| {"input": "CRS XSS Rule 941100: XSS Attack Detected via libinjection", "output": "id: safeline-941100\nname: XSS Attack Detected via libinjection\ndescription: 'Converted from CRS Rule 941100: XSS Attack Detected via libinjection'\nrule_type: semantic\nconditions:\n- field: request.cookie\n operator: semantic_match\n semantic_type: xss\n threshold: 0.8\n- field: request.header\n operator: semantic_match\n semantic_type: xss\n threshold: 0.8\n- field: request.query\n operator: semantic_match\n semantic_type: xss\n threshold: 0.8\naction: block\nseverity: critical\ntags:\n- xss\n- injection\n- web-attack\nsemantic_type: xss\ntargets:\n- cookie\n- header\n- query"} | |
| {"input": "CRS XSS Rule 941110: XSS Filter - Category 1: Script Tag Vector", "output": "id: safeline-941110\nname: 'XSS Filter - Category 1: Script Tag Vector'\ndescription: 'Converted from CRS Rule 941110: XSS Filter - Category 1: Script Tag\n Vector'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)<script[^>]*>[\\s\\S]*?\n- field: request.header\n operator: regex_match\n value: (?i)<script[^>]*>[\\s\\S]*?\n- field: request.path\n operator: regex_match\n value: (?i)<script[^>]*>[\\s\\S]*?\n- field: request.query\n operator: regex_match\n value: (?i)<script[^>]*>[\\s\\S]*?\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- header\n- path\n- query"} | |
| {"input": "CRS XSS Rule 941130: XSS Filter - Category 3: Attribute Vector", "output": "id: safeline-941130\nname: 'XSS Filter - Category 3: Attribute Vector'\ndescription: 'Converted from CRS Rule 941130: XSS Filter - Category 3: Attribute Vector'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i).(?:\\b(?:(?:x(?:link:href|html|mlns)|data:text/html|formaction)\\b|pattern[\\s\\x0b]*=)|(?:!ENTITY[\\s\\x0b]+(?:%[\\s\\x0b]+)?[^\\s\\x0b]+[\\s\\x0b]+(?:SYSTEM|PUBLIC)|@import|;base64)\\b)\n- field: request.header\n operator: regex_match\n value: (?i).(?:\\b(?:(?:x(?:link:href|html|mlns)|data:text/html|formaction)\\b|pattern[\\s\\x0b]*=)|(?:!ENTITY[\\s\\x0b]+(?:%[\\s\\x0b]+)?[^\\s\\x0b]+[\\s\\x0b]+(?:SYSTEM|PUBLIC)|@import|;base64)\\b)\n- field: request.path\n operator: regex_match\n value: (?i).(?:\\b(?:(?:x(?:link:href|html|mlns)|data:text/html|formaction)\\b|pattern[\\s\\x0b]*=)|(?:!ENTITY[\\s\\x0b]+(?:%[\\s\\x0b]+)?[^\\s\\x0b]+[\\s\\x0b]+(?:SYSTEM|PUBLIC)|@import|;base64)\\b)\n- field: request.query\n operator: regex_match\n value: (?i).(?:\\b(?:(?:x(?:link:href|html|mlns)|data:text/html|formaction)\\b|pattern[\\s\\x0b]*=)|(?:!ENTITY[\\s\\x0b]+(?:%[\\s\\x0b]+)?[^\\s\\x0b]+[\\s\\x0b]+(?:SYSTEM|PUBLIC)|@import|;base64)\\b)\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- header\n- path\n- query"} | |
| {"input": "CRS XSS Rule 941140: XSS Filter - Category 4: Javascript URI Vector", "output": "id: safeline-941140\nname: 'XSS Filter - Category 4: Javascript URI Vector'\ndescription: 'Converted from CRS Rule 941140: XSS Filter - Category 4: Javascript\n URI Vector'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)[a-z]+=(?:[^:=]+:.+;)*?[^:=]+:url\\(javascript\n- field: request.header\n operator: regex_match\n value: (?i)[a-z]+=(?:[^:=]+:.+;)*?[^:=]+:url\\(javascript\n- field: request.path\n operator: regex_match\n value: (?i)[a-z]+=(?:[^:=]+:.+;)*?[^:=]+:url\\(javascript\n- field: request.query\n operator: regex_match\n value: (?i)[a-z]+=(?:[^:=]+:.+;)*?[^:=]+:url\\(javascript\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- header\n- path\n- query"} | |
| {"input": "CRS XSS Rule 941160: NoScript XSS InjectionChecker: HTML Injection", "output": "id: safeline-941160\nname: 'NoScript XSS InjectionChecker: HTML Injection'\ndescription: 'Converted from CRS Rule 941160: NoScript XSS InjectionChecker: HTML\n Injection'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)<[^0-9<>A-Z_a-z]*(?:[^\\s\\x0b\\\"'<>]*:)?[^0-9<>A-Z_a-z]*[^0-9A-Z_a-z]*?(?:s[^0-9A-Z_a-z]*?(?:c[^0-9A-Z_a-z]*?r[^0-9A-Z_a-z]*?i[^0-9A-Z_a-z]*?p[^0-9A-Z_a-z]*?t|t[^0-9A-Z_a-z]*?y[^0-9A-Z_a-z]*?l[^0-9A\n- field: request.header\n operator: regex_match\n value: (?i)<[^0-9<>A-Z_a-z]*(?:[^\\s\\x0b\\\"'<>]*:)?[^0-9<>A-Z_a-z]*[^0-9A-Z_a-z]*?(?:s[^0-9A-Z_a-z]*?(?:c[^0-9A-Z_a-z]*?r[^0-9A-Z_a-z]*?i[^0-9A-Z_a-z]*?p[^0-9A-Z_a-z]*?t|t[^0-9A-Z_a-z]*?y[^0-9A-Z_a-z]*?l[^0-9A\n- field: request.path\n operator: regex_match\n value: (?i)<[^0-9<>A-Z_a-z]*(?:[^\\s\\x0b\\\"'<>]*:)?[^0-9<>A-Z_a-z]*[^0-9A-Z_a-z]*?(?:s[^0-9A-Z_a-z]*?(?:c[^0-9A-Z_a-z]*?r[^0-9A-Z_a-z]*?i[^0-9A-Z_a-z]*?p[^0-9A-Z_a-z]*?t|t[^0-9A-Z_a-z]*?y[^0-9A-Z_a-z]*?l[^0-9A\n- field: request.query\n operator: regex_match\n value: (?i)<[^0-9<>A-Z_a-z]*(?:[^\\s\\x0b\\\"'<>]*:)?[^0-9<>A-Z_a-z]*[^0-9A-Z_a-z]*?(?:s[^0-9A-Z_a-z]*?(?:c[^0-9A-Z_a-z]*?r[^0-9A-Z_a-z]*?i[^0-9A-Z_a-z]*?p[^0-9A-Z_a-z]*?t|t[^0-9A-Z_a-z]*?y[^0-9A-Z_a-z]*?l[^0-9A\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- header\n- path\n- query"} | |
| {"input": "CRS XSS Rule 941170: NoScript XSS InjectionChecker: Attribute Injection", "output": "id: safeline-941170\nname: 'NoScript XSS InjectionChecker: Attribute Injection'\ndescription: 'Converted from CRS Rule 941170: NoScript XSS InjectionChecker: Attribute\n Injection'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)<script[^>]*>\n- field: request.header\n operator: regex_match\n value: (?i)<script[^>]*>\n- field: request.path\n operator: regex_match\n value: (?i)<script[^>]*>\n- field: request.query\n operator: regex_match\n value: (?i)<script[^>]*>\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- header\n- path\n- query"} | |
| {"input": "CRS XSS Rule 941180: Node-Validator Deny List Keywords", "output": "id: safeline-941180\nname: Node-Validator Deny List Keywords\ndescription: 'Converted from CRS Rule 941180: Node-Validator Deny List Keywords'\nrule_type: signature\nconditions:\n- field: request.cookie\n operator: contains\n value: <script|javascript:|onerror|onload\n- field: request.path\n operator: contains\n value: <script|javascript:|onerror|onload\n- field: request.query\n operator: contains\n value: <script|javascript:|onerror|onload\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"} | |
| {"input": "CRS XSS Rule 941190: IE XSS Filters - Attack Detected", "output": "id: safeline-941190\nname: IE XSS Filters - Attack Detected\ndescription: 'Converted from CRS Rule 941190: IE XSS Filters - Attack Detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i:<style.*?>.*?(?:@[i\\x5c]|(?:[:=]|&#x?0*(?:58|3A|61|3D);?).*?(?:[(\\x5c]|&#x?0*(?:40|28|92|5C);?)))\n- field: request.path\n operator: regex_match\n value: (?i:<style.*?>.*?(?:@[i\\x5c]|(?:[:=]|&#x?0*(?:58|3A|61|3D);?).*?(?:[(\\x5c]|&#x?0*(?:40|28|92|5C);?)))\n- field: request.query\n operator: regex_match\n value: (?i:<style.*?>.*?(?:@[i\\x5c]|(?:[:=]|&#x?0*(?:58|3A|61|3D);?).*?(?:[(\\x5c]|&#x?0*(?:40|28|92|5C);?)))\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"} | |
| {"input": "CRS XSS Rule 941200: IE XSS Filters - Attack Detected", "output": "id: safeline-941200\nname: IE XSS Filters - Attack Detected\ndescription: 'Converted from CRS Rule 941200: IE XSS Filters - Attack Detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i:<.*[:]?vmlframe.*?[\\s/+]*?src[\\s/+]*=)\n- field: request.path\n operator: regex_match\n value: (?i:<.*[:]?vmlframe.*?[\\s/+]*?src[\\s/+]*=)\n- field: request.query\n operator: regex_match\n value: (?i:<.*[:]?vmlframe.*?[\\s/+]*?src[\\s/+]*=)\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"} | |
