| {"input": "CRS Rule 941100: XSS Attack Detected via libinjection", "output": "(cf.waf.score.xss ge 40)"} |
| {"input": "CRS Rule 941110: XSS Filter - Category 1: Script Tag Vector | Pattern: (?i)<script[^>]*>[\\s\\S]*?", "output": "(http.request.uri.query contains \"<script\" or http.request.body contains \"<script\" or any(http.request.headers.values[*] contains \"<script\"))"} |
| {"input": "CRS Rule 941130: XSS Filter - Category 3: Attribute Vector | Pattern: (?i).(?:\\b(?:(?:x(?:link:href|html|mlns)|data:text/html|formaction)\\b|pattern[\\s\\x0b]*=)|(?:!ENTITY[", "output": "(http.request.uri.query matches \"(xlink:href|formaction|data:text)\" or http.request.body matches \"(xlink:href|formaction|data:text)\")"} |
| {"input": "CRS Rule 941140: XSS Filter - Category 4: Javascript URI Vector | Pattern: (?i)[a-z]+=(?:[^:=]+:.+;)*?[^:=]+:url\\(javascript", "output": "(http.request.uri.query contains \"javascript:\" or http.request.body contains \"javascript:\" or http.request.uri.query matches \"url\\(javascript\")"} |
| {"input": "CRS Rule 941160: NoScript XSS InjectionChecker: HTML Injection", "output": "(http.request.uri.query matches \"<(script|iframe|object|embed)\" or http.request.body matches \"<(script|iframe|object|embed)\")"} |
| {"input": "CRS Rule 941170: NoScript XSS InjectionChecker: Attribute Injection", "output": "(http.request.uri.query matches \"(xlink:href|formaction|data:text)\" or http.request.body matches \"(xlink:href|formaction|data:text)\")"} |
| {"input": "CRS Rule 941180: Node-Validator Deny List Keywords | Pattern: document.cookie document.domain document.querySelector document.body.appendChild document.write .par", "output": "(any(http.request.cookies.values[*] matches \"<[^>]*on[a-z]+\"))"} |
| {"input": "CRS Rule 941190: IE XSS Filters - Attack Detected | Pattern: (?i:<style.*?>.*?(?:@[i\\x5c]|(?:[:=]|&#x?0*(?:58|3A|61|3D);?).*?(?:[(\\x5c]|&#x?0*(?:40|28|92|5C);?))", "output": "(http.request.uri.query matches \"(?i:<style.*?>.*?(?:@[i\\\\x5c]|(?:[:=]|&#x?0*(?:58|3A|61|3D);?).*?(?:[(\\\\x5c]|&#x?0*(?:40|28|92|5C);?))\") or (any(http.request.cookies.values[*] matches \"<[^>]*on[a-z]+\"))"} |
| {"input": "CRS Rule 941200: IE XSS Filters - Attack Detected | Pattern: (?i:<.*[:]?vmlframe.*?[\\s/+]*?src[\\s/+]*=)", "output": "(http.request.uri.query matches \"(?i:<.*[:]?vmlframe.*?[\\\\s/+]*?src[\\\\s/+]*=)\") or (any(http.request.cookies.values[*] matches \"<[^>]*on[a-z]+\"))"} |
| {"input": "CRS Rule 941210: Javascript Word Detected", "output": "(any(http.request.cookies.values[*] contains \"<script\")) or (http.request.uri.query matches \"(?i)(?:j|&#(?:0*(?:74|106)|x0*[46]A);)(?:[\\\\t\\\\n\\\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);)\") or (http.request.uri.path contains \"<script\")"} |
| {"input": "CRS Rule 941220: IE XSS Filters - Attack Detected", "output": "(http.request.uri.query matches \"(?i)(?:v|&#(?:0*(?:118|86)|x0*[57]6);)(?:[\\\\t\\\\n\\\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);)\") or (any(http.request.cookies.values[*] matches \"<[^>]*on[a-z]+\"))"} |
| {"input": "CRS Rule 941230: IE XSS Filters - Attack Detected | Pattern: (?i)<EMBED[\\s/+].*?(?:src|type).*?=", "output": "(http.request.uri.query matches \"(?i)<EMBED[\\\\s/+].*?(?:src|type).*?=\") or (any(http.request.cookies.values[*] matches \"<[^>]*on[a-z]+\"))"} |
| {"input": "CRS Rule 941240: IE XSS Filters - Attack Detected | Pattern: <[?]?import[\\s/+\\S]*?implementation[\\s/+]*?=", "output": "(http.request.uri.query matches \"<[?]?import[\\\\s/+\\\\S]*?implementation[\\\\s/+]*?=\") or (any(http.request.cookies.values[*] matches \"<[^>]*on[a-z]+\"))"} |
