Those request are trying to exploit a vulnerability in the way OGNL expressions are being processed in Struts.
I’m trying to create a firewall rule to block them, without success. I suspect that it is because the code being injected appears as a #fragment part in the url and is not being filtered.
I’m right? Is there any way I can block those requests?
Fragments are used by the browser to reference content, they aren’t sent to the webserver (or Cloudflare) w/ the request for the content. It’s possible they are sending similar character pattern.
We have a lot of rules in CF Managed ruleset that cover a variety of strutts vulnerabilities. Do you have these enabled already ?