| {"input": "CRS XSS Rule 941210: Javascript Word Detected", "output": "id: safeline-941210\nname: Javascript Word Detected\ndescription: 'Converted from CRS Rule 941210: Javascript Word Detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)(?:j|&#(?:0*(?:74|106)|x0*[46]A);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(?:a|&#(?:0*(?:65|97)|x0*[46]1);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(\n- field: request.path\n operator: regex_match\n value: (?i)(?:j|&#(?:0*(?:74|106)|x0*[46]A);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(?:a|&#(?:0*(?:65|97)|x0*[46]1);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(\n- field: request.query\n operator: regex_match\n value: (?i)(?:j|&#(?:0*(?:74|106)|x0*[46]A);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(?:a|&#(?:0*(?:65|97)|x0*[46]1);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"} | |
| {"input": "CRS XSS Rule 941220: IE XSS Filters - Attack Detected", "output": "id: safeline-941220\nname: IE XSS Filters - Attack Detected\ndescription: 'Converted from CRS Rule 941220: IE XSS Filters - Attack Detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)(?:v|&#(?:0*(?:118|86)|x0*[57]6);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(?:b|&#(?:0*(?:98|66)|x0*[46]2);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(\n- field: request.path\n operator: regex_match\n value: (?i)(?:v|&#(?:0*(?:118|86)|x0*[57]6);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(?:b|&#(?:0*(?:98|66)|x0*[46]2);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(\n- field: request.query\n operator: regex_match\n value: (?i)(?:v|&#(?:0*(?:118|86)|x0*[57]6);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(?:b|&#(?:0*(?:98|66)|x0*[46]2);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"} | |
| {"input": "CRS XSS Rule 941230: IE XSS Filters - Attack Detected", "output": "id: safeline-941230\nname: IE XSS Filters - Attack Detected\ndescription: 'Converted from CRS Rule 941230: IE XSS Filters - Attack Detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)<EMBED[\\s/+].*?(?:src|type).*?=\n- field: request.path\n operator: regex_match\n value: (?i)<EMBED[\\s/+].*?(?:src|type).*?=\n- field: request.query\n operator: regex_match\n value: (?i)<EMBED[\\s/+].*?(?:src|type).*?=\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"} | |
| {"input": "CRS XSS Rule 941240: IE XSS Filters - Attack Detected", "output": "id: safeline-941240\nname: IE XSS Filters - Attack Detected\ndescription: 'Converted from CRS Rule 941240: IE XSS Filters - Attack Detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: <[?]?import[\\s/+\\S]*?implementation[\\s/+]*?=\n- field: request.path\n operator: regex_match\n value: <[?]?import[\\s/+\\S]*?implementation[\\s/+]*?=\n- field: request.query\n operator: regex_match\n value: <[?]?import[\\s/+\\S]*?implementation[\\s/+]*?=\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"} | |
| {"input": "CRS XSS Rule 941250: IE XSS Filters - Attack Detected", "output": "id: safeline-941250\nname: IE XSS Filters - Attack Detected\ndescription: 'Converted from CRS Rule 941250: IE XSS Filters - Attack Detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i:<META[\\s/+].*?http-equiv[\\s/+]*=[\\s/+]*[\\\"'`]?(?:(?:c|&#x?0*(?:67|43|99|63);?)|(?:r|&#x?0*(?:82|52|114|72);?)|(?:s|&#x?0*(?:83|53|115|73);?)))\n- field: request.path\n operator: regex_match\n value: (?i:<META[\\s/+].*?http-equiv[\\s/+]*=[\\s/+]*[\\\"'`]?(?:(?:c|&#x?0*(?:67|43|99|63);?)|(?:r|&#x?0*(?:82|52|114|72);?)|(?:s|&#x?0*(?:83|53|115|73);?)))\n- field: request.query\n operator: regex_match\n value: (?i:<META[\\s/+].*?http-equiv[\\s/+]*=[\\s/+]*[\\\"'`]?(?:(?:c|&#x?0*(?:67|43|99|63);?)|(?:r|&#x?0*(?:82|52|114|72);?)|(?:s|&#x?0*(?:83|53|115|73);?)))\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"} | |
| {"input": "CRS XSS Rule 941260: IE XSS Filters - Attack Detected", "output": "id: safeline-941260\nname: IE XSS Filters - Attack Detected\ndescription: 'Converted from CRS Rule 941260: IE XSS Filters - Attack Detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i:<META[\\s/+].*?charset[\\s/+]*=)\n- field: request.path\n operator: regex_match\n value: (?i:<META[\\s/+].*?charset[\\s/+]*=)\n- field: request.query\n operator: regex_match\n value: (?i:<META[\\s/+].*?charset[\\s/+]*=)\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"} | |
| {"input": "CRS XSS Rule 941270: IE XSS Filters - Attack Detected", "output": "id: safeline-941270\nname: IE XSS Filters - Attack Detected\ndescription: 'Converted from CRS Rule 941270: IE XSS Filters - Attack Detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)<LINK[\\s/+].*?href[\\s/+]*=\n- field: request.path\n operator: regex_match\n value: (?i)<LINK[\\s/+].*?href[\\s/+]*=\n- field: request.query\n operator: regex_match\n value: (?i)<LINK[\\s/+].*?href[\\s/+]*=\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"} | |
| {"input": "CRS XSS Rule 941280: IE XSS Filters - Attack Detected", "output": "id: safeline-941280\nname: IE XSS Filters - Attack Detected\ndescription: 'Converted from CRS Rule 941280: IE XSS Filters - Attack Detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)<BASE[\\s/+].*?href[\\s/+]*=\n- field: request.path\n operator: regex_match\n value: (?i)<BASE[\\s/+].*?href[\\s/+]*=\n- field: request.query\n operator: regex_match\n value: (?i)<BASE[\\s/+].*?href[\\s/+]*=\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"} | |
| {"input": "CRS XSS Rule 941290: IE XSS Filters - Attack Detected", "output": "id: safeline-941290\nname: IE XSS Filters - Attack Detected\ndescription: 'Converted from CRS Rule 941290: IE XSS Filters - Attack Detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)<APPLET[\\s/+>]\n- field: request.path\n operator: regex_match\n value: (?i)<APPLET[\\s/+>]\n- field: request.query\n operator: regex_match\n value: (?i)<APPLET[\\s/+>]\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"} | |
| {"input": "CRS XSS Rule 941300: IE XSS Filters - Attack Detected", "output": "id: safeline-941300\nname: IE XSS Filters - Attack Detected\ndescription: 'Converted from CRS Rule 941300: IE XSS Filters - Attack Detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)<OBJECT[\\s/+].*?(?:type|codetype|classid|code|data)[\\s/+]*=\n- field: request.path\n operator: regex_match\n value: (?i)<OBJECT[\\s/+].*?(?:type|codetype|classid|code|data)[\\s/+]*=\n- field: request.query\n operator: regex_match\n value: (?i)<OBJECT[\\s/+].*?(?:type|codetype|classid|code|data)[\\s/+]*=\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"} | |
| {"input": "CRS XSS Rule 941310: US-ASCII Malformed Encoding XSS Filter - Attack Detected", "output": "id: safeline-941310\nname: US-ASCII Malformed Encoding XSS Filter - Attack Detected\ndescription: 'Converted from CRS Rule 941310: US-ASCII Malformed Encoding XSS Filter\n - Attack Detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: \\xbc[^\\xbe>]*[\\xbe>]|<[^\\xbe]*\\xbe\n- field: request.path\n operator: regex_match\n value: \\xbc[^\\xbe>]*[\\xbe>]|<[^\\xbe]*\\xbe\n- field: request.query\n operator: regex_match\n value: \\xbc[^\\xbe>]*[\\xbe>]|<[^\\xbe]*\\xbe\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"} | |
| {"input": "CRS XSS Rule 941350: UTF-7 Encoding IE XSS - Attack Detected", "output": "id: safeline-941350\nname: UTF-7 Encoding IE XSS - Attack Detected\ndescription: 'Converted from CRS Rule 941350: UTF-7 Encoding IE XSS - Attack Detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: \\+ADw-.*(?:\\+AD4-|>)|<.*\\+AD4-\n- field: request.path\n operator: regex_match\n value: \\+ADw-.*(?:\\+AD4-|>)|<.*\\+AD4-\n- field: request.query\n operator: regex_match\n value: \\+ADw-.*(?:\\+AD4-|>)|<.*\\+AD4-\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"} | |
