F5 Rules for AWS WAF CVE-2021-40438
Hello, We're checking in the AWS marketplace for theF5 Rules for AWS WAF - Common Vulnerabilities and Exposures (CVE) Rulesand want to check ifCVE-2021-40438 is covered by this rule set? https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40438322Views1like4CommentsHow much does it cost to apply "F5 Rules for AWS WAF - Common Vulnerabilities & Exposures (CVE) Rules" to Cloudfront?
Hello How much does it cost to apply "F5 Rules for AWS WAF - Common Vulnerabilities & Exposures (CVE) Rules" to Cloudfront? The product page describes it as follows https://aws.amazon.com/marketplace/pp/prodview-y4tlpqpjpm4qi Monthly fee for each applicable region (pro-rated per hour) $20 / unit I understand that there is a fee for each region when applied to ALB, but what about Cloudfront? Will I be charged for all regions?372Views1like1CommentAWS WAF - Web Exploits Rules by F5 - Log4J Update
Hi F5 Does the ruleset "AWS WAF - Web Exploits Rules by F5" now offer any protection from requests seeking to exploit the Log4J vulnerability described in CVE-2021-44228 If not currently - can you advise when we may expect an update? Thank you486Views1like2CommentsAWS F5 Managed WAF rules not blocking simple SQL injection
We have subscribed to the "F5 Rules for AWS WAF - API Security Rules". Product page: https://aws.amazon.com/marketplace/pp/B07M948X2H. A Web ACL has been created in our AWS account using this group of rules. It has been then associated to an API published on the Amazon API Gateway. For some reason, even basic SQL injection are not blocked. For instance, a request with a url-encoded string like ' OR '1'='1 (see https://en.wikipedia.org/wiki/SQL_injection) in querystring is not blocked. Switching to a group of rules managed by a competitor (Fortinet) resolved our problem. We are surprised the F5 rules are so permissive. Maybe we are missing something. Any thoughts ? Thank you. Related question: https://devcentral.f5.com/s/feed/0D51T00006i7iONSAY1KViews1like15Comments