Overview for rules released by Trustwave SpiderLabs in October for ModSecurity Commercial Rules package. The rules are available for versions 2.9.x and 3.x of ModSecurity.
ModSecurity Commercial Rules detect attacks or classes of attacks on web applications and their components as well as provide virtual patches for public vulnerabilities.
WordPress Plugin wpDiscuz < 7.3.4 CSRF CVE-2021-24806
Wordpress Plugin BulletProof Security 5.1 File Path Traversal CVE-2021-39327
Atlassian Confluence < 7.4.10 < 7.5.0 < 7.12.3 - Pre-Authorization POM Arbitrary File Read CVE-2021-26085
Atlassian Confluence < 7.4.10 < 7.5.0 < 7.12.3 - Pre-Authorization Arbitrary File Read to CVE-2021-26085
Wordpress Plugin MStore API 2.0.6 - Arbitrary File Upload to RCE
Wordpress Plugin TheCartPress <1.5.3.6 Unauthenticated Privilege Escalation
WordPress Plugin Cardinity Payment Gateway for WooCommerce < 3.0.7 - Reflected XSS
WordPress Plugin Paypal Donation < 1.3.1 - CSRF CVE-2021-24572
WordPress Plugin Paypal Donation < 1.3.1 - XSS CVE-2021-24570
WordPress Plugin JS Job Manager <= 1.1.7 CSRF
WordPress Plugin Frontend Manager for WooCommerce < 6.5.12 - Customer/Subscriber+ SQLi CVE-2021-24835
WordPress Plugin Asgaros Forum < 1.15.13 - Unauthenticated SQLi CVE-2021-24827
WordPress Plugins from Avirtum - XSS
WordPress Plugin Loco Translate < 2.5.4 - CSRF CVE-2021-24721
Apache HTTP Server <2.4.50 - Path Traversal to RCE CVE-2021-42013
WordPress Plugin Check & Log Email < 1.0.3 - SQLi CVE-2021-24774
WordPress Plugin Age Gate <= 2.16.3 - Stored XSS
WordPress Plugin Comment Link Remove and Other Comment Tools <= 2.1.4 - CSRF to bulk comment deletion CVE-2021-24725
All the rules released this month are available for download and can be configured using the ModSecurity Dashboard. The rules are associated with the default profile and enabled for all licensed servers. To verify the rules were successfully downloaded by ModSecurity, log in to the ModSecurity Dashboard and verify the server "Last seen" date, which indicates the last successful download for the specified server.