| {"input": "CRS XSS Rule 941360: JSFuck / Hieroglyphy obfuscation detected", "output": "id: safeline-941360\nname: JSFuck / Hieroglyphy obfuscation detected\ndescription: 'Converted from CRS Rule 941360: JSFuck / Hieroglyphy obfuscation detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: '![!+ ]\\[\\]'\n- field: request.path\n operator: regex_match\n value: '![!+ ]\\[\\]'\n- field: request.query\n operator: regex_match\n value: '![!+ ]\\[\\]'\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"} | |
| {"input": "CRS XSS Rule 941370: JavaScript global variable found", "output": "id: safeline-941370\nname: JavaScript global variable found\ndescription: 'Converted from CRS Rule 941370: JavaScript global variable found'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?:self|document|this|top|window)\\s*(?:/\\*|[\\[)]).+?(?:\\]|\\*/)\n- field: request.path\n operator: regex_match\n value: (?:self|document|this|top|window)\\s*(?:/\\*|[\\[)]).+?(?:\\]|\\*/)\n- field: request.query\n operator: regex_match\n value: (?:self|document|this|top|window)\\s*(?:/\\*|[\\[)]).+?(?:\\]|\\*/)\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"} | |
| {"input": "CRS XSS Rule 941390: Javascript method detected", "output": "id: safeline-941390\nname: Javascript method detected\ndescription: 'Converted from CRS Rule 941390: Javascript method detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)\\b(?:eval|set(?:timeout|interval)|new[\\s\\x0b]+Function|a(?:lert|tob)|btoa|(?:promp|impor)t|con(?:firm|sole\\.(?:log|dir))|fetch)[\\s\\x0b]*[\\(\\{]\n- field: request.path\n operator: regex_match\n value: (?i)\\b(?:eval|set(?:timeout|interval)|new[\\s\\x0b]+Function|a(?:lert|tob)|btoa|(?:promp|impor)t|con(?:firm|sole\\.(?:log|dir))|fetch)[\\s\\x0b]*[\\(\\{]\n- field: request.query\n operator: regex_match\n value: (?i)\\b(?:eval|set(?:timeout|interval)|new[\\s\\x0b]+Function|a(?:lert|tob)|btoa|(?:promp|impor)t|con(?:firm|sole\\.(?:log|dir))|fetch)[\\s\\x0b]*[\\(\\{]\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"} | |
| {"input": "CRS XSS Rule 941400: XSS JavaScript function without parentheses", "output": "id: safeline-941400\nname: XSS JavaScript function without parentheses\ndescription: 'Converted from CRS Rule 941400: XSS JavaScript function without parentheses'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: ((?:\\[[^\\]]*\\][^.]*\\.)|Reflect[^.]*\\.).*(?:map|sort|apply)[^.]*\\..*call[^`]*`.*`\n- field: request.path\n operator: regex_match\n value: ((?:\\[[^\\]]*\\][^.]*\\.)|Reflect[^.]*\\.).*(?:map|sort|apply)[^.]*\\..*call[^`]*`.*`\n- field: request.query\n operator: regex_match\n value: ((?:\\[[^\\]]*\\][^.]*\\.)|Reflect[^.]*\\.).*(?:map|sort|apply)[^.]*\\..*call[^`]*`.*`\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"} | |
| {"input": "CRS XSS Rule 941101: XSS Attack Detected via libinjection", "output": "id: safeline-941101\nname: XSS Attack Detected via libinjection\ndescription: 'Converted from CRS Rule 941101: XSS Attack Detected via libinjection'\nrule_type: semantic\nconditions:\n- field: request.header\n operator: semantic_match\n semantic_type: xss\n threshold: 0.8\n- field: request.path\n operator: semantic_match\n semantic_type: xss\n threshold: 0.8\naction: block\nseverity: critical\ntags:\n- xss\n- injection\n- web-attack\nsemantic_type: xss\ntargets:\n- header\n- path"} | |
| {"input": "CRS XSS Rule 941120: XSS Filter - Category 2: Event Handler Vector", "output": "id: safeline-941120\nname: 'XSS Filter - Category 2: Event Handler Vector'\ndescription: 'Converted from CRS Rule 941120: XSS Filter - Category 2: Event Handler\n Vector'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)[\\s\\\"'`;/0-9=\\x0B\\x09\\x0C\\x3B\\x2C\\x28\\x3B]on[a-zA-Z]{3,50}[\\s\\x0B\\x09\\x0C\\x3B\\x2C\\x28\\x3B]*?=[^=]\n- field: request.header\n operator: regex_match\n value: (?i)[\\s\\\"'`;/0-9=\\x0B\\x09\\x0C\\x3B\\x2C\\x28\\x3B]on[a-zA-Z]{3,50}[\\s\\x0B\\x09\\x0C\\x3B\\x2C\\x28\\x3B]*?=[^=]\n- field: request.path\n operator: regex_match\n value: (?i)[\\s\\\"'`;/0-9=\\x0B\\x09\\x0C\\x3B\\x2C\\x28\\x3B]on[a-zA-Z]{3,50}[\\s\\x0B\\x09\\x0C\\x3B\\x2C\\x28\\x3B]*?=[^=]\n- field: request.query\n operator: regex_match\n value: (?i)[\\s\\\"'`;/0-9=\\x0B\\x09\\x0C\\x3B\\x2C\\x28\\x3B]on[a-zA-Z]{3,50}[\\s\\x0B\\x09\\x0C\\x3B\\x2C\\x28\\x3B]*?=[^=]\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- header\n- path\n- query"} | |
| {"input": "CRS XSS Rule 941150: XSS Filter - Category 5: Disallowed HTML Attributes", "output": "id: safeline-941150\nname: 'XSS Filter - Category 5: Disallowed HTML Attributes'\ndescription: 'Converted from CRS Rule 941150: XSS Filter - Category 5: Disallowed\n HTML Attributes'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)\\b(?:s(?:tyle|rc)|href)\\b[\\s\\S]*?=\n- field: request.header\n operator: regex_match\n value: (?i)\\b(?:s(?:tyle|rc)|href)\\b[\\s\\S]*?=\n- field: request.path\n operator: regex_match\n value: (?i)\\b(?:s(?:tyle|rc)|href)\\b[\\s\\S]*?=\n- field: request.query\n operator: regex_match\n value: (?i)\\b(?:s(?:tyle|rc)|href)\\b[\\s\\S]*?=\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- header\n- path\n- query"} | |
| {"input": "CRS XSS Rule 941181: Node-Validator Deny List Keywords", "output": "id: safeline-941181\nname: Node-Validator Deny List Keywords\ndescription: 'Converted from CRS Rule 941181: Node-Validator Deny List Keywords'\nrule_type: signature\nconditions:\n- field: request.cookie\n operator: contains\n value: <script|javascript:|onerror|onload\n- field: request.path\n operator: contains\n value: <script|javascript:|onerror|onload\n- field: request.query\n operator: contains\n value: <script|javascript:|onerror|onload\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"} | |
| {"input": "CRS XSS Rule 941320: Possible XSS Attack Detected - HTML Tag Handler", "output": "id: safeline-941320\nname: Possible XSS Attack Detected - HTML Tag Handler\ndescription: 'Converted from CRS Rule 941320: Possible XSS Attack Detected - HTML\n Tag Handler'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: <(?:a|abbr|acronym|address|applet|area|audioscope|b|base|basefront|bdo|bgsound|big|blackface|blink|blockquote|body|bq|br|button|caption|center|cite|code|col|colgroup|comment|dd|del|dfn|dir|div|dl|dt|e\n- field: request.path\n operator: regex_match\n value: <(?:a|abbr|acronym|address|applet|area|audioscope|b|base|basefront|bdo|bgsound|big|blackface|blink|blockquote|body|bq|br|button|caption|center|cite|code|col|colgroup|comment|dd|del|dfn|dir|div|dl|dt|e\n- field: request.query\n operator: regex_match\n value: <(?:a|abbr|acronym|address|applet|area|audioscope|b|base|basefront|bdo|bgsound|big|blackface|blink|blockquote|body|bq|br|button|caption|center|cite|code|col|colgroup|comment|dd|del|dfn|dir|div|dl|dt|e\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"} | |
| {"input": "CRS XSS Rule 941330: IE XSS Filters - Attack Detected", "output": "id: safeline-941330\nname: IE XSS Filters - Attack Detected\ndescription: 'Converted from CRS Rule 941330: IE XSS Filters - Attack Detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i:[\\\"'][ ]*(?:[^a-z0-9~_:' ]|in).*?(?:(?:l|\\x5cu006C)(?:o|\\x5cu006F)(?:c|\\x5cu0063)(?:a|\\x5cu0061)(?:t|\\x5cu0074)(?:i|\\x5cu0069)(?:o|\\x5cu006F)(?:n|\\x5cu006E)|(?:n|\\x5cu006E)(?:a|\\x5cu0061)(?:m|\\x5c\n- field: request.path\n operator: regex_match\n value: (?i:[\\\"'][ ]*(?:[^a-z0-9~_:' ]|in).*?(?:(?:l|\\x5cu006C)(?:o|\\x5cu006F)(?:c|\\x5cu0063)(?:a|\\x5cu0061)(?:t|\\x5cu0074)(?:i|\\x5cu0069)(?:o|\\x5cu006F)(?:n|\\x5cu006E)|(?:n|\\x5cu006E)(?:a|\\x5cu0061)(?:m|\\x5c\n- field: request.query\n operator: regex_match\n value: (?i:[\\\"'][ ]*(?:[^a-z0-9~_:' ]|in).*?(?:(?:l|\\x5cu006C)(?:o|\\x5cu006F)(?:c|\\x5cu0063)(?:a|\\x5cu0061)(?:t|\\x5cu0074)(?:i|\\x5cu0069)(?:o|\\x5cu006F)(?:n|\\x5cu006E)|(?:n|\\x5cu006E)(?:a|\\x5cu0061)(?:m|\\x5c\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"} | |
