Skip to content

Edge rules

This page lists the edge rules implemented in STACKIT Content Delivery Network (CDN) Web Application Firewall (WAF).

These rules focus on detecting security tools and scanners.

The rules in this table target specific attacks on the HTTP protocol, such as HTTP request smuggling and response splitting.

These rules detect attempts to include files that are local to the web server and should not be accessible to users. Exploiting this type of attack can compromise the web application or server.

These rules detect attempts to include remote resources in the web application that may be executed. Exploiting this type of attack can compromise the web application or server.

Rule group: 934 - Application attack GENERIC

Section titled “Rule group: 934 - Application attack GENERIC”

Rule group: 942 - Application attack SQL injection

Section titled “Rule group: 942 - Application attack SQL injection”

This table lists rules that protect against SQL injection (SQLi) attacks. SQL injection occurs when an attacker sends specially crafted control characters to parameters intended for data only. The application then passes these characters to the database, which can alter the intended meaning of the SQL query.

Rule group: 943 - Application attack session fixation

Section titled “Rule group: 943 - Application attack session fixation”

These rules protect against session fixation attacks.

These rules protect against general data leakages.

These rules protect against data leakages from backend SQL servers, which often indicate the presence of SQL injection vulnerabilities.

These rules protect against data leakages caused by Java.

These rules protect against data leakages caused by PHP.

These rules protect against data leakages caused by Microsoft IIS.