Overview for rules released by Trustwave SpiderLabs in November for ModSecurity Commercial Rules package. The rules are available for versions 2.9.x and 3.x of ModSecurity.
ModSecurity Commercial Rules detect attacks or classes of attacks on web applications and their components as well as provide virtual patches for public vulnerabilities.
WordPress Plugin Five Star Restaurant Reservations < 2.4.12 - Unauthenticated Arbitrary Status Update to Stored XSS CVE-2022-0421
WordPress Plugin AWP Classifieds Plugin < 4.3 - Unauthenticated SQLi CVE-2022-3254
WordPress Plugin Seed Social < 2.0.4 - Admin+ Stored XSS CVE-2022-3836
WordPress Plugin WP Admin UI Customize < 1.5.13 - Admin+ Stored XSS CVE-2022-3824
WordPress Plugin Broken Link Checker < 1.11.20 - Admin+ Stored XSS CVE-2022-3922
Fortinet FortiOS, FortiProxy, FortiSwitchManager Auth Bypass CVE-2022-40684
WordPress Plugin WooCommerce Dropshipping < 4.4 - Unauthenticated SQLi CVE-2022-3481
WordPress Plugin ProfileGrid < 5.1.1 - Reflected XSS CVE-2022-3922
Juniper Junos OS - PHP archive file deserialization to RCE CVE-2022-22241
Juniper Junos OS - PHP local file inclusion CVE-2022-22246
WordPress Plugin Chaty < 3.0.3 - Admin+ SQLi CVE-2022-3858
WordPress Plugin Donations via PayPal < 11.9.9 - Admin+ Stored XSS CVE-2022-3822
How to Update
All the rules released this month are available for download and can be configured using the ModSecurity Dashboard. The rules are associated with the default profile and enabled for all licensed servers. To verify the rules were successfully downloaded by ModSecurity, log in to the ModSecurity Dashboard and verify the server "Last seen" date, which indicates the last successful download for the specified server.