Skip to content

Commit

Permalink
[EDU-5986] Review Changelog previous year (#1428)
Browse files Browse the repository at this point in the history
* refactor: delete items in table - Custom Allowed Rules PT/EN

* refactor: remove item - Changelog previous years

* refactor: adjust changelog previous years PT-BR

* refactor: add item to changelog - EN/PT
  • Loading branch information
MarianaAguilera authored Jan 13, 2025
1 parent b022a85 commit 77897d7
Show file tree
Hide file tree
Showing 6 changed files with 15 additions and 6 deletions.
7 changes: 7 additions & 0 deletions src/content/docs/en/pages/changelog/changelog.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -374,7 +374,14 @@ As part of our ongoing efforts to make the admin experience more productive on *
- **Azion CLI**
Azion CLI (Beta) is at version 0.28.0.

- **Web Application Firewall**

**Deprecated**

Log4j vulnerability mitigation: WAF security rules to protect customers from CVE-2021-44228 were deprecated.

## Bug Fixes

**Edge Orchestrator**

- **Azion CLI**
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ See the updates from previous years below.

**Web Application Firewall**

* **Log4j vulnerability mitigation:** WAF security rules were updated to protect all of our WAF customers from CVE-2021-44228. Click [here](https://www.azion.com/en/blog/how-azion-protects-our-customers-from-cve-2021-44228/) for more information.
* **Log4j vulnerability mitigation:** WAF security rules were updated to protect all of our WAF customers from CVE-2021-44228.

***

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -68,8 +68,6 @@ See the list of all available internal rules below:
| 1108 | Possible RFI attack: scheme `phar://` found in Body, Query String or Cookies. |
| 1109 | Possible RFI attack: scheme `file://` found in Body, Query String or Cookies. |
| 1110 | Possible RFI attack: scheme `gopher://` found in Body, Query String or Cookies. |
| 1198 | Possible RCE attack: validation with `log4j` (Log4Shell) in `HEADERS_VAR`. |
| 1199 | Possible RCE attack: validation with `log4j` (Log4Shell) in Body, Path, Query String, Headers, or Cookies. |
| 1200 | Possible Directory Traversal attack: double dot `..` found in Body, Path, Query String or Cookies. |
| 1202 | Possible Directory Traversal attack: obvious probe `/etc/passwd` found in Body, Path, Query String or Cookies. |
| 1203 | Possible Directory Traversal attack: obvious Windows path `c:\\` found in Body, Path, Query String or Cookies. |
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ Acompanhe as atualizações de anos anteriores a seguir.

**Web Application Firewall**

* **Mitigação da vulnerabilidade Log4j:** as regras de segurança de nosso WAF foram atualizadas para proteger todos os nossos clientes do WAF contra a CVE-2021-44228. Clique [aqui](https://www.azion.com/pt-br/blog/como-a-azion-protege-nossos-clientes-do-cve-2021-44228/) para mais informações.
* **Mitigação da vulnerabilidade Log4j:** as regras de segurança de nosso WAF foram atualizadas para proteger todos os nossos clientes do WAF contra a CVE-2021-44228.

***

Expand Down
6 changes: 6 additions & 0 deletions src/content/docs/pt-br/pages/changelog/changelog.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -370,6 +370,12 @@ Como parte de nossos esforços contínuos para tornar a experiência do administ

Azion CLI (Beta) está na versão 0.28.0.

- **Web Application Firewall**

**Depreciado**

Mitigação da vulnerabilidade Log4j: as regras de segurança do WAF para proteger todos os nossos clientes do WAF contra a CVE-2021-44228 foram depreciadas.

## Bug Fixes

**Edge Orchestrator**
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -67,8 +67,6 @@ Veja, abaixo, a lista de todas as regras internas disponíveis:
| 1108 | Possível ataque de RFI: esquema `phar://` encontrado no `Body`, `Query String` ou `Cookies` |
| 1109 | Possível ataque de RFI: esquema `file://` encontrado no `Body`, `Query String` ou `Cookies` |
| 1110 | Possível ataque de RFI: esquema `gopher://` encontrado no `Body`, `Query String` ou `Cookies` |
| 1198 | Possível ataque de RCE: validação com `log4j` (Log4Shell) no `HEADERS_var` |
| 1199 | Possível ataque de RCE: validação com `log4j` (Log4Shell) no `Body`, `Path`, `Query String` ou `Cookies` |
| 1200 | Possível ataque de Directory Traversal: ponto duplo `..` encontrado no `Body`, `Path`, `Query String` ou `Cookies` |
| 1202 | Possível ataque de Directory Traversal: tentativa evidente de travessia de diretório `/etc/passwd` encontrada no `Body`, `Path`, `Query String` ou `Cookies` |
| 1203 | Possível ataque de Directory Traversal: tentativa evidente de travessia de diretório com caminho `c:\\` encontrado no `Body`, `Path`, `Query String` ou `Cookies` |
Expand Down

0 comments on commit 77897d7

Please sign in to comment.