Cloudflare Web Application Firewall Rule Generation

The Invicti Standard 5.5 November 2019 Update introduced a new Cloudflare WAF rule generation capability. This allows you to protect vulnerable areas of your web application while you temporarily defer fixing some detected vulnerabilities.

Cloudflare Web Application Firewall Rule Generation

In the recent Netsparker Standard 5.5 November 2019 Update, we introduced several new WAF integrations in Netsparker Standard. Cloudflare Web Services WAF is one of those integrations.

Cloudflare Web Services Web Application Firewall examines HTTP requests that are sent to your website. Cloudflare is a type of reverse-proxy that means the WAF sits in front of your web servers and forwards client request to them. First, though, it applies rules that protect your web applications from attacks made possible by cross-site forgery, cross-site scripting (XSS), file inclusion, SQL injection and other vulnerabilities.

Generating Cloudflare WAF rules enables you to temporarily defer fixing detected vulnerabilities, yet protect vulnerable areas of your web application at the same time. Cloudflare WAF rules are generated from the Web Application Firewall tab in the Options dialog.

Cloudflare Web Application Firewall Rule Generation

For further information, see Generating Cloudflare Web Application Firewall Rules From Netsparker. For further information on other WAFs available in Netsparker Standard, see Web Application Firewall Support. For further information on other features in the latest release, see Netsparker Standard 5.5 – November 2019 Update.