NGINX App Protect WAF Release 3.11

June 28, 2022

In this release, support for NGINX App Protect WAF is added to NGINX Plus R27.

This release includes updated signatures for the Anti Automation (bot defense) feature as follows:

  • Added the following HTTP Library bot signatures: req
  • Added the following Exploit Tool bot signatures: spring4shell-scan, DIVD Vulnerability Scanner, JNDI Exploit Bot, D-Link DNS Change Exploiter
  • Added the following Spam Bot bot signatures: l9scan, HomeNet
  • Added the following Crawler bot signatures: Keybot Translation-Search-Machine
  • Updated the following Exploit Tool bot signatures: JNDI Exploit Bot, Hello-World API

New Features

Supported Packages

App Protect

Debian 10
  • app-protect_27+3.954.0-1~buster_amd64.deb
Ubuntu 18.04
  • app-protect_27+3.954.0-1~bionic_amd64.deb
Ubuntu 20.04
  • app-protect_27+3.954.0-1~focal_amd64.deb
CentOS 7.4+ / RHEL 7.4+ / Amazon Linux 2
  • app-protect-27+3.954.0-1.el7.ngx.x86_64.rpm
RHEL 8.1+
  • app-protect-27+3.954.0-1.el8.ngx.x86_64.rpm
Oracle Linux 8.1+
  • app-protect-27+3.954.0-1.el8.ngx.x86_64.rpm

NGINX Plus

  • NGINX Plus R27

Resolved Issues

  • 6084 Fixed - The nginx -t command will fail in cases when there is no user directive defined in nginx.conf.
  • 6321 Fixed - Updated the max_request_size log format parameter to accept the 2k range value using k string.

Important Note

When upgrading the NGINX App Protect WAF deployments on Virtual Machines (VM), where the upgrade includes a NGINX Plus release upgrade as well, customers might witness some error messages about the upgrade failure. Customers are advised to ignore these messages and continue with the upgrade procedure as described in the NGINX App Protect WAF Admin guide. Additional NGINX restart might be required in order to complete the upgrade procedure.