019-04-29 + Log + Block + + + Cloudflare Specials + 100148 + Improve XSS inline detection + 2019-04-29 + Log + Block + + + Cloudflare Specials + 100135A + Improve XSS detection + 2019-04-22 + Block + Block + + + Cloudflare Specials + 100135B + Improve XSS detection + 2019-04-22 + Block + Block + + + Cloudflare Specials + 100136A + Improve XSS detection + 2019-04-22 + Block + Block + + + Cloudflare Specials + 100136B + Improve XSS detection + 2019-04-22 + Block + Block + + + Cloudflare Specials + 100097G + Improve SQLi blocking + 2019-04-22 + Log + Block + + + Cloudflare WordPress + WP0034 + WordPress zero day XSS + 2019-04-22 + N/A + Block + + + Cloudflare Specials + 100010A + Improve SQLi detection + 2019-04-22 + Block + Block + + + Cloudflare PHP + PHP100013 + Blocks PHP CGI attack by default + 2019-04-22 + Log + Block + + + Cloudflare Specials + 100150 + + Block + + CVE-2019-10842 + + + 2019-04-22 + N/A + Block + + + Cloudflare Specials + 100142 + NoSQL Injection attack (array vector) + 2019-04-15 + Log + Block + + + Cloudflare Specials + 100135A + Improve XSS event detection + 2019-04-08 + N/A + N/A + + + Cloudflare Specials + 100135B + Improve XSS event detection + 2019-04-08 + N/A + N/A + + + Cloudflare Specials + 100135C + Improve XSS event detection + 2019-04-08 + N/A + N/A + + + Cloudflare Specials + 100030SVG + Improve XSS event detection + 2019-04-08 + N/A + N/A + + + Cloudflare Specials + 100021C + Improve XSS event detection + 2019-04-08 + N/A + N/A + + + Cloudflare Specials + 100021CE + Improve XSS event detection + 2019-04-08 + N/A + N/A + + + Cloudflare Specials + 100021CB + Improve XSS event detection + 2019-04-08 + N/A + N/A + + + Cloudflare Specials + 100021CD + Improve XSS event detection + 2019-04-08 + N/A + N/A + + + Cloudflare Specials + 100021CD2 + Improve XSS event detection + 2019-04-08 + N/A + N/A + + + Cloudflare Specials + 100021CD3 + Improve XSS event detection + 2019-04-08 + N/A + N/A + + + Cloudflare Drupal + D0020BETA + Improve blocking of SA-CORE-2019-003 + 2019-04-08 + Log + Block + + + Cloudflare Drupal + D0017 + Improve blocking of SA-CORE-2019-003 + 2019-04-08 + Log + Block + + + Cloudflare Drupal + D0017 + Improve blocking of SA-CORE-2019-003 + 2019-04-08 + Log + Deleted + + + Cloudflare Drupal + D0018 + Improve blocking of SA-CORE-2019-003 + 2019-04-08 + Log + Deleted + + + Cloudflare Drupal + D0019 + Improve blocking of SA-CORE-2019-003 + 2019-04-08 + Log + Deleted + + + Cloudflare Drupal + D0021 + Improve blocking of SA-CORE-2019-003 + 2019-04-08 + Log + Deleted + + + Cloudflare Specials + 100127 + Improve blocking of SA-CORE-2019-003 + 2019-04-08 + Log + Deleted + + + Cloudflare Specials + 100128 + Improve blocking of SA-CORE-2019-003 + 2019-04-08 + Log + Deleted + + + Cloudflare Specials + 100135A + Improve XSS detection using JavaScript URI + 2019-04-08 + N/A + Block + + + Cloudflare Specials + 100135B + Improve XSS detection using JavaScript URI + 2019-04-08 + N/A + Log + + + Cloudflare Specials + 100135C + Improve XSS detection using JavaScript URI + 2019-04-08 + N/A + Block + + + Cloudflare Specials + 100123A + Improve invalid UTF-8 detection + 2019-04-08 + N/A + Block + + + Cloudflare Specials + 100123B + Improve invalid UTF-8 detection + 2019-04-08 + N/A + Log + + + Cloudflare Specials + 100130 + Executable file upload attempt + 2019-04-08 + Log + Block + + + Cloudflare Specials + 100136A + Improve XSS detection using JavaScript events + 2019-04-01 + N/A + Block + + + Cloudflare Specials + 100136B + Improve XSS detection using JavaScript events + 2019-04-01 + N/A + Block + + + Cloudflare Specials + 100136C + Improve XSS detection using JavaScript events + 2019-04-01 + N/A + Block + + + Cloudflare Specials + 100120BETA2 + Reduce 100120's false positives + 2019-04-01 + Log + Block + + + Cloudflare WordPress + WP0032BETA + Reduce false positives for WP0032 + 2019-04-01 + Log + Block + + + Cloudflare Specials + 100122ARGS + Block use of stream wrappers in all arguments + 2019-04-01 + Log + Block + + + Cloudflare Specials + 100132 + + Protection for Apache Tika Command Injection + + CVE-2018-1335 + + + 2019-04-01 + Log + Block + + + Cloudflare PHP + PHP100006 + Improve PHP webshell attempt detection. + 2019-04-01 + Log + Block + + + Cloudflare Specials + 100005 + + Merge LFI 100005_BETA into 100005. Mitigates + + CVE-2018-9126 + + , + + CVE-2011-1892 + + . + + 2019-04-01 + Block + Block + + + Cloudflare Specials + 100005U + Superseded by 100005 + 2019-04-01 + Block + Block + + + Cloudflare Specials + 100005UR + Superseded by 100005 + 2019-04-01 + Block + Block + + + Cloudflare Specials + 100134 + + Ruby on Rails File Disclosure + + CVE-2019-5418 + + + 2019-04-01 + Log + Block + + + Cloudflare Specials + 100120BETA + Improve 100120's coverage of SQLi + 2019-03-25 + Log + Block + + + Cloudflare Specials + 100130B + Executable file with fake extension upload attempt + 2019-03-25 + Log + Block + + + Cloudflare Specials + 100021CB + + Improves XSS event detection using alternate syntax \`, brackets, and + parentheses. + + 2019-03-18 + Log + Block + + + Cloudflare Specials + 100021A + Improve XSS detection in Referer Header + 2019-03-18 + Challenge + Block + + + Cloudflare Specials + 100030SVG + Improve XSS event detection + 2019-03-18 + Challenge + Block + + + Cloudflare Specials + 100021C + Improve XSS event detection + 2019-03-18 + Block + Block + + + Cloudflare Specials + 100021CE + Improve XSS event detection + 2019-03-18 + Block + Block + + + Cloudflare Specials + 100021CB + Improve XSS event detection + 2019-03-18 + Block + Block + + + Cloudflare Specials + 100122ARGS_GET + Block use of stream wrappers in GET arguments (RFI/RCE) + 2019-03-18 + Log + Block + + + Cloudflare Specials + 100125 + Block AngularJS Sandbox attacks + 2019-03-18 + Log + Block + + + Cloudflare Specials + 100021D + Improve XSS detection + 2019-03-18 + Challenge + Block + + + Cloudflare WordPress + WP0031 + + WordPress RCE - + + CVE-2019-8942 + + , + + CVE-2019-8943 + + + 2019-03-11 + N/A + Block + + + Cloudflare Specials + 100021CB + Improve XSS event detection + 2019-03-11 + Challenge + Block + + + Cloudflare Specials + 100021C + Improve XSS event detection + 2019-03-11 + Block + Block + + + Cloudflare Specials + 100008E + Improve SQLi probing + 2019-03-04 + Block + Block + + + Cloudflare Specials + 100123 + UTF-8 Invalid Characters detection (URL) + 2019-03-04 + Log + Block + + + Cloudflare Specials + 100008E + Improve SQLi probe detection + 2019-02-18 + N/A + Block + + + Cloudflare Specials + 100063_BETA + Reduce false positives for 100063 + 2019-02-18 + Log + Block + + + Cloudflare Specials + 100021H + Improve XSS + 2019-02-18 + Log + Block + + + Cloudflare Specials + 100021G + Delete XSS rule + 2019-02-18 + Block + Deleted + + + Cloudflare Specials + 100124A + UTF-8 Invalid Characters detection + 2019-02-11 + N/A + Disable + + + Cloudflare Specials + 100124B + UTF-8 Invalid Characters detection + 2019-02-11 + N/A + Disable + + + Cloudflare Specials + 100008 + Moved rule out of BETA + 2019-02-08 + Block + Block + + + Cloudflare Specials + 100011 + Block requests with null bytes + 2019-02-04 + N/A + Disable + + + Cloudflare Specials + 100020 + Blocked SQLi with mysql comments + 2019-02-04 + Log + Block + + + Cloudflare Specials + 100120B + Blocked SQLi with mysql comments + 2019-02-04 + Log + Block + + + Cloudflare Specials + 100120C + Blocked SQLi with mysql comments + 2019-02-04 + N/A + Disable + + + Cloudflare Specials + 100054 + + Block + + CVE-2017-5638 + + RCE attempts + + 2019-02-04 + Log + Block + + + Cloudflare Specials + 100009C + Reduce 100009C false positives + 2019-01-28 + Block + Block + + + Cloudflare Specials + 100007 + Improved RCE detection + 2019-01-28 + Block + Block + + + Cloudflare PHP + PHP100012 + + Detect + + CVE-2017-9841 + + + 2019-01-28 + N/A + Block + + + Cloudflare Specials + 100112B + Block requests with duplicated User-Agent headers + 2019-01-21 + N/A + Disable + + + Cloudflare Specials + 100009J + Reduce 100009J false positives + 2019-01-21 + Block + Block + + + Cloudflare Specials + 100114 + Improved XSS probing detection + 2019-01-21 + Log + Block + + + Cloudflare Specials + 100005 + Improved LFI detection + 2019-01-21 + Log + Block + + + Cloudflare Drupal + D0015 + Drupal SA-CORE-2019-002 vulnerability + Emergency, 2019-01-17 + N/A + Block + + + Cloudflare Drupal + D0016 + Drupal SA-CORE-2019-002 vulnerability + Emergency, 2019-01-17 + N/A + Log + + + Cloudflare PHP + PHP100011 + Improved PHP code injection detection in URI and headers + 2019-01-14 + Log + Block + + + Cloudflare Specials + 100121ARGS_GET + Use of multiple percent-encoding level in URI arguments + 2019-01-07 + N/A + Disable + + + Cloudflare Specials + 100121URI + Use of multiple percent-encoding level in URI + 2019-01-07 + N/A + Disable + + + Cloudflare Specials + 100021CD3 + XSS reflection with JavaScript events + 2019-01-02 + N/A + Disable + + + Cloudflare Specials + 100068B + Improve SQLi detection + 2019-01-02 + Log + Block + + + Cloudflare Specials + 100021_BETA + Improve XSS detection + 2019-01-02 + Log + Challenge + + + diff --git a/src/content/docs/waf/change-log/historical-2020.mdx b/src/content/docs/waf/change-log/historical-2020.mdx index 583b617397826db..43d15e0eae1102f 100644 --- a/src/content/docs/waf/change-log/historical-2020.mdx +++ b/src/content/docs/waf/change-log/historical-2020.mdx @@ -1,5 +1,5 @@ --- -pcx_content_type: changelog +pcx_content_type: release-notes title: "Historical (2020)" sidebar: order: 10048 diff --git a/src/content/docs/waf/change-log/historical-2021.mdx b/src/content/docs/waf/change-log/historical-2021.mdx index 243f72bf0cb338e..b162ce53db84ffe 100644 --- a/src/content/docs/waf/change-log/historical-2021.mdx +++ b/src/content/docs/waf/change-log/historical-2021.mdx @@ -1,5 +1,5 @@ --- -pcx_content_type: changelog +pcx_content_type: release-notes title: "Historical (2021)" sidebar: order: 10047 diff --git a/src/content/docs/waf/change-log/historical-2022.mdx b/src/content/docs/waf/change-log/historical-2022.mdx index c8da266edc17e12..60747d02c81be17 100644 --- a/src/content/docs/waf/change-log/historical-2022.mdx +++ b/src/content/docs/waf/change-log/historical-2022.mdx @@ -1,5 +1,5 @@ --- -pcx_content_type: changelog +pcx_content_type: release-notes title: "Historical (2022)" sidebar: order: 10046 diff --git a/src/content/docs/waf/change-log/historical-2023.mdx b/src/content/docs/waf/change-log/historical-2023.mdx index 0a93fd4dab84f28..620a539591ccef9 100644 --- a/src/content/docs/waf/change-log/historical-2023.mdx +++ b/src/content/docs/waf/change-log/historical-2023.mdx @@ -1,5 +1,5 @@ --- -pcx_content_type: changelog +pcx_content_type: release-notes title: "Historical (2023)" sidebar: order: 10045 diff --git a/src/content/docs/waf/change-log/historical-2024.mdx b/src/content/docs/waf/change-log/historical-2024.mdx index 3539c2906f4d641..830801efb08e2ac 100644 --- a/src/content/docs/waf/change-log/historical-2024.mdx +++ b/src/content/docs/waf/change-log/historical-2024.mdx @@ -1,5 +1,5 @@ --- -pcx_content_type: changelog +pcx_content_type: release-notes title: "Historical (2024)" sidebar: order: 10044 diff --git a/src/content/docs/waf/change-log/scheduled-changes.mdx b/src/content/docs/waf/change-log/scheduled-changes.mdx index b2780201ab9562e..a65c44731d55892 100644 --- a/src/content/docs/waf/change-log/scheduled-changes.mdx +++ b/src/content/docs/waf/change-log/scheduled-changes.mdx @@ -1,6 +1,6 @@ --- type: table -pcx_content_type: changelog +pcx_content_type: release-notes title: Scheduled changes sidebar: order: 2 @@ -23,58 +23,25 @@ import { RuleID } from "~/components"; - 2025-02-11 2025-02-18 + 2025-02-24 Log - 100715 + 100718A - + - FortiOS - Auth Bypass - CVE:CVE-2024-55591 + SonicWall SSLVPN 2 - Auth Bypass - CVE:CVE-2024-53704 This is a New Detection - 2025-02-11 2025-02-18 + 2025-02-24 Log - 100716 + 100720 - + - Ivanti - Auth Bypass - CVE:CVE-2021-44529 - This is a New Detection - - - 2025-02-11 - 2025-02-18 - Log - 100717 - - - - SimpleHelp - Auth Bypass - CVE:CVE-2024-57727 - This is a New Detection - - - 2025-02-11 - 2025-02-18 - Log - 100718 - - - - SonicWall SSLVPN - Auth Bypass - CVE:CVE-2024-53704 - This is a New Detection - - - 2025-02-11 - 2025-02-18 - Log - 100719 - - - - Yeti Platform - Auth Bypass - CVE:CVE-2024-46507 + Palo Alto Networks - Auth Bypass - CVE:CVE-2025-0108 This is a New Detection diff --git a/src/content/release-notes/waf.yaml b/src/content/release-notes/waf.yaml index d96cff96ca32769..9b660183e1baaed 100644 --- a/src/content/release-notes/waf.yaml +++ b/src/content/release-notes/waf.yaml @@ -5,11 +5,14 @@ productLink: "/waf/" productArea: Application security productAreaLink: /fundamentals/reference/changelog/security/ entries: - - publish_date: "2025-02-11" - scheduled_date: "2025-02-18" + - publish_date: "2025-02-18" + scheduled_date: "2025-02-24" individual_page: true scheduled: true link: "/waf/change-log/scheduled-changes/" + - publish_date: "2025-02-18" + individual_page: true + link: "/waf/change-log/2025-02-18/" - publish_date: "2025-02-11" individual_page: true link: "/waf/change-log/2025-02-11/"