coreruleset.org/20241029/crs-versions-4-8-0-and-3-3-7-released

Preview meta tags from the coreruleset.org website.

Linked Hostnames

9

Thumbnail

Search Engine Appearance

Google

https://coreruleset.org/20241029/crs-versions-4-8-0-and-3-3-7-released

CRS versions 4.8.0 and 3.3.7 released

The OWASP CRS team is pleased to announce the release of two new CRS versions: v4.8.0 and v3.3.7. For downloads and installation instructions, please refer to …



Bing

CRS versions 4.8.0 and 3.3.7 released

https://coreruleset.org/20241029/crs-versions-4-8-0-and-3-3-7-released

The OWASP CRS team is pleased to announce the release of two new CRS versions: v4.8.0 and v3.3.7. For downloads and installation instructions, please refer to …



DuckDuckGo

https://coreruleset.org/20241029/crs-versions-4-8-0-and-3-3-7-released

CRS versions 4.8.0 and 3.3.7 released

The OWASP CRS team is pleased to announce the release of two new CRS versions: v4.8.0 and v3.3.7. For downloads and installation instructions, please refer to …

  • General Meta Tags

    10
    • title
      CRS versions 4.8.0 and 3.3.7 released | CRS Project
    • charset
      utf-8
    • viewport
      width=device-width,initial-scale=1
    • Content-Security-Policy
      upgrade-insecure-requests
    • description
      The OWASP CRS team is pleased to announce the release of two new CRS versions: v4.8.0 and v3.3.7. For downloads and installation instructions, please refer to …
  • Open Graph Meta Tags

    7
    • og:url
      https://coreruleset.org/20241029/crs-versions-4-8-0-and-3-3-7-released/
    • og:site_name
      CRS Project
    • og:title
      CRS versions 4.8.0 and 3.3.7 released
    • og:description
      The OWASP CRS team is pleased to announce the release of two new CRS versions: v4.8.0 and v3.3.7. For downloads and installation instructions, please refer to the Installation page. These are security releases which fix a recently discovered partial request body bypass of CRS. On some platforms running CRS v3.3.6 and earlier on the v3 release line or v4.7.0 and earlier on the v4 release line, it is possible to submit a specially crafted multipart or JSON request whose body content will bypass the inspection of the majority of CRS rules on a default installation. CRS users are strongly encouraged to update to a fixed version to resolve this issue.
    • og:locale
      en
  • Twitter Meta Tags

    4
    • twitter:card
      summary_large_image
    • twitter:image
      https://coreruleset.org/images/social-preview.svg
    • twitter:title
      CRS versions 4.8.0 and 3.3.7 released
    • twitter:description
      The OWASP CRS team is pleased to announce the release of two new CRS versions: v4.8.0 and v3.3.7. For downloads and installation instructions, please refer to the Installation page. These are security releases which fix a recently discovered partial request body bypass of CRS. On some platforms running CRS v3.3.6 and earlier on the v3 release line or v4.7.0 and earlier on the v4 release line, it is possible to submit a specially crafted multipart or JSON request whose body content will bypass the inspection of the majority of CRS rules on a default installation. CRS users are strongly encouraged to update to a fixed version to resolve this issue.
  • Link Tags

    9
    • apple-touch-icon
      https://coreruleset.org/apple-touch-icon.png
    • icon
      https://coreruleset.org/favicon.ico
    • icon
      https://coreruleset.org/favicon.svg
    • icon
      https://coreruleset.org/favicon-32x32.png
    • preload
      https://coreruleset.org/fonts/nunito-v25-latin-regular.woff2

Links

25