WAF Rule Set Update Announcement
Name | waf.sig | ||
Version | 1.1.154 | ||
StoneOS Version | 5.5R2-W-1.1 or above, BDS 5.5R8-3.4 or above | ||
Release Date | 2022-9-14 | New Rules (5) |
Rule ID | Rule Name | Rule Details |
1070210265 | Ruoyi System Arbitrary File Access Vulnerability | Click for Details | |
1070210266 | Weaver OA V8 File Upload Vulnerability | Click for Details | |
1070210267 | CVE-2021-36749: Apache Druid Arbitrary File Access Vulnerability | Click for Details | |
1070210268 | CVE-2020-17519: Apache Flink Directory Traversal Vulnerability | Click for Details | |
1060210144 | Detect Google FeedFetcher Web Crawler | Click for Details | Updated Rules (195) |
Rule ID | Description | Ruel Details |
1020200000 | Server-Side Includes Injection Attack | Click for Details | |
1020400003 | Email Injection Attack | Click for Details | |
1020500001 | PHP Inclusion Command Sequence, such as 'mosConfig_absolute_path' | Click for Details | |
1020500003 | Remote File Inclusion Attack | Click for Details | |
1020400010 | Windows PowerShell Command. | Click for Details | |
1020400011 | Unix Shell Expression. | Click for Details | |
1020400012 | Windows FOR/IF Command. | Click for Details | |
1020400014 | Unix Shell Code. | Click for Details | |
1020400015 | Remote Command Execution: Shellshock-1. | Click for Details | |
1020400016 | Remote Command Execution: Shellshock-2. | Click for Details | |
1020400017 | Restricted File Upload Attempt. | Click for Details | |
1020800019 | HTTP request for Node.js Injection Attack | Click for Details | |
1020100001 | LDAP Injection Attack (by Alonso Parada) | Click for Details | |
1020800000 | PHP Open Tag | Click for Details | |
1020800001 | PHP Script File Upload | Click for Details | |
1020800002 | PHP Injection Attack: Configuration Directive | Click for Details | |
1020800003 | HTTP request for PHP Variables | Click for Details | |
1020800004 | HTTP request for I/O Stream | Click for Details | |
1020800005 | HTTP request for Wrapper Scheme | Click for Details | |
1020800006 | HTTP request for High-Risk PHP Function Name | Click for Details | ... |