| {"input": "CRS XSS Rule 941340: IE XSS Filters - Attack Detected", "output": "id: safeline-941340\nname: IE XSS Filters - Attack Detected\ndescription: 'Converted from CRS Rule 941340: IE XSS Filters - Attack Detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)[\\\"\\'][ ]*(?:[^a-z0-9~_:\\' ]|in).+?[.].+?=\n- field: request.path\n operator: regex_match\n value: (?i)[\\\"\\'][ ]*(?:[^a-z0-9~_:\\' ]|in).+?[.].+?=\n- field: request.query\n operator: regex_match\n value: (?i)[\\\"\\'][ ]*(?:[^a-z0-9~_:\\' ]|in).+?[.].+?=\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"} | |
| {"input": "CRS XSS Rule 941380: AngularJS client side template injection detected", "output": "id: safeline-941380\nname: AngularJS client side template injection detected\ndescription: 'Converted from CRS Rule 941380: AngularJS client side template injection\n detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: '{{.*?}}'\n- field: request.path\n operator: regex_match\n value: '{{.*?}}'\n- field: request.query\n operator: regex_match\n value: '{{.*?}}'\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"} | |
| {"input": "CRS SQLi Rule 942100: SQL Injection Attack Detected via libinjection", "output": "id: safeline-942100\nname: SQL Injection Attack Detected via libinjection\ndescription: 'Converted from CRS Rule 942100: SQL Injection Attack Detected via libinjection'\nrule_type: semantic\nconditions:\n- field: request.cookie\n operator: semantic_match\n semantic_type: sqli\n threshold: 0.8\n- field: request.header\n operator: semantic_match\n semantic_type: sqli\n threshold: 0.8\n- field: request.query\n operator: semantic_match\n semantic_type: sqli\n threshold: 0.8\naction: block\nseverity: critical\ntags:\n- sqli\n- injection\n- database\nsemantic_type: sqli\ntargets:\n- cookie\n- header\n- query"} | |
| {"input": "CRS SQLi Rule 942140: SQL Injection Attack: Common DB Names Detected", "output": "id: safeline-942140\nname: 'SQL Injection Attack: Common DB Names Detected'\ndescription: 'Converted from CRS Rule 942140: SQL Injection Attack: Common DB Names\n Detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)\\b(?:d(?:atabas|b_nam)e[^0-9A-Z_a-z]*\\(|(?:information_schema|m(?:aster\\.\\.sysdatabases|s(?:db|ys(?:ac(?:cess(?:objects|storage|xml)|es)|modules2?|(?:object|querie|relationship)s))|ysql\\.db)|north\n- field: request.query\n operator: regex_match\n value: (?i)\\b(?:d(?:atabas|b_nam)e[^0-9A-Z_a-z]*\\(|(?:information_schema|m(?:aster\\.\\.sysdatabases|s(?:db|ys(?:ac(?:cess(?:objects|storage|xml)|es)|modules2?|(?:object|querie|relationship)s))|ysql\\.db)|north\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"} | |
| {"input": "CRS SQLi Rule 942151: SQL Injection Attack: SQL function name detected", "output": "id: safeline-942151\nname: 'SQL Injection Attack: SQL function name detected'\ndescription: 'Converted from CRS Rule 942151: SQL Injection Attack: SQL function name\n detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)\\b(?:a(?:dd(?:dat|tim)e|es_(?:de|en)crypt|s(?:cii(?:str)?|in)|tan2?)|b(?:enchmark|i(?:n_to_num|t_(?:and|count|length|x?or)))|c(?:har(?:acter)?_length|eil(?:ing)?|o(?:alesce|ercibility|llation|(?:m\n- field: request.query\n operator: regex_match\n value: (?i)\\b(?:a(?:dd(?:dat|tim)e|es_(?:de|en)crypt|s(?:cii(?:str)?|in)|tan2?)|b(?:enchmark|i(?:n_to_num|t_(?:and|count|length|x?or)))|c(?:har(?:acter)?_length|eil(?:ing)?|o(?:alesce|ercibility|llation|(?:m\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"} | |
| {"input": "CRS SQLi Rule 942160: Detects blind sqli tests using sleep() or benchmark()", "output": "id: safeline-942160\nname: Detects blind sqli tests using sleep() or benchmark()\ndescription: 'Converted from CRS Rule 942160: Detects blind sqli tests using sleep()\n or benchmark()'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i:sleep\\s*?\\(.*?\\)|benchmark\\s*?\\(.*?\\,.*?\\))\n- field: request.path\n operator: regex_match\n value: (?i:sleep\\s*?\\(.*?\\)|benchmark\\s*?\\(.*?\\,.*?\\))\n- field: request.query\n operator: regex_match\n value: (?i:sleep\\s*?\\(.*?\\)|benchmark\\s*?\\(.*?\\,.*?\\))\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- path\n- query"} | |
| {"input": "CRS SQLi Rule 942170: Detects SQL benchmark and sleep injection attempts including conditional queries", "output": "id: safeline-942170\nname: Detects SQL benchmark and sleep injection attempts including conditional queries\ndescription: 'Converted from CRS Rule 942170: Detects SQL benchmark and sleep injection\n attempts including conditional queries'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)(?:select|;)[\\s\\x0b]+(?:benchmark|if|sleep)[\\s\\x0b]*?\\([\\s\\x0b]*?\\(?[\\s\\x0b]*?[0-9A-Z_a-z]+\n- field: request.query\n operator: regex_match\n value: (?i)(?:select|;)[\\s\\x0b]+(?:benchmark|if|sleep)[\\s\\x0b]*?\\([\\s\\x0b]*?\\(?[\\s\\x0b]*?[0-9A-Z_a-z]+\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"} | |
| {"input": "CRS SQLi Rule 942190: Detects MSSQL code execution and information gathering attempts", "output": "id: safeline-942190\nname: Detects MSSQL code execution and information gathering attempts\ndescription: 'Converted from CRS Rule 942190: Detects MSSQL code execution and information\n gathering attempts'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)union.*select\n- field: request.query\n operator: regex_match\n value: (?i)union.*select\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"} | |
| {"input": "CRS SQLi Rule 942220: Looking for integer overflow attacks, these are taken from skipfish, except 2.2.2250738585072011e-308 is the \\\"magic number\\\" crash", "output": "id: safeline-942220\nname: Looking for integer overflow attacks, these are taken from skipfish, except\n 2.2.2250738585072011e-308 is the \\\"magic number\\\" crash\ndescription: 'Converted from CRS Rule 942220: Looking for integer overflow attacks,\n these are taken from skipfish, except 2.2.2250738585072011e-308 is the \\\"magic number\\\"\n crash'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: ^(?i:-0000023456|4294967295|4294967296|2147483648|2147483647|0000012345|-2147483648|-2147483649|0000023456|2.2250738585072007e-308|2.2250738585072011e-308|1e309)$\n- field: request.query\n operator: regex_match\n value: ^(?i:-0000023456|4294967295|4294967296|2147483648|2147483647|0000012345|-2147483648|-2147483649|0000023456|2.2250738585072007e-308|2.2250738585072011e-308|1e309)$\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"} | |
| {"input": "CRS SQLi Rule 942230: Detects conditional SQL injection attempts", "output": "id: safeline-942230\nname: Detects conditional SQL injection attempts\ndescription: 'Converted from CRS Rule 942230: Detects conditional SQL injection attempts'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)[\\s\\x0b\\(\\)]case[\\s\\x0b]+when.*?then|\\)[\\s\\x0b]*?like[\\s\\x0b]*?\\(|select.*?having[\\s\\x0b]*?[^\\s\\x0b]+[\\s\\x0b]*?[^\\s\\x0b0-9A-Z_a-z]|if[\\s\\x0b]?\\([0-9A-Z_a-z]+[\\s\\x0b]*?[<->~]\n- field: request.query\n operator: regex_match\n value: (?i)[\\s\\x0b\\(\\)]case[\\s\\x0b]+when.*?then|\\)[\\s\\x0b]*?like[\\s\\x0b]*?\\(|select.*?having[\\s\\x0b]*?[^\\s\\x0b]+[\\s\\x0b]*?[^\\s\\x0b0-9A-Z_a-z]|if[\\s\\x0b]?\\([0-9A-Z_a-z]+[\\s\\x0b]*?[<->~]\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"} | |