| {"input": "CRS Rule 941250: IE XSS Filters - Attack Detected | Pattern: (?i:<META[\\s/+].*?http-equiv[\\s/+]*=[\\s/+]*[\\\"'`]?(?:(?:c|&#x?0*(?:67|43|99|63);?)|(?:r|&#x?0*(?:82|", "output": "(http.request.uri.query matches \"(?i:<META[\\\\s/+].*?http-equiv[\\\\s/+]*=[\\\\s/+]*[\\\\\\\"'`]?(?:(?:c|&#x?0*(?:67|43|99|63);?)|(?:r|&#x?0*(?:82|\") or (any(http.request.cookies.values[*] matches \"<[^>]*on[a-z]+\"))"} |
| {"input": "CRS Rule 941260: IE XSS Filters - Attack Detected | Pattern: (?i:<META[\\s/+].*?charset[\\s/+]*=)", "output": "(http.request.uri.query matches \"(?i:<META[\\\\s/+].*?charset[\\\\s/+]*=)\") or (any(http.request.cookies.values[*] matches \"<[^>]*on[a-z]+\"))"} |
| {"input": "CRS Rule 941270: IE XSS Filters - Attack Detected | Pattern: (?i)<LINK[\\s/+].*?href[\\s/+]*=", "output": "(http.request.uri.query matches \"(?i)<LINK[\\\\s/+].*?href[\\\\s/+]*=\") or (any(http.request.cookies.values[*] matches \"<[^>]*on[a-z]+\"))"} |
| {"input": "CRS Rule 941280: IE XSS Filters - Attack Detected | Pattern: (?i)<BASE[\\s/+].*?href[\\s/+]*=", "output": "(http.request.uri.query matches \"(?i)<BASE[\\\\s/+].*?href[\\\\s/+]*=\") or (any(http.request.cookies.values[*] matches \"<[^>]*on[a-z]+\"))"} |
| {"input": "CRS Rule 941290: IE XSS Filters - Attack Detected | Pattern: (?i)<APPLET[\\s/+>]", "output": "(http.request.uri.query matches \"(?i)<APPLET[\\\\s/+>]\") or (any(http.request.cookies.values[*] matches \"<[^>]*on[a-z]+\"))"} |
| {"input": "CRS Rule 941300: IE XSS Filters - Attack Detected | Pattern: (?i)<OBJECT[\\s/+].*?(?:type|codetype|classid|code|data)[\\s/+]*=", "output": "(http.request.uri.query matches \"(?i)<OBJECT[\\\\s/+].*?(?:type|codetype|classid|code|data)[\\\\s/+]*=\") or (any(http.request.cookies.values[*] matches \"<[^>]*on[a-z]+\"))"} |
| {"input": "CRS Rule 941310: US-ASCII Malformed Encoding XSS Filter - Attack Detected | Pattern: \\xbc[^\\xbe>]*[\\xbe>]|<[^\\xbe]*\\xbe", "output": "(http.request.uri.query matches \"\\\\xbc[^\\\\xbe>]*[\\\\xbe>]|<[^\\\\xbe]*\\\\xbe\") or (any(http.request.cookies.values[*] matches \"<[^>]*on[a-z]+\"))"} |
| {"input": "CRS Rule 941350: UTF-7 Encoding IE XSS - Attack Detected | Pattern: \\+ADw-.*(?:\\+AD4-|>)|<.*\\+AD4-", "output": "(http.request.uri.query matches \"\\\\+ADw-.*(?:\\\\+AD4-|>)|<.*\\\\+AD4-\") or (any(http.request.cookies.values[*] matches \"<[^>]*on[a-z]+\"))"} |
| {"input": "CRS Rule 941360: JSFuck / Hieroglyphy obfuscation detected | Pattern: ![!+ ]\\[\\]", "output": "(http.request.uri.query matches \"![!+ ]\\\\[\\\\]\") or (any(http.request.cookies.values[*] matches \"<[^>]*on[a-z]+\"))"} |
| {"input": "CRS Rule 941370: JavaScript global variable found | Pattern: (?:self|document|this|top|window)\\s*(?:/\\*|[\\[)]).+?(?:\\]|\\*/)", "output": "(any(http.request.cookies.values[*] contains \"<script\")) or (http.request.uri.query matches \"(?:self|document|this|top|window)\\\\s*(?:/\\\\*|[\\\\[)]).+?(?:\\\\]|\\\\*/)\") or (http.request.uri.path contains \"<script\")"} |
| {"input": "CRS Rule 941390: Javascript method detected | Pattern: (?i)\\b(?:eval|set(?:timeout|interval)|new[\\s\\x0b]+Function|a(?:lert|tob)|btoa|(?:promp|impor)t|con(?", "output": "(any(http.request.cookies.values[*] contains \"<script\")) or (http.request.uri.query matches \"(?i)\\\\b(?:eval|set(?:timeout|interval)|new[\\\\s\\\\x0b]+Function|a(?:lert|tob)|btoa|(?:promp|impor)t|con(?\") or (http.request.uri.path contains \"<script\")"} |
