The website uses arguments in the URL to determine the number of elements to display.
But malicious Internet users use this argument to overload the server by setting the value to 9999.
for example, we have this kind of query
/us/articles-cc?from-xhr&resultsPerPage=99999&_=77639142094571
As you can see, the resultsPerPage parameter is used to force the website to calculate and display 99999 elements.
To deny this kind of malicious query we can prevent the reverse-proxy from transmitting the request to the backend if the argument is greater than a value that makes sense for viewing the page ( max 200 for example )
In the left menu to the Web Firewall > Rules,
create a new rule that Deny
accesses
ARGS
Contains
”> < =
are supported ) and the desired value to check the operator in our case “> 200
”Compile Your rule
to make the rule in production mode