| {"input": "CRS SQLi Rule 942240: Detects MySQL charset switch and MSSQL DoS attempts", "output": "id: safeline-942240\nname: Detects MySQL charset switch and MSSQL DoS attempts\ndescription: 'Converted from CRS Rule 942240: Detects MySQL charset switch and MSSQL\n DoS attempts'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)alter[\\s\\x0b]*?[0-9A-Z_a-z]+.*?char(?:acter)?[\\s\\x0b]+set[\\s\\x0b]+[0-9A-Z_a-z]+|[\\\"'`](?:;*?[\\s\\x0b]*?waitfor[\\s\\x0b]+(?:time|delay)[\\s\\x0b]+[\\\"'`]|;.*?:[\\s\\x0b]*?goto)\n- field: request.query\n operator: regex_match\n value: (?i)alter[\\s\\x0b]*?[0-9A-Z_a-z]+.*?char(?:acter)?[\\s\\x0b]+set[\\s\\x0b]+[0-9A-Z_a-z]+|[\\\"'`](?:;*?[\\s\\x0b]*?waitfor[\\s\\x0b]+(?:time|delay)[\\s\\x0b]+[\\\"'`]|;.*?:[\\s\\x0b]*?goto)\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"} | |
| {"input": "CRS SQLi Rule 942250: Detects MATCH AGAINST, MERGE and EXECUTE IMMEDIATE injections", "output": "id: safeline-942250\nname: Detects MATCH AGAINST, MERGE and EXECUTE IMMEDIATE injections\ndescription: 'Converted from CRS Rule 942250: Detects MATCH AGAINST, MERGE and EXECUTE\n IMMEDIATE injections'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i:merge.*?using\\s*?\\(|execute\\s*?immediate\\s*?[\\\"'`]|match\\s*?[\\w(),+-]+\\s*?against\\s*?\\()\n- field: request.query\n operator: regex_match\n value: (?i:merge.*?using\\s*?\\(|execute\\s*?immediate\\s*?[\\\"'`]|match\\s*?[\\w(),+-]+\\s*?against\\s*?\\()\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"} | |
| {"input": "CRS SQLi Rule 942270: Looking for basic sql injection. Common attack string for mysql, oracle and others", "output": "id: safeline-942270\nname: Looking for basic sql injection. Common attack string for mysql, oracle and\n others\ndescription: 'Converted from CRS Rule 942270: Looking for basic sql injection. Common\n attack string for mysql, oracle and others'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)union.*?select.*?from\n- field: request.query\n operator: regex_match\n value: (?i)union.*?select.*?from\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"} | |
| {"input": "CRS SQLi Rule 942280: Detects Postgres pg_sleep injection, waitfor delay attacks and database shutdown attempts", "output": "id: safeline-942280\nname: Detects Postgres pg_sleep injection, waitfor delay attacks and database shutdown\n attempts\ndescription: 'Converted from CRS Rule 942280: Detects Postgres pg_sleep injection,\n waitfor delay attacks and database shutdown attempts'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)select[\\s\\x0b]*?pg_sleep|waitfor[\\s\\x0b]*?delay[\\s\\x0b]?[\\\"'`]+[\\s\\x0b]?[0-9]|;[\\s\\x0b]*?shutdown[\\s\\x0b]*?(?:[#;\\{]|/\\*|--)\n- field: request.header\n operator: regex_match\n value: (?i)select[\\s\\x0b]*?pg_sleep|waitfor[\\s\\x0b]*?delay[\\s\\x0b]?[\\\"'`]+[\\s\\x0b]?[0-9]|;[\\s\\x0b]*?shutdown[\\s\\x0b]*?(?:[#;\\{]|/\\*|--)\n- field: request.query\n operator: regex_match\n value: (?i)select[\\s\\x0b]*?pg_sleep|waitfor[\\s\\x0b]*?delay[\\s\\x0b]?[\\\"'`]+[\\s\\x0b]?[0-9]|;[\\s\\x0b]*?shutdown[\\s\\x0b]*?(?:[#;\\{]|/\\*|--)\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- header\n- query"} | |
| {"input": "CRS SQLi Rule 942290: Finds basic MongoDB SQL injection attempts", "output": "id: safeline-942290\nname: Finds basic MongoDB SQL injection attempts\ndescription: 'Converted from CRS Rule 942290: Finds basic MongoDB SQL injection attempts'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)\\[?\\$(?:a(?:bs|c(?:cumulator|osh?)|dd(?:ToSet)?|ll(?:ElementsTrue)?|n(?:d|yElementTrue)|rray(?:ElemA|ToObjec)t|sinh?|tan[2h]?|vg)|b(?:etween|i(?:narySize|t(?:And|Not|(?:O|Xo)r)?)|ottomN?|sonSize|u\n- field: request.query\n operator: regex_match\n value: (?i)\\[?\\$(?:a(?:bs|c(?:cumulator|osh?)|dd(?:ToSet)?|ll(?:ElementsTrue)?|n(?:d|yElementTrue)|rray(?:ElemA|ToObjec)t|sinh?|tan[2h]?|vg)|b(?:etween|i(?:narySize|t(?:And|Not|(?:O|Xo)r)?)|ottomN?|sonSize|u\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"} | |
| {"input": "CRS SQLi Rule 942320: Detects MySQL and PostgreSQL stored procedure/function injections", "output": "id: safeline-942320\nname: Detects MySQL and PostgreSQL stored procedure/function injections\ndescription: 'Converted from CRS Rule 942320: Detects MySQL and PostgreSQL stored\n procedure/function injections'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)create[\\s\\x0b]+(?:function|procedure)[\\s\\x0b]*?[0-9A-Z_a-z]+[\\s\\x0b]*?\\([\\s\\x0b]*?\\)[\\s\\x0b]*?-|d(?:eclare[^0-9A-Z_a-z]+[#@][\\s\\x0b]*?[0-9A-Z_a-z]+|iv[\\s\\x0b]*?\\([\\+\\-]*[\\s\\x0b\\.0-9]+,[\\+\\-]*[\\s\\x\n- field: request.query\n operator: regex_match\n value: (?i)create[\\s\\x0b]+(?:function|procedure)[\\s\\x0b]*?[0-9A-Z_a-z]+[\\s\\x0b]*?\\([\\s\\x0b]*?\\)[\\s\\x0b]*?-|d(?:eclare[^0-9A-Z_a-z]+[#@][\\s\\x0b]*?[0-9A-Z_a-z]+|iv[\\s\\x0b]*?\\([\\+\\-]*[\\s\\x0b\\.0-9]+,[\\+\\-]*[\\s\\x\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"} | |
| {"input": "CRS SQLi Rule 942350: Detects MySQL UDF injection and other data/structure manipulation attempts", "output": "id: safeline-942350\nname: Detects MySQL UDF injection and other data/structure manipulation attempts\ndescription: 'Converted from CRS Rule 942350: Detects MySQL UDF injection and other\n data/structure manipulation attempts'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)create[\\s\\x0b]+function[\\s\\x0b].+[\\s\\x0b]returns|;[\\s\\x0b]*?(?:alter|(?:(?:cre|trunc|upd)at|renam)e|d(?:e(?:lete|sc)|rop)|(?:inser|selec)t|load)\\b[\\s\\x0b]*?[\\(\\[]?[0-9A-Z_a-z]{2,}\n- field: request.query\n operator: regex_match\n value: (?i)create[\\s\\x0b]+function[\\s\\x0b].+[\\s\\x0b]returns|;[\\s\\x0b]*?(?:alter|(?:(?:cre|trunc|upd)at|renam)e|d(?:e(?:lete|sc)|rop)|(?:inser|selec)t|load)\\b[\\s\\x0b]*?[\\(\\[]?[0-9A-Z_a-z]{2,}\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"} | |
| {"input": "CRS SQLi Rule 942360: Detects concatenated basic SQL injection and SQLLFI attempts", "output": "id: safeline-942360\nname: Detects concatenated basic SQL injection and SQLLFI attempts\ndescription: 'Converted from CRS Rule 942360: Detects concatenated basic SQL injection\n and SQLLFI attempts'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)\\b(?:(?:alter|(?:(?:cre|trunc|upd)at|renam)e|de(?:lete|sc)|(?:inser|selec)t|load)[\\s\\x0b]+(?:char|group_concat|load_file)\\b[\\s\\x0b]*\\(?|end[\\s\\x0b]*?\\);)|[\\s\\x0b\\(]load_file[\\s\\x0b]*?\\(|[\\\"'`][\\s\\\n- field: request.query\n operator: regex_match\n value: (?i)\\b(?:(?:alter|(?:(?:cre|trunc|upd)at|renam)e|de(?:lete|sc)|(?:inser|selec)t|load)[\\s\\x0b]+(?:char|group_concat|load_file)\\b[\\s\\x0b]*\\(?|end[\\s\\x0b]*?\\);)|[\\s\\x0b\\(]load_file[\\s\\x0b]*?\\(|[\\\"'`][\\s\\\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"} | |
| {"input": "CRS SQLi Rule 942500: MySQL in-line comment detected", "output": "id: safeline-942500\nname: MySQL in-line comment detected\ndescription: 'Converted from CRS Rule 942500: MySQL in-line comment detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)/\\*[\\s\\x0b]*?[!\\+](?:[\\s\\x0b\\(\\)\\-0-9=A-Z_a-z]+)?\\*/\n- field: request.query\n operator: regex_match\n value: (?i)/\\*[\\s\\x0b]*?[!\\+](?:[\\s\\x0b\\(\\)\\-0-9=A-Z_a-z]+)?\\*/\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"} | |
| {"input": "CRS SQLi Rule 942540: SQL Authentication bypass (split query)", "output": "id: safeline-942540\nname: SQL Authentication bypass (split query)\ndescription: 'Converted from CRS Rule 942540: SQL Authentication bypass (split query)'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: ^(?:[^']*'|[^\\\"]*\\\"|[^`]*`)[\\s\\x0b]*;\n- field: request.query\n operator: regex_match\n value: ^(?:[^']*'|[^\\\"]*\\\"|[^`]*`)[\\s\\x0b]*;\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"} | |