| {"input": "CRS Rule 941400: XSS JavaScript function without parentheses | Pattern: ((?:\\[[^\\]]*\\][^.]*\\.)|Reflect[^.]*\\.).*(?:map|sort|apply)[^.]*\\..*call[^`]*`.*`", "output": "(any(http.request.cookies.values[*] contains \"<script\")) or (http.request.uri.path contains \"<script\") or (http.request.uri.query matches \"((?:\\\\[[^\\\\]]*\\\\][^.]*\\\\.)|Reflect[^.]*\\\\.).*(?:map|sort|apply)[^.]*\\\\..*call[^`]*`.*`\")"} |
| {"input": "CRS Rule 941101: XSS Attack Detected via libinjection", "output": "(cf.waf.score.xss ge 40)"} |
| {"input": "CRS Rule 941120: XSS Filter - Category 2: Event Handler Vector | Pattern: (?i)[\\s\\\"'`;/0-9=\\x0B\\x09\\x0C\\x3B\\x2C\\x28\\x3B]on[a-zA-Z]{3,50}[\\s\\x0B\\x09\\x0C\\x3B\\x2C\\x28\\x3B]*?=[^=", "output": "(http.request.uri.query matches \"on(error|load|click|mouse)\" or http.request.body matches \"on(error|load|click|mouse)\")"} |
| {"input": "CRS Rule 941150: XSS Filter - Category 5: Disallowed HTML Attributes | Pattern: (?i)\\b(?:s(?:tyle|rc)|href)\\b[\\s\\S]*?=", "output": "(http.request.uri.query matches \"(?i)\\\\b(?:s(?:tyle|rc)|href)\\\\b[\\\\s\\\\S]*?=\") or (any(http.request.cookies.values[*] matches \"<[^>]*on[a-z]+\"))"} |
| {"input": "CRS Rule 941181: Node-Validator Deny List Keywords | Pattern: -->", "output": "(any(http.request.cookies.values[*] matches \"<[^>]*on[a-z]+\"))"} |
| {"input": "CRS Rule 941320: Possible XSS Attack Detected - HTML Tag Handler", "output": "(http.request.uri.query contains \"<script\") or (any(http.request.cookies.values[*] matches \"<[^>]*on[a-z]+\"))"} |
| {"input": "CRS Rule 941330: IE XSS Filters - Attack Detected", "output": "(http.request.uri.query matches \"(?i:[\\\\\\\"'][ ]*(?:[^a-z0-9~_:' ]|in).*?(?:(?:l|\\\\x5cu006C)(?:o|\\\\x5cu006F)(?:c|\\\\x5cu0063)(?:a|\\\\x5cu0061)\") or (any(http.request.cookies.values[*] matches \"<[^>]*on[a-z]+\"))"} |
| {"input": "CRS Rule 941340: IE XSS Filters - Attack Detected | Pattern: (?i)[\\\"\\'][ ]*(?:[^a-z0-9~_:\\' ]|in).+?[.].+?=", "output": "(http.request.uri.query matches \"(?i)[\\\\\\\"\\\\'][ ]*(?:[^a-z0-9~_:\\\\' ]|in).+?[.].+?=\") or (any(http.request.cookies.values[*] matches \"<[^>]*on[a-z]+\"))"} |
| {"input": "CRS Rule 941380: AngularJS client side template injection detected | Pattern: {{.*?}}", "output": "(http.request.uri.query matches \"\\{\\{.*\\}\\}\" or http.request.body matches \"\\{\\{.*\\}\\}\")"} |
| {"input": "CRS Rule 942100: SQL Injection Attack Detected via libinjection | Operator: @detectSQLi", "output": "(cf.waf.score.sqli ge 40)"} |
| {"input": "CRS Rule 942140: SQL Injection Attack: Common DB Names Detected | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(information_schema|mysql\\\\.|sys\\\\.|pg_catalog)\" or http.request.body matches \"(?i)(information_schema|mysql\\\\.|sys\\\\.|pg_catalog)\")"} |
| {"input": "CRS Rule 942151: SQL Injection Attack: SQL function name detected | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(concat|substring|ascii|char|count|group_concat)\\\\(\" or http.request.body matches \"(?i)(concat|substring|ascii|char|count|group_concat)\\\\(\")"} |
| {"input": "CRS Rule 942160: Detects blind sqli tests using sleep() or benchmark() | Pattern: (?i:sleep\\s*?\\(.*?\\)|benchmark\\s*?\\(.*?\\,.*?\\)) | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(sleep\\\\(|benchmark\\\\(|waitfor[\\\\s]+delay)\" or http.request.body matches \"(?i)(sleep\\\\(|benchmark\\\\(|waitfor[\\\\s]+delay)\")"} |
