Azure WAF exclusions clarity of 920420

Alex 515 Reputation points
2025-07-23T13:30:50.3566667+00:00

Hello,Good day!

In Azure Frontdoor and AppGw WAF logs, I recently saw some requests were getting blocked by the ruleID 920420.

Upon checking the logs, it said matchVariableName 'Header Value: Content-type' and matchVariableValue 'application/gzip' is not allowed by the policy, which is basically that ruleID 920420.

Couple of queries:

  1. Does 920420 ruleID evaluates/inspects only the Content-Type header in the requests?
  2. If yes, then creating an exclusion with matchVariable as HeaderName Equals Content-type, is basically equivalent to disabling that ruleID, right?
Azure Web Application Firewall
{count} votes

1 answer

Sort by: Most helpful
  1. G Sree Vidya 4,005 Reputation points Microsoft External Staff Moderator
    2025-07-23T20:55:54.27+00:00

    Hi Alex

    Rule ID 920420 is part of the OWASP Core Rule Set (CRS) used by Azure WAF (both App Gateway and Front Door). This rule is designed to detect potentially malicious or unexpected content types in HTTP headers, particularly the Content-Type header.> Does 920420 ruleID evaluates/inspects only the Content-Type header in the requests?

    If yes, then creating an exclusion with matchVariable as HeaderName Equals Content-type, is basically equivalent to disabling that ruleID, right?

    Yes, your understanding is correct.

    Azure WAF rule ID 920420 specifically inspects the Content-Type header in incoming HTTP requests. It is part of the Default Rule Set (DRS) and is categorized under protocol enforcement. The rule is triggered when the Content-Type header contains a value that is not allowed by policy, such as application/gzip, */*, or other non-standard or potentially risky types

    Creating an exclusion with matchVariable set to RequestHeaderNames and selectorMatchOperator set to Equals with selector as Content-Type is not entirely equivalent to disabling ruleID 920420, but it effectively prevents the rule from evaluating the Content-Type header, achieving a similar outcome for that specific header. Here's the detailed explanation based on Microsoft documentation:

    For further guidance, you might consider checking out the Web Application Firewall exclusion lists documentation, which covers how to configure these exclusions effectively.


    I hope this helps! If these answers your query, do click the "Upvote" and click "Accept the answer" of which might be beneficial to other community members reading this thread.

    If the above is unclear or you are unsure about something, please add a comment below.

    1 person found this answer helpful.
    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.