| {"input": "CRS SQLi Rule 942560: MySQL Scientific Notation payload detected", "output": "id: safeline-942560\nname: MySQL Scientific Notation payload detected\ndescription: 'Converted from CRS Rule 942560: MySQL Scientific Notation payload detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)1\\.e(?:[\\(\\),]|\\.[\\$0-9A-Z_a-z])\n- field: request.query\n operator: regex_match\n value: (?i)1\\.e(?:[\\(\\),]|\\.[\\$0-9A-Z_a-z])\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"} | |
| {"input": "CRS SQLi Rule 942550: JSON-Based SQL Injection", "output": "id: safeline-942550\nname: JSON-Based SQL Injection\ndescription: 'Converted from CRS Rule 942550: JSON-Based SQL Injection'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)[\\\"'`][\\[\\{][^#\\]\\}]*[\\]\\}]+[\\\"'`]|(?:[\\-@]>?|<@|@[\\?@]|\\?(?:(?:)|&|\\|#>)|#(?:>>|-)|->>|[<>])[\\\"'`](?:[\\[\\{][^#\\]\\}]*[\\]\\}]+[\\\"'`]|\\$[\\.\\[])|\\bjson_extract\\b[^\\(]*\\([^\\)]*\\)\n- field: request.path\n operator: regex_match\n value: (?i)[\\\"'`][\\[\\{][^#\\]\\}]*[\\]\\}]+[\\\"'`]|(?:[\\-@]>?|<@|@[\\?@]|\\?(?:(?:)|&|\\|#>)|#(?:>>|-)|->>|[<>])[\\\"'`](?:[\\[\\{][^#\\]\\}]*[\\]\\}]+[\\\"'`]|\\$[\\.\\[])|\\bjson_extract\\b[^\\(]*\\([^\\)]*\\)\n- field: request.query\n operator: regex_match\n value: (?i)[\\\"'`][\\[\\{][^#\\]\\}]*[\\]\\}]+[\\\"'`]|(?:[\\-@]>?|<@|@[\\?@]|\\?(?:(?:)|&|\\|#>)|#(?:>>|-)|->>|[<>])[\\\"'`](?:[\\[\\{][^#\\]\\}]*[\\]\\}]+[\\\"'`]|\\$[\\.\\[])|\\bjson_extract\\b[^\\(]*\\([^\\)]*\\)\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- path\n- query"} | |
| {"input": "CRS SQLi Rule 942120: SQL Injection Attack: SQL Operator Detected", "output": "id: safeline-942120\nname: 'SQL Injection Attack: SQL Operator Detected'\ndescription: 'Converted from CRS Rule 942120: SQL Injection Attack: SQL Operator Detected'\nrule_type: regex\nconditions:\n- field: request.path\n operator: regex_match\n value: (?i)[!=]=|&&|\\|\\||->|>[=>]|<(?:[<=]|>(?:[\\s\\x0b]+binary)?)|\\b(?:(?:xor|r(?:egexp|like)|i(?:snull|like)|notnull)\\b|collate(?:[^0-9A-Z_a-z]*?(?:U&)?[\\\"'`]|[^0-9A-Z_a-z]+(?:(?:binary|nocase|rtrim)\\b|[0-9\n- field: request.query\n operator: regex_match\n value: (?i)[!=]=|&&|\\|\\||->|>[=>]|<(?:[<=]|>(?:[\\s\\x0b]+binary)?)|\\b(?:(?:xor|r(?:egexp|like)|i(?:snull|like)|notnull)\\b|collate(?:[^0-9A-Z_a-z]*?(?:U&)?[\\\"'`]|[^0-9A-Z_a-z]+(?:(?:binary|nocase|rtrim)\\b|[0-9\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- path\n- query"} | |
| {"input": "CRS SQLi Rule 942130: SQL Injection Attack: SQL Boolean-based attack detected", "output": "id: safeline-942130\nname: 'SQL Injection Attack: SQL Boolean-based attack detected'\ndescription: 'Converted from CRS Rule 942130: SQL Injection Attack: SQL Boolean-based\n attack detected'\nrule_type: regex\nconditions:\n- field: request.query\n operator: regex_match\n value: (?i)[\\s\\x0b\\\"'-\\)`]*?\\b([0-9A-Z_a-z]+)\\b[\\s\\x0b\\\"'-\\)`]*?(?:=|<=>|(?:sounds[\\s\\x0b]+)?like|glob|r(?:like|egexp))[\\s\\x0b\\\"'-\\)`]*?\\b([0-9A-Z_a-z]+)\\b\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- query"} | |
| {"input": "CRS SQLi Rule 942131: SQL Injection Attack: SQL Boolean-based attack detected", "output": "id: safeline-942131\nname: 'SQL Injection Attack: SQL Boolean-based attack detected'\ndescription: 'Converted from CRS Rule 942131: SQL Injection Attack: SQL Boolean-based\n attack detected'\nrule_type: regex\nconditions:\n- field: request.query\n operator: regex_match\n value: (?i)[\\s\\x0b\\\"'-\\)`]*?\\b([0-9A-Z_a-z]+)\\b[\\s\\x0b\\\"'-\\)`]*?(?:![<->]|<[=>]?|>=?|\\^|is[\\s\\x0b]+not|not[\\s\\x0b]+(?:like|r(?:like|egexp)))[\\s\\x0b\\\"'-\\)`]*?\\b([0-9A-Z_a-z]+)\\b\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- query"} | |
| {"input": "CRS SQLi Rule 942150: SQL Injection Attack: SQL function name detected", "output": "id: safeline-942150\nname: 'SQL Injection Attack: SQL function name detected'\ndescription: 'Converted from CRS Rule 942150: SQL Injection Attack: SQL function name\n detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)\\b(?:json(?:_[0-9A-Z_a-z]+)?|a(?:bs|(?:cos|sin)h?|tan[2h]?|vg)|c(?:eil(?:ing)?|h(?:a(?:nges|r(?:set)?)|r)|o(?:alesce|sh?|unt)|ast)|d(?:e(?:grees|fault)|a(?:te|y))|exp|f(?:loor(?:avg)?|ormat|ield)|\n- field: request.query\n operator: regex_match\n value: (?i)\\b(?:json(?:_[0-9A-Z_a-z]+)?|a(?:bs|(?:cos|sin)h?|tan[2h]?|vg)|c(?:eil(?:ing)?|h(?:a(?:nges|r(?:set)?)|r)|o(?:alesce|sh?|unt)|ast)|d(?:e(?:grees|fault)|a(?:te|y))|exp|f(?:loor(?:avg)?|ormat|ield)|\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"} | |
| {"input": "CRS SQLi Rule 942180: Detects basic SQL authentication bypass attempts 1/3", "output": "id: safeline-942180\nname: Detects basic SQL authentication bypass attempts 1/3\ndescription: 'Converted from CRS Rule 942180: Detects basic SQL authentication bypass\n attempts 1/3'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)(?:/\\*)+[\\\"'`]+[\\s\\x0b]?(?:--|[#\\{]|/\\*)?|[\\\"'`](?:[\\s\\x0b]*(?:(?:x?or|and|div|like|between)[\\s\\x0b\\-0-9A-Z_a-z]+[\\(\\)\\+-\\-<->][\\s\\x0b]*[\\\"'0-9`]|[!=\\|](?:[\\s\\x0b!\\+\\-0-9=]+[^\\[]*[\\\"'\\(`].*|[\\s\\x0\n- field: request.query\n operator: regex_match\n value: (?i)(?:/\\*)+[\\\"'`]+[\\s\\x0b]?(?:--|[#\\{]|/\\*)?|[\\\"'`](?:[\\s\\x0b]*(?:(?:x?or|and|div|like|between)[\\s\\x0b\\-0-9A-Z_a-z]+[\\(\\)\\+-\\-<->][\\s\\x0b]*[\\\"'0-9`]|[!=\\|](?:[\\s\\x0b!\\+\\-0-9=]+[^\\[]*[\\\"'\\(`].*|[\\s\\x0\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"} | |
| {"input": "CRS SQLi Rule 942200: Detects MySQL comment-/space-obfuscated injections and backtick termination", "output": "id: safeline-942200\nname: Detects MySQL comment-/space-obfuscated injections and backtick termination\ndescription: 'Converted from CRS Rule 942200: Detects MySQL comment-/space-obfuscated\n injections and backtick termination'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i),.*?[\\\"'\\)0-9`-f][\\\"'`](?:[\\\"'`].*?[\\\"'`]|(?:\\r?\\n)?\\z|[^\\\"'`]+)|[^0-9A-Z_a-z]select.+[^0-9A-Z_a-z]*?from|(?:alter|(?:(?:cre|trunc|upd)at|renam)e|d(?:e(?:lete|sc)|rop)|(?:inser|selec)t|load)[\\s\\x0\n- field: request.header\n operator: regex_match\n value: (?i),.*?[\\\"'\\)0-9`-f][\\\"'`](?:[\\\"'`].*?[\\\"'`]|(?:\\r?\\n)?\\z|[^\\\"'`]+)|[^0-9A-Z_a-z]select.+[^0-9A-Z_a-z]*?from|(?:alter|(?:(?:cre|trunc|upd)at|renam)e|d(?:e(?:lete|sc)|rop)|(?:inser|selec)t|load)[\\s\\x0\n- field: request.query\n operator: regex_match\n value: (?i),.*?[\\\"'\\)0-9`-f][\\\"'`](?:[\\\"'`].*?[\\\"'`]|(?:\\r?\\n)?\\z|[^\\\"'`]+)|[^0-9A-Z_a-z]select.+[^0-9A-Z_a-z]*?from|(?:alter|(?:(?:cre|trunc|upd)at|renam)e|d(?:e(?:lete|sc)|rop)|(?:inser|selec)t|load)[\\s\\x0\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- header\n- query"} | |
| {"input": "CRS SQLi Rule 942210: Detects chained SQL injection attempts 1/2", "output": "id: safeline-942210\nname: Detects chained SQL injection attempts 1/2\ndescription: 'Converted from CRS Rule 942210: Detects chained SQL injection attempts\n 1/2'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)(?:&&|\\|\\||and|between|div|like|n(?:and|ot)|(?:xx?)?or)[\\s\\x0b\\(]+[0-9A-Z_a-z]+[\\s\\x0b\\)]*?[!\\+=]+[\\s\\x0b0-9]*?[\\\"'-\\)=`]|[0-9](?:[\\s\\x0b]*?(?:and|between|div|like|x?or)[\\s\\x0b]*?[0-9]+[\\s\\x0b]*?[\n- field: request.query\n operator: regex_match\n value: (?i)(?:&&|\\|\\||and|between|div|like|n(?:and|ot)|(?:xx?)?or)[\\s\\x0b\\(]+[0-9A-Z_a-z]+[\\s\\x0b\\)]*?[!\\+=]+[\\s\\x0b0-9]*?[\\\"'-\\)=`]|[0-9](?:[\\s\\x0b]*?(?:and|between|div|like|x?or)[\\s\\x0b]*?[0-9]+[\\s\\x0b]*?[\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"} | |
