Skip to content

Commit a95b994

Browse files
authored
Create 2026-03-12-emergency-waf-release.mdx
1 parent c9b3f5c commit a95b994

File tree

1 file changed

+55
-0
lines changed

1 file changed

+55
-0
lines changed
Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,55 @@
1+
---
2+
title: "WAF Release - 2026-03-12 - Emergency"
3+
description: Cloudflare WAF managed rulesets 2026-03-12 emergency release
4+
date: 2026-03-12
5+
---
6+
7+
import { RuleID } from "~/components";
8+
9+
This week's release introduces new detections for vulnerabilities in Ivanti Endpoint Manager Mobile (CVE-2026-1281 and CVE-2026-1340), alongside a new generic detection rule designed to identify and block Cross-Site Scripting (XSS) injection attempts within the Content-Security-Policy (CSP) HTTP request header.
10+
11+
**Key Findings**
12+
13+
- CVE-2026-1281 & CVE-2026-1340: Ivanti Endpoint Manager Mobile processes HTTP requests through Apache RevwriteMap directives that pass user-controlled input to Bash scripts (/mi/bin/map-appstore-url and /mi/bin/map-aft-store-url). Bash scripts do not sanitize user input and are vulnerable to shell arithmetic expansion thereby allowing attackers to achieve unauthenticated remote code execution.
14+
- Generic XSS in CSP Header: This rule identifies malicious payloads embedded within the request's Content-Security-Policy header. It specifically targets scenarios where web frameworks or applications trust and extract values directly from the CSP header in the incoming request without sufficient validation. Attackers can provide crafted header values to inject scripts or malicious directives that are subsequently processed by the server.
15+
16+
**Impact**
17+
18+
Successful exploitation of Ivanti EPMM vulnerability allows unauthenticated remote code execution and generic XSS in CSP header allows attackers to inject malicious scripts during page rendering. In environments using server-side caching, this poisoned XSS content can subsequently be cached and automatically served to all visitors.
19+
<table style="width: 100%">
20+
<thead>
21+
<tr>
22+
<th>Ruleset</th>
23+
<th>Rule ID</th>
24+
<th>Legacy Rule ID</th>
25+
<th>Description</th>
26+
<th>Previous Action</th>
27+
<th>New Action</th>
28+
<th>Comments</th>
29+
</tr>
30+
</thead>
31+
<tbody>
32+
<tr>
33+
<td>Cloudflare Managed Ruleset</td>
34+
<td>
35+
<RuleID id="5ae86a9bda0c41dbb905132f796ea2f6" />
36+
</td>
37+
<td>N/A</td>
38+
<td>Ivanti EPMM - Code Injection - CVE:CVE-2026-1281 CVE:CVE-2026-1340</td>
39+
<td>Log</td>
40+
<td>Block</td>
41+
<td>This is a new detection.</td>
42+
</tr>
43+
<tr>
44+
<td>Cloudflare Managed Ruleset</td>
45+
<td>
46+
<RuleID id="35978af68e374a059e397bf5ee964a8c" />
47+
</td>
48+
<td>N/A</td>
49+
<td>Anomaly:Header:Content-Security-Policy</td>
50+
<td>N/A</td>
51+
<td>Block</td>
52+
<td>This is a new detection.</td>
53+
</tr>
54+
</tbody>
55+
</table>

0 commit comments

Comments
 (0)