| {"input": "CRS Rule 942170: Detects SQL benchmark and sleep injection attempts including conditional queries | Pattern: (?i)(?:select|;)[\\s\\x0b]+(?:benchmark|if|sleep)[\\s\\x0b]*?\\([\\s\\x0b]*?\\(?[\\s\\x0b]*?[0-9A-Z_a-z]+ | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(sleep\\\\(|benchmark\\\\(|waitfor[\\\\s]+delay)\" or http.request.body matches \"(?i)(sleep\\\\(|benchmark\\\\(|waitfor[\\\\s]+delay)\")"} |
| {"input": "CRS Rule 942190: Detects MSSQL code execution and information gathering attempts | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)union[\\s\\+]+select\" or http.request.body matches \"(?i)union[\\s\\+]+select\")"} |
| {"input": "CRS Rule 942220: Looking for integer overflow attacks, these are taken from skipfish, except 2.2.2250738585072011e-308 is the \\\"magic number\\\" crash | Pattern: ^(?i:-0000023456|4294967295|4294967296|2147483648|2147483647|0000012345|-2147483648|-2147483649|0000023456|2.2250738585072007e-308|2.2250738585072011e-308|1e309)$ | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(2147483647|0x[0-9a-f]{8,}|999999999)\" or http.request.body matches \"(?i)(2147483647|0x[0-9a-f]{8,})\")"} |
| {"input": "CRS Rule 942230: Detects conditional SQL injection attempts | Pattern: (?i)[\\s\\x0b\\(\\)]case[\\s\\x0b]+when.*?then|\\)[\\s\\x0b]*?like[\\s\\x0b]*?\\(|select.*?having[\\s\\x0b]*?[^\\s\\x0b]+[\\s\\x0b]*?[^\\s\\x0b0-9A-Z_a-z]|if[\\s\\x0b]?\\([0-9A-Z_a-z]+[\\s\\x0b]*?[<->~] | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(and|or)[\\\\s]+[0-9]+[\\\\s]*(=|<|>)\" or http.request.body matches \"(?i)(and|or)[\\\\s]+[0-9]+[\\\\s]*(=|<|>)\" or http.request.uri.query matches \"(?i)(and|or)[\\\\s]+['\\\"][^'\\\"]*(=|like)\")"} |
| {"input": "CRS Rule 942240: Detects MySQL charset switch and MSSQL DoS attempts | Pattern: (?i)alter[\\s\\x0b]*?[0-9A-Z_a-z]+.*?char(?:acter)?[\\s\\x0b]+set[\\s\\x0b]+[0-9A-Z_a-z]+|[\\\"'`](?:;*?[\\s\\x0b]*?waitfor[\\s\\x0b]+(?:time|delay)[\\s\\x0b]+[\\\"'`]|;.*?:[\\s\\x0b]*?goto) | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(xp_cmdshell|sp_executesql|sp_makewebtask)\" or http.request.body matches \"(?i)(xp_cmdshell|sp_executesql|sp_makewebtask)\" or any(http.request.cookies.values[*] matches \"(?i)xp_cmdshell\"))"} |
| {"input": "CRS Rule 942250: Detects MATCH AGAINST, MERGE and EXECUTE IMMEDIATE injections | Pattern: (?i:merge.*?using\\s*?\\(|execute\\s*?immediate\\s*?[\\\"'`]|match\\s*?[\\w(),+-]+\\s*?against\\s*?\\() | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(match[\\\\s]+against|merge[\\\\s]+into|execute[\\\\s]+immediate)\" or http.request.body matches \"(?i)(match[\\\\s]+against|merge[\\\\s]+into|execute[\\\\s]+immediate)\")"} |
| {"input": "CRS Rule 942270: Looking for basic sql injection. Common attack string for mysql, oracle and others | Pattern: (?i)union.*?select.*?from | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)union[\\s\\+]+select\" or http.request.body matches \"(?i)union[\\s\\+]+select\")"} |
| {"input": "CRS Rule 942280: Detects Postgres pg_sleep injection, waitfor delay attacks and database shutdown attempts | Pattern: (?i)select[\\s\\x0b]*?pg_sleep|waitfor[\\s\\x0b]*?delay[\\s\\x0b]?[\\\"'`]+[\\s\\x0b]?[0-9]|;[\\s\\x0b]*?shutdown[\\s\\x0b]*?(?:[#;\\{]|/\\*|--) | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(sleep\\\\(|benchmark\\\\(|waitfor[\\\\s]+delay)\" or http.request.body matches \"(?i)(sleep\\\\(|benchmark\\\\(|waitfor[\\\\s]+delay)\")"} |