| {"input": "CRS SQLi Rule 942260: Detects basic SQL authentication bypass attempts 2/3", "output": "id: safeline-942260\nname: Detects basic SQL authentication bypass attempts 2/3\ndescription: 'Converted from CRS Rule 942260: Detects basic SQL authentication bypass\n attempts 2/3'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)[\\\"'`][\\s\\x0b]*?(?:(?:and|n(?:and|ot)|(?:xx?)?or|div|like|between|\\|\\||&&)[\\s\\x0b]+[\\s\\x0b0-9A-Z_a-z]+=[\\s\\x0b]*?[0-9A-Z_a-z]+[\\s\\x0b]*?having[\\s\\x0b]+|like[^0-9A-Z_a-z]*?[\\\"'0-9`])|[0-9A-Z_a-z][\\\n- field: request.query\n operator: regex_match\n value: (?i)[\\\"'`][\\s\\x0b]*?(?:(?:and|n(?:and|ot)|(?:xx?)?or|div|like|between|\\|\\||&&)[\\s\\x0b]+[\\s\\x0b0-9A-Z_a-z]+=[\\s\\x0b]*?[0-9A-Z_a-z]+[\\s\\x0b]*?having[\\s\\x0b]+|like[^0-9A-Z_a-z]*?[\\\"'0-9`])|[0-9A-Z_a-z][\\\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"} | |
| {"input": "CRS SQLi Rule 942300: Detects MySQL comments, conditions and ch(a)r injections", "output": "id: safeline-942300\nname: Detects MySQL comments, conditions and ch(a)r injections\ndescription: 'Converted from CRS Rule 942300: Detects MySQL comments, conditions and\n ch(a)r injections'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: '(?i)\\)[\\s\\x0b]*?when[\\s\\x0b]*?[0-9]+[\\s\\x0b]*?then|[\\\"''`][\\s\\x0b]*?(?:[#\\{]|--)|/\\*![\\s\\x0b]?[0-9]+|\\b(?:(?:binary|cha?r)[\\s\\x0b]*?\\([\\s\\x0b]*?[0-9]|(?:and|n(?:and|ot)|(?:xx?)?or|div|like|between|r(?:'\n- field: request.query\n operator: regex_match\n value: '(?i)\\)[\\s\\x0b]*?when[\\s\\x0b]*?[0-9]+[\\s\\x0b]*?then|[\\\"''`][\\s\\x0b]*?(?:[#\\{]|--)|/\\*![\\s\\x0b]?[0-9]+|\\b(?:(?:binary|cha?r)[\\s\\x0b]*?\\([\\s\\x0b]*?[0-9]|(?:and|n(?:and|ot)|(?:xx?)?or|div|like|between|r(?:'\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"} | |
| {"input": "CRS SQLi Rule 942310: Detects chained SQL injection attempts 2/2", "output": "id: safeline-942310\nname: Detects chained SQL injection attempts 2/2\ndescription: 'Converted from CRS Rule 942310: Detects chained SQL injection attempts\n 2/2'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)(?:\\([\\s\\x0b]*?select[\\s\\x0b]*?[0-9A-Z_a-z]+|coalesce|order[\\s\\x0b]+by[\\s\\x0b]+if[0-9A-Z_a-z]*?)[\\s\\x0b]*?\\(|\\*/from|\\+[\\s\\x0b]*?[0-9]+[\\s\\x0b]*?\\+[\\s\\x0b]*?@|[0-9A-Z_a-z][\\\"'`][\\s\\x0b]*?(?:(?:[\\+\n- field: request.query\n operator: regex_match\n value: (?i)(?:\\([\\s\\x0b]*?select[\\s\\x0b]*?[0-9A-Z_a-z]+|coalesce|order[\\s\\x0b]+by[\\s\\x0b]+if[0-9A-Z_a-z]*?)[\\s\\x0b]*?\\(|\\*/from|\\+[\\s\\x0b]*?[0-9]+[\\s\\x0b]*?\\+[\\s\\x0b]*?@|[0-9A-Z_a-z][\\\"'`][\\s\\x0b]*?(?:(?:[\\+\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"} | |
| {"input": "CRS SQLi Rule 942330: Detects classic SQL injection probings 1/3", "output": "id: safeline-942330\nname: Detects classic SQL injection probings 1/3\ndescription: 'Converted from CRS Rule 942330: Detects classic SQL injection probings\n 1/3'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)[\\\"'`][\\s\\x0b]*?\\b(?:x?or|div|like|between|and)\\b[\\s\\x0b]*?[\\\"'`]?[0-9]|\\x5cx(?:2[37]|3d)|^(?:.?[\\\"'`]$|[\\\"'\\x5c`]*?(?:[\\\"'0-9`]+|[^\\\"'`]+[\\\"'`])[\\s\\x0b]*?\\b(?:and|n(?:and|ot)|(?:xx?)?or|div|like|\n- field: request.query\n operator: regex_match\n value: (?i)[\\\"'`][\\s\\x0b]*?\\b(?:x?or|div|like|between|and)\\b[\\s\\x0b]*?[\\\"'`]?[0-9]|\\x5cx(?:2[37]|3d)|^(?:.?[\\\"'`]$|[\\\"'\\x5c`]*?(?:[\\\"'0-9`]+|[^\\\"'`]+[\\\"'`])[\\s\\x0b]*?\\b(?:and|n(?:and|ot)|(?:xx?)?or|div|like|\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"} | |
| {"input": "CRS SQLi Rule 942340: Detects basic SQL authentication bypass attempts 3/3", "output": "id: safeline-942340\nname: Detects basic SQL authentication bypass attempts 3/3\ndescription: 'Converted from CRS Rule 942340: Detects basic SQL authentication bypass\n attempts 3/3'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)in[\\s\\x0b]*?\\(+[\\s\\x0b]*?select|(?:(?:and|n(?:and|ot)|(?:xx?)?or|div|like|between)[\\s\\x0b]+|(?:\\|\\||&&)[\\s\\x0b]*?)[\\s\\x0b\\+0-9A-Z_a-z]+(?:regexp[\\s\\x0b]*?\\(|sounds[\\s\\x0b]+like[\\s\\x0b]*?[\\\"'`]|[0-\n- field: request.query\n operator: regex_match\n value: (?i)in[\\s\\x0b]*?\\(+[\\s\\x0b]*?select|(?:(?:and|n(?:and|ot)|(?:xx?)?or|div|like|between)[\\s\\x0b]+|(?:\\|\\||&&)[\\s\\x0b]*?)[\\s\\x0b\\+0-9A-Z_a-z]+(?:regexp[\\s\\x0b]*?\\(|sounds[\\s\\x0b]+like[\\s\\x0b]*?[\\\"'`]|[0-\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"} | |
| {"input": "CRS SQLi Rule 942361: Detects basic SQL injection based on keyword alter or union", "output": "id: safeline-942361\nname: Detects basic SQL injection based on keyword alter or union\ndescription: 'Converted from CRS Rule 942361: Detects basic SQL injection based on\n keyword alter or union'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i:^[\\W\\d]+\\s*?(?:alter|union)\\b)\n- field: request.query\n operator: regex_match\n value: (?i:^[\\W\\d]+\\s*?(?:alter|union)\\b)\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"} | |
| {"input": "CRS SQLi Rule 942362: Detects concatenated basic SQL injection and SQLLFI attempts", "output": "id: safeline-942362\nname: Detects concatenated basic SQL injection and SQLLFI attempts\ndescription: 'Converted from CRS Rule 942362: Detects concatenated basic SQL injection\n and SQLLFI attempts'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)(?:alter|(?:(?:cre|trunc|upd)at|renam)e|de(?:lete|sc)|(?:inser|selec)t|load)[\\s\\x0b]+(?:char|group_concat|load_file)[\\s\\x0b]?\\(?|end[\\s\\x0b]*?\\);|[\\s\\x0b\\(]load_file[\\s\\x0b]*?\\(|[\\\"'`][\\s\\x0b]+reg\n- field: request.query\n operator: regex_match\n value: (?i)(?:alter|(?:(?:cre|trunc|upd)at|renam)e|de(?:lete|sc)|(?:inser|selec)t|load)[\\s\\x0b]+(?:char|group_concat|load_file)[\\s\\x0b]?\\(?|end[\\s\\x0b]*?\\);|[\\s\\x0b\\(]load_file[\\s\\x0b]*?\\(|[\\\"'`][\\s\\x0b]+reg\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"} | |
| {"input": "CRS SQLi Rule 942370: Detects classic SQL injection probings 2/3", "output": "id: safeline-942370\nname: Detects classic SQL injection probings 2/3\ndescription: 'Converted from CRS Rule 942370: Detects classic SQL injection probings\n 2/3'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)[\\\"'`](?:[\\s\\x0b]*?(?:(?:\\*.+(?:x?or|div|like|between|(?:an|i)d)[^0-9A-Z_a-z]*?[\\\"'`]|(?:x?or|div|like|between|and)[\\s\\x0b][^0-9]+[\\-0-9A-Z_a-z]+[^0-9]*)[0-9]|[^\\s\\x0b0-9\\?A-Z_a-z]+[\\s\\x0b]*?[^\\s\\\n- field: request.header\n operator: regex_match\n value: (?i)[\\\"'`](?:[\\s\\x0b]*?(?:(?:\\*.+(?:x?or|div|like|between|(?:an|i)d)[^0-9A-Z_a-z]*?[\\\"'`]|(?:x?or|div|like|between|and)[\\s\\x0b][^0-9]+[\\-0-9A-Z_a-z]+[^0-9]*)[0-9]|[^\\s\\x0b0-9\\?A-Z_a-z]+[\\s\\x0b]*?[^\\s\\\n- field: request.query\n operator: regex_match\n value: (?i)[\\\"'`](?:[\\s\\x0b]*?(?:(?:\\*.+(?:x?or|div|like|between|(?:an|i)d)[^0-9A-Z_a-z]*?[\\\"'`]|(?:x?or|div|like|between|and)[\\s\\x0b][^0-9]+[\\-0-9A-Z_a-z]+[^0-9]*)[0-9]|[^\\s\\x0b0-9\\?A-Z_a-z]+[\\s\\x0b]*?[^\\s\\\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- header\n- query"} | |
| {"input": "CRS SQLi Rule 942380: SQL Injection Attack", "output": "id: safeline-942380\nname: SQL Injection Attack\ndescription: 'Converted from CRS Rule 942380: SQL Injection Attack'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)\\b(?:having\\b(?:[\\s\\x0b]+(?:[0-9]{1,10}|'[^=]{1,10}')[\\s\\x0b]*?[<->]|\n ?(?:[0-9]{1,10} ?[<->]+|[\\\"'][^=]{1,10}[ \\\"'<-\\?\\[]+))|ex(?:ecute(?:\\(|[\\s\\x0b]{1,5}[\\$\\.0-9A-Z_a-z]{1,5}[\\s\\x0b]{0,3})|ists[\\\n- field: request.query\n operator: regex_match\n value: (?i)\\b(?:having\\b(?:[\\s\\x0b]+(?:[0-9]{1,10}|'[^=]{1,10}')[\\s\\x0b]*?[<->]|\n ?(?:[0-9]{1,10} ?[<->]+|[\\\"'][^=]{1,10}[ \\\"'<-\\?\\[]+))|ex(?:ecute(?:\\(|[\\s\\x0b]{1,5}[\\$\\.0-9A-Z_a-z]{1,5}[\\s\\x0b]{0,3})|ists[\\\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"} | |