| {"input": "CRS Rule 942290: Finds basic MongoDB SQL injection attempts | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)union[\\s\\+]+select\" or http.request.body matches \"(?i)union[\\s\\+]+select\")"} |
| {"input": "CRS Rule 942320: Detects MySQL and PostgreSQL stored procedure/function injections | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(create|exec|declare)\" or http.request.body matches \"(?i)(create|exec|declare)\")"} |
| {"input": "CRS Rule 942350: Detects MySQL UDF injection and other data/structure manipulation attempts | Pattern: (?i)create[\\s\\x0b]+function[\\s\\x0b].+[\\s\\x0b]returns|;[\\s\\x0b]*?(?:alter|(?:(?:cre|trunc|upd)at|renam)e|d(?:e(?:lete|sc)|rop)|(?:inser|selec)t|load)\\b[\\s\\x0b]*?[\\(\\[]?[0-9A-Z_a-z]{2,} | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(create|alter)\" or http.request.body matches \"(?i)(create|alter)\")"} |
| {"input": "CRS Rule 942360: Detects concatenated basic SQL injection and SQLLFI attempts | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(select[\\\\s]+.*[\\\\s]+from|insert[\\\\s]+into|delete[\\\\s]+from|update[\\\\s]+.*[\\\\s]+set)\" or http.request.body matches \"(?i)(select[\\\\s]+.*[\\\\s]+from|insert[\\\\s]+into|delete[\\\\s]+from|update[\\\\s]+.*[\\\\s]+set)\" or any(http.request.cookies.values[*] matches \"(?i)select.*from\"))"} |
| {"input": "CRS Rule 942500: MySQL in-line comment detected | Pattern: (?i)/\\*[\\s\\x0b]*?[!\\+](?:[\\s\\x0b\\(\\)\\-0-9=A-Z_a-z]+)?\\*/ | Operator: @rx", "output": "(http.request.uri.query matches \"(--|\\\\#|/\\\\*)\" or http.request.body matches \"(--|\\\\#|/\\\\*)\")"} |
| {"input": "CRS Rule 942540: SQL Authentication bypass (split query) | Pattern: ^(?:[^']*'|[^\\\"]*\\\"|[^`]*`)[\\s\\x0b]*; | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(or[\\\\s]+1=1|or[\\\\s]+['\\\"]1['\\\"]\\\\s*=\\\\s*['\\\"]1)\" or http.request.body matches \"(?i)(or[\\\\s]+1=1|or[\\\\s]+['\\\"]1['\\\"]\\\\s*=\\\\s*['\\\"]1)\")"} |
| {"input": "CRS Rule 942560: MySQL Scientific Notation payload detected | Pattern: (?i)1\\.e(?:[\\(\\),]|\\.[\\$0-9A-Z_a-z]) | Operator: @rx", "output": "(cf.waf.score.sqli ge 40)"} |
| {"input": "CRS Rule 942550: JSON-Based SQL Injection | Pattern: (?i)[\\\"'`][\\[\\{][^#\\]\\}]*[\\]\\}]+[\\\"'`]|(?:[\\-@]>?|<@|@[\\?@]|\\?(?:(?:)|&|\\|#>)|#(?:>>|-)|->>|[<>])[\\\"'`](?:[\\[\\{][^#\\]\\}]*[\\]\\}]+[\\\"'`]|\\$[\\.\\[])|\\bjson_extract\\b[^\\(]*\\([^\\)]*\\) | Operator: @rx", "output": "(cf.waf.score.sqli ge 40)"} |
| {"input": "CRS Rule 942120: SQL Injection Attack: SQL Operator Detected | Operator: @rx", "output": "(cf.waf.score.sqli ge 40)"} |
| {"input": "CRS Rule 942130: SQL Injection Attack: SQL Boolean-based attack detected | Pattern: (?i)[\\s\\x0b\\\"'-\\)`]*?\\b([0-9A-Z_a-z]+)\\b[\\s\\x0b\\\"'-\\)`]*?(?:=|<=>|(?:sounds[\\s\\x0b]+)?like|glob|r(?:like|egexp))[\\s\\x0b\\\"'-\\)`]*?\\b([0-9A-Z_a-z]+)\\b | Operator: @rx", "output": "(cf.waf.score.sqli ge 40)"} |
| {"input": "CRS Rule 942131: SQL Injection Attack: SQL Boolean-based attack detected | Pattern: (?i)[\\s\\x0b\\\"'-\\)`]*?\\b([0-9A-Z_a-z]+)\\b[\\s\\x0b\\\"'-\\)`]*?(?:![<->]|<[=>]?|>=?|\\^|is[\\s\\x0b]+not|not[\\s\\x0b]+(?:like|r(?:like|egexp)))[\\s\\x0b\\\"'-\\)`]*?\\b([0-9A-Z_a-z]+)\\b | Operator: @rx", "output": "(cf.waf.score.sqli ge 40)"} |
| {"input": "CRS Rule 942150: SQL Injection Attack: SQL function name detected | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(concat|substring|ascii|char|count|group_concat)\\\\(\" or http.request.body matches \"(?i)(concat|substring|ascii|char|count|group_concat)\\\\(\")"} |
| {"input": "CRS Rule 942180: Detects basic SQL authentication bypass attempts 1/3 | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(or[\\\\s]+1=1|or[\\\\s]+['\\\"]1['\\\"]\\\\s*=\\\\s*['\\\"]1)\" or http.request.body matches \"(?i)(or[\\\\s]+1=1|or[\\\\s]+['\\\"]1['\\\"]\\\\s*=\\\\s*['\\\"]1)\")"} |
| {"input": "CRS Rule 942200: Detects MySQL comment-/space-obfuscated injections and backtick termination | Pattern: (?i),.*?[\\\"'\\)0-9`-f][\\\"'`](?:[\\\"'`].*?[\\\"'`]|(?:\\r?\\n)?\\z|[^\\\"'`]+)|[^0-9A-Z_a-z]select.+[^0-9A-Z_a-z]*?from|(?:alter|(?:(?:cre|trunc|upd)at|renam)e|d(?:e(?:lete|sc)|rop)|(?:inser|selec)t|load)[\\s\\x0 | Operator: @rx", "output": "(http.request.uri.query matches \"(--|\\\\#|/\\\\*)\" or http.request.body matches \"(--|\\\\#|/\\\\*)\")"} |
| {"input": "CRS Rule 942210: Detects chained SQL injection attempts 1/2 | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(select|insert|update|drop|alter)\" or http.request.body matches \"(?i)(select|insert|update|drop|alter)\")"} |
| {"input": "CRS Rule 942260: Detects basic SQL authentication bypass attempts 2/3 | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(or[\\\\s]+1=1|or[\\\\s]+['\\\"]1['\\\"]\\\\s*=\\\\s*['\\\"]1)\" or http.request.body matches \"(?i)(or[\\\\s]+1=1|or[\\\\s]+['\\\"]1['\\\"]\\\\s*=\\\\s*['\\\"]1)\")"} |
| {"input": "CRS Rule 942300: Detects MySQL comments, conditions and ch(a)r injections | Pattern: (?i)\\)[\\s\\x0b]*?when[\\s\\x0b]*?[0-9]+[\\s\\x0b]*?then|[\\\"'`][\\s\\x0b]*?(?:[#\\{]|--)|/\\*![\\s\\x0b]?[0-9]+|\\b(?:(?:binary|cha?r)[\\s\\x0b]*?\\([\\s\\x0b]*?[0-9]|(?:and|n(?:and|ot)|(?:xx?)?or|div|like|between|r(?: | Operator: @rx", "output": "(http.request.uri.query matches \"(--|\\\\#|/\\\\*)\" or http.request.body matches \"(--|\\\\#|/\\\\*)\")"} |
| {"input": "CRS Rule 942310: Detects chained SQL injection attempts 2/2 | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(select)\" or http.request.body matches \"(?i)(select)\")"} |
| {"input": "CRS Rule 942330: Detects classic SQL injection probings 1/3 | Operator: @rx", "output": "(cf.waf.score.sqli ge 40)"} |
| {"input": "CRS Rule 942340: Detects basic SQL authentication bypass attempts 3/3 | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(or[\\\\s]+1=1|or[\\\\s]+['\\\"]1['\\\"]\\\\s*=\\\\s*['\\\"]1)\" or http.request.body matches \"(?i)(or[\\\\s]+1=1|or[\\\\s]+['\\\"]1['\\\"]\\\\s*=\\\\s*['\\\"]1)\")"} |
| {"input": "CRS Rule 942361: Detects basic SQL injection based on keyword alter or union | Pattern: (?i:^[\\W\\d]+\\s*?(?:alter|union)\\b) | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)union[\\s\\+]+select\" or http.request.body matches \"(?i)union[\\s\\+]+select\")"} |
| {"input": "CRS Rule 942362: Detects concatenated basic SQL injection and SQLLFI attempts | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(select[\\\\s]+.*[\\\\s]+from|insert[\\\\s]+into|delete[\\\\s]+from|update[\\\\s]+.*[\\\\s]+set)\" or http.request.body matches \"(?i)(select[\\\\s]+.*[\\\\s]+from|insert[\\\\s]+into|delete[\\\\s]+from|update[\\\\s]+.*[\\\\s]+set)\" or any(http.request.cookies.values[*] matches \"(?i)select.*from\"))"} |
| {"input": "CRS Rule 942370: Detects classic SQL injection probings 2/3 | Operator: @rx", "output": "(cf.waf.score.sqli ge 40)"} |
| {"input": "CRS Rule 942380: SQL Injection Attack | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(select|create)\" or http.request.body matches \"(?i)(select|create)\")"} |
| {"input": "CRS Rule 942390: SQL Injection Attack | Pattern: (?i)\\b(?:or\\b(?:[\\s\\x0b]?(?:[0-9]{1,10}|[\\\"'][^=]{1,10}[\\\"'])[\\s\\x0b]?[<->]+|[\\s\\x0b]+(?:[0-9]{1,10}|'[^=]{1,10}')(?:[\\s\\x0b]*?[<->])?)|xor\\b[\\s\\x0b]+(?:[0-9]{1,10}|'[^=]{1,10}')(?:[\\s\\x0b]*?[<->])?)| | Operator: @rx", "output": "(cf.waf.score.sqli ge 40)"} |
| {"input": "CRS Rule 942400: SQL Injection Attack | Pattern: (?i)\\band\\b(?:[\\s\\x0b]+(?:[0-9]{1,10}[\\s\\x0b]*?[<->]|'[^=]{1,10}')| ?(?:[0-9]{1,10}|[\\\"'][^=]{1,10}[\\\"']) ?[<->]+) | Operator: @rx", "output": "(cf.waf.score.sqli ge 40)"} |
| {"input": "CRS Rule 942410: SQL Injection Attack | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(insert)\" or http.request.body matches \"(?i)(insert)\")"} |
| {"input": "CRS Rule 942470: SQL Injection Attack | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(delete|create|exec|execute)\" or http.request.body matches \"(?i)(delete|create|exec|execute)\")"} |
| {"input": "CRS Rule 942480: SQL Injection Attack | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(select|drop)\" or http.request.body matches \"(?i)(select|drop)\")"} |
| {"input": "CRS Rule 942430: Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (12) | Pattern: ((?:[~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'Β΄ββ`<>][^~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'Β΄ββ`<>]*?){12}) | Operator: @rx", "output": "(http.request.uri.query matches \";[\\\\s]*(select|insert|update|delete|drop)\" or http.request.body matches \";[\\\\s]*(select|insert|update|delete|drop)\")"} |
| {"input": "CRS Rule 942440: SQL Comment Sequence Detected | Pattern: /\\*!?|\\*/|[';]--|--(?:[\\s\\x0b]|[^\\-]*?-)|[^&\\-]#.*?[\\s\\x0b]|;?\\x00 | Operator: @rx", "output": "(http.request.uri.query matches \"(--|\\\\#|/\\\\*)\" or http.request.body matches \"(--|\\\\#|/\\\\*)\")"} |
| {"input": "CRS Rule 942450: SQL Hex Encoding Identified | Pattern: (?i:\\b0x[a-f\\d]{3,}) | Operator: @rx", "output": "(cf.waf.score.sqli ge 40)"} |
| {"input": "CRS Rule 942510: SQLi bypass attempt by ticks or backticks detected | Pattern: (?:`(?:(?:[\\w\\s=_\\-+{}()<@]){2,29}|(?:[A-Za-z0-9+/]{4})+(?:[A-Za-z0-9+/]{2}==|[A-Za-z0-9+/]{3}=)?)`) | Operator: @rx", "output": "(cf.waf.score.sqli ge 40)"} |
| {"input": "CRS Rule 942520: Detects basic SQL authentication bypass attempts 4.0/4 | Pattern: (?i)[\\\"'`][\\s\\x0b]*?(?:(?:is[\\s\\x0b]+not|not[\\s\\x0b]+(?:like|glob|(?:betwee|i)n|null|regexp|match)|mod|div|sounds[\\s\\x0b]+like)\\b|[%&\\*\\+\\-/<->\\^\\|]{1,3}) | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(or[\\\\s]+1=1|or[\\\\s]+['\\\"]1['\\\"]\\\\s*=\\\\s*['\\\"]1)\" or http.request.body matches \"(?i)(or[\\\\s]+1=1|or[\\\\s]+['\\\"]1['\\\"]\\\\s*=\\\\s*['\\\"]1)\")"} |
| {"input": "CRS Rule 942521: Detects basic SQL authentication bypass attempts 4.1/4 | Pattern: (?i)^(?:[^']*?(?:'[^']*?'[^']*?)*?'|[^\\\"]*?(?:\\\"[^\\\"]*?\\\"[^\\\"]*?)*?\\\"|[^`]*?(?:`[^`]*?`[^`]*?)*?`)[\\s\\x0b]*([0-9A-Z_a-z]+)\\b | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(or[\\\\s]+1=1|or[\\\\s]+['\\\"]1['\\\"]\\\\s*=\\\\s*['\\\"]1)\" or http.request.body matches \"(?i)(or[\\\\s]+1=1|or[\\\\s]+['\\\"]1['\\\"]\\\\s*=\\\\s*['\\\"]1)\")"} |
| {"input": "CRS Rule 942522: Detects basic SQL authentication bypass attempts 4.1/4 | Pattern: ^.*?\\x5c['\\\"`](?:.*?['\\\"`])?\\s*(?:and|or)\\b | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(or[\\\\s]+1=1|or[\\\\s]+['\\\"]1['\\\"]\\\\s*=\\\\s*['\\\"]1)\" or http.request.body matches \"(?i)(or[\\\\s]+1=1|or[\\\\s]+['\\\"]1['\\\"]\\\\s*=\\\\s*['\\\"]1)\")"} |
| {"input": "CRS Rule 942101: SQL Injection Attack Detected via libinjection | Operator: @detectSQLi", "output": "(cf.waf.score.sqli ge 40)"} |
| {"input": "CRS Rule 942152: SQL Injection Attack: SQL function name detected | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(concat|substring|ascii|char|count|group_concat)\\\\(\" or http.request.body matches \"(?i)(concat|substring|ascii|char|count|group_concat)\\\\(\")"} |
| {"input": "CRS Rule 942321: Detects MySQL and PostgreSQL stored procedure/function injections | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(create|exec|declare)\" or http.request.body matches \"(?i)(create|exec|declare)\")"} |
| {"input": "CRS Rule 942251: Detects HAVING injections | Pattern: (?i)\\W+\\d*?\\s*?\\bhaving\\b\\s*?[^\\s\\-] | Operator: @rx", "output": "(cf.waf.score.sqli ge 40)"} |
| {"input": "CRS Rule 942490: Detects classic SQL injection probings 3/3 | Pattern: [\\\"'`][\\s\\d]*?[^\\w\\s]\\W*?\\d\\W*?.*?[\\\"'`\\d] | Operator: @rx", "output": "(cf.waf.score.sqli ge 40)"} |
| {"input": "CRS Rule 942420: Restricted SQL Character Anomaly Detection (cookies): # of special characters exceeded (8) | Pattern: ((?:[~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'Β΄ββ`<>][^~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'Β΄ββ`<>]*?){8}) | Operator: @rx", "output": "(http.request.uri.query matches \";[\\\\s]*(select|insert|update|delete|drop)\" or http.request.body matches \";[\\\\s]*(select|insert|update|delete|drop)\")"} |
| {"input": "CRS Rule 942431: Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (6) | Pattern: ((?:[~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'Β΄ββ`<>][^~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'Β΄ββ`<>]*?){6}) | Operator: @rx", "output": "(http.request.uri.query matches \";[\\\\s]*(select|insert|update|delete|drop)\" or http.request.body matches \";[\\\\s]*(select|insert|update|delete|drop)\")"} |
| {"input": "CRS Rule 942460: Meta-Character Anomaly Detection Alert - Repetitive Non-Word Characters | Pattern: \\W{4} | Operator: @rx", "output": "(cf.waf.score.sqli ge 40)"} |
| {"input": "CRS Rule 942511: SQLi bypass attempt by ticks detected | Pattern: (?:'(?:(?:[\\w\\s=_\\-+{}()<@]){2,29}|(?:[A-Za-z0-9+/]{4})+(?:[A-Za-z0-9+/]{2}==|[A-Za-z0-9+/]{3}=)?)') | Operator: @rx", "output": "(cf.waf.score.sqli ge 40)"} |
| {"input": "CRS Rule 942530: SQLi query termination detected | Pattern: '; | Operator: @rx", "output": "(http.request.uri.query matches \";[\\\\s]*(select|insert|update|delete|drop)\" or http.request.body matches \";[\\\\s]*(select|insert|update|delete|drop)\")"} |
| {"input": "CRS Rule 942421: Restricted SQL Character Anomaly Detection (cookies): # of special characters exceeded (3) | Pattern: ((?:[~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'Β΄ββ`<>][^~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'Β΄ββ`<>]*?){3}) | Operator: @rx", "output": "(http.request.uri.query matches \";[\\\\s]*(select|insert|update|delete|drop)\" or http.request.body matches \";[\\\\s]*(select|insert|update|delete|drop)\")"} |
| {"input": "CRS Rule 942432: Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (2) | Pattern: ((?:[~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'Β΄ββ`<>][^~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'Β΄ββ`<>]*?){2}) | Operator: @rx", "output": "(http.request.uri.query matches \";[\\\\s]*(select|insert|update|delete|drop)\" or http.request.body matches \";[\\\\s]*(select|insert|update|delete|drop)\")"} |
|
|