| {"input": "CRS SQLi Rule 942390: SQL Injection Attack", "output": "id: safeline-942390\nname: SQL Injection Attack\ndescription: 'Converted from CRS Rule 942390: SQL Injection Attack'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)\\b(?:or\\b(?:[\\s\\x0b]?(?:[0-9]{1,10}|[\\\"'][^=]{1,10}[\\\"'])[\\s\\x0b]?[<->]+|[\\s\\x0b]+(?:[0-9]{1,10}|'[^=]{1,10}')(?:[\\s\\x0b]*?[<->])?)|xor\\b[\\s\\x0b]+(?:[0-9]{1,10}|'[^=]{1,10}')(?:[\\s\\x0b]*?[<->])?)|\n- field: request.query\n operator: regex_match\n value: (?i)\\b(?:or\\b(?:[\\s\\x0b]?(?:[0-9]{1,10}|[\\\"'][^=]{1,10}[\\\"'])[\\s\\x0b]?[<->]+|[\\s\\x0b]+(?:[0-9]{1,10}|'[^=]{1,10}')(?:[\\s\\x0b]*?[<->])?)|xor\\b[\\s\\x0b]+(?:[0-9]{1,10}|'[^=]{1,10}')(?:[\\s\\x0b]*?[<->])?)|\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"} | |
| {"input": "CRS SQLi Rule 942400: SQL Injection Attack", "output": "id: safeline-942400\nname: SQL Injection Attack\ndescription: 'Converted from CRS Rule 942400: SQL Injection Attack'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)\\band\\b(?:[\\s\\x0b]+(?:[0-9]{1,10}[\\s\\x0b]*?[<->]|'[^=]{1,10}')| ?(?:[0-9]{1,10}|[\\\"'][^=]{1,10}[\\\"'])\n ?[<->]+)\n- field: request.query\n operator: regex_match\n value: (?i)\\band\\b(?:[\\s\\x0b]+(?:[0-9]{1,10}[\\s\\x0b]*?[<->]|'[^=]{1,10}')| ?(?:[0-9]{1,10}|[\\\"'][^=]{1,10}[\\\"'])\n ?[<->]+)\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"} | |
| {"input": "CRS SQLi Rule 942410: SQL Injection Attack", "output": "id: safeline-942410\nname: SQL Injection Attack\ndescription: 'Converted from CRS Rule 942410: SQL Injection Attack'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)\\b(?:a(?:(?:b|co)s|dd(?:dat|tim)e|es_(?:de|en)crypt|s(?:in|cii(?:str)?)|tan2?|vg)|b(?:enchmark|i(?:n(?:_to_num)?|t_(?:and|count|length|x?or)))|c(?:ast|h(?:ar(?:(?:acter)?_length|set)?|r)|iel(?:ing\n- field: request.query\n operator: regex_match\n value: (?i)\\b(?:a(?:(?:b|co)s|dd(?:dat|tim)e|es_(?:de|en)crypt|s(?:in|cii(?:str)?)|tan2?|vg)|b(?:enchmark|i(?:n(?:_to_num)?|t_(?:and|count|length|x?or)))|c(?:ast|h(?:ar(?:(?:acter)?_length|set)?|r)|iel(?:ing\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"} | |
| {"input": "CRS SQLi Rule 942470: SQL Injection Attack", "output": "id: safeline-942470\nname: SQL Injection Attack\ndescription: 'Converted from CRS Rule 942470: SQL Injection Attack'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)autonomous_transaction|(?:current_use|n?varcha|tbcreato)r|db(?:a_users|ms_java)|open(?:owa_util|query|rowset)|s(?:p_(?:(?:addextendedpro|sqlexe)c|execute(?:sql)?|help|is_srvrolemember|makewebtask|\n- field: request.query\n operator: regex_match\n value: (?i)autonomous_transaction|(?:current_use|n?varcha|tbcreato)r|db(?:a_users|ms_java)|open(?:owa_util|query|rowset)|s(?:p_(?:(?:addextendedpro|sqlexe)c|execute(?:sql)?|help|is_srvrolemember|makewebtask|\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"} | |
| {"input": "CRS SQLi Rule 942480: SQL Injection Attack", "output": "id: safeline-942480\nname: SQL Injection Attack\ndescription: 'Converted from CRS Rule 942480: SQL Injection Attack'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)\\b(?:(?:d(?:bms_[0-9A-Z_a-z]+\\.|elete\\b[^0-9A-Z_a-z]*?\\bfrom)|(?:group\\b.*?\\bby\\b.{1,100}?\\bhav|overlay\\b[^0-9A-Z_a-z]*?\\(.*?\\b[^0-9A-Z_a-z]*?plac)ing|in(?:ner\\b[^0-9A-Z_a-z]*?\\bjoin|sert\\b[^0-9A-\n- field: request.header\n operator: regex_match\n value: (?i)\\b(?:(?:d(?:bms_[0-9A-Z_a-z]+\\.|elete\\b[^0-9A-Z_a-z]*?\\bfrom)|(?:group\\b.*?\\bby\\b.{1,100}?\\bhav|overlay\\b[^0-9A-Z_a-z]*?\\(.*?\\b[^0-9A-Z_a-z]*?plac)ing|in(?:ner\\b[^0-9A-Z_a-z]*?\\bjoin|sert\\b[^0-9A-\n- field: request.query\n operator: regex_match\n value: (?i)\\b(?:(?:d(?:bms_[0-9A-Z_a-z]+\\.|elete\\b[^0-9A-Z_a-z]*?\\bfrom)|(?:group\\b.*?\\bby\\b.{1,100}?\\bhav|overlay\\b[^0-9A-Z_a-z]*?\\(.*?\\b[^0-9A-Z_a-z]*?plac)ing|in(?:ner\\b[^0-9A-Z_a-z]*?\\bjoin|sert\\b[^0-9A-\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- header\n- query"} | |
| {"input": "CRS SQLi Rule 942430: Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (12)", "output": "id: safeline-942430\nname: 'Restricted SQL Character Anomaly Detection (args): # of special characters\n exceeded (12)'\ndescription: 'Converted from CRS Rule 942430: Restricted SQL Character Anomaly Detection\n (args): # of special characters exceeded (12)'\nrule_type: regex\nconditions:\n- field: request.query\n operator: regex_match\n value: ((?:[~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'Β΄ββ`<>][^~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'Β΄ββ`<>]*?){12})\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- query"} | |
| {"input": "CRS SQLi Rule 942440: SQL Comment Sequence Detected", "output": "id: safeline-942440\nname: SQL Comment Sequence Detected\ndescription: 'Converted from CRS Rule 942440: SQL Comment Sequence Detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: /\\*!?|\\*/|[';]--|--(?:[\\s\\x0b]|[^\\-]*?-)|[^&\\-]#.*?[\\s\\x0b]|;?\\x00\n- field: request.query\n operator: regex_match\n value: /\\*!?|\\*/|[';]--|--(?:[\\s\\x0b]|[^\\-]*?-)|[^&\\-]#.*?[\\s\\x0b]|;?\\x00\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"} | |
| {"input": "CRS SQLi Rule 942450: SQL Hex Encoding Identified", "output": "id: safeline-942450\nname: SQL Hex Encoding Identified\ndescription: 'Converted from CRS Rule 942450: SQL Hex Encoding Identified'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i:\\b0x[a-f\\d]{3,})\n- field: request.query\n operator: regex_match\n value: (?i:\\b0x[a-f\\d]{3,})\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"} | |
| {"input": "CRS SQLi Rule 942510: SQLi bypass attempt by ticks or backticks detected", "output": "id: safeline-942510\nname: SQLi bypass attempt by ticks or backticks detected\ndescription: 'Converted from CRS Rule 942510: SQLi bypass attempt by ticks or backticks\n detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?:`(?:(?:[\\w\\s=_\\-+{}()<@]){2,29}|(?:[A-Za-z0-9+/]{4})+(?:[A-Za-z0-9+/]{2}==|[A-Za-z0-9+/]{3}=)?)`)\n- field: request.query\n operator: regex_match\n value: (?:`(?:(?:[\\w\\s=_\\-+{}()<@]){2,29}|(?:[A-Za-z0-9+/]{4})+(?:[A-Za-z0-9+/]{2}==|[A-Za-z0-9+/]{3}=)?)`)\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"} | |
| {"input": "CRS SQLi Rule 942520: Detects basic SQL authentication bypass attempts 4.0/4", "output": "id: safeline-942520\nname: Detects basic SQL authentication bypass attempts 4.0/4\ndescription: 'Converted from CRS Rule 942520: Detects basic SQL authentication bypass\n attempts 4.0/4'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)[\\\"'`][\\s\\x0b]*?(?:(?:is[\\s\\x0b]+not|not[\\s\\x0b]+(?:like|glob|(?:betwee|i)n|null|regexp|match)|mod|div|sounds[\\s\\x0b]+like)\\b|[%&\\*\\+\\-/<->\\^\\|]{1,3})\n- field: request.query\n operator: regex_match\n value: (?i)[\\\"'`][\\s\\x0b]*?(?:(?:is[\\s\\x0b]+not|not[\\s\\x0b]+(?:like|glob|(?:betwee|i)n|null|regexp|match)|mod|div|sounds[\\s\\x0b]+like)\\b|[%&\\*\\+\\-/<->\\^\\|]{1,3})\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"} | |
| {"input": "CRS SQLi Rule 942521: Detects basic SQL authentication bypass attempts 4.1/4", "output": "id: safeline-942521\nname: Detects basic SQL authentication bypass attempts 4.1/4\ndescription: 'Converted from CRS Rule 942521: Detects basic SQL authentication bypass\n attempts 4.1/4'\nrule_type: regex\nconditions:\n- field: request.header\n operator: regex_match\n value: (?i)^(?:[^']*?(?:'[^']*?'[^']*?)*?'|[^\\\"]*?(?:\\\"[^\\\"]*?\\\"[^\\\"]*?)*?\\\"|[^`]*?(?:`[^`]*?`[^`]*?)*?`)[\\s\\x0b]*([0-9A-Z_a-z]+)\\b\n- field: request.query\n operator: regex_match\n value: (?i)^(?:[^']*?(?:'[^']*?'[^']*?)*?'|[^\\\"]*?(?:\\\"[^\\\"]*?\\\"[^\\\"]*?)*?\\\"|[^`]*?(?:`[^`]*?`[^`]*?)*?`)[\\s\\x0b]*([0-9A-Z_a-z]+)\\b\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- header\n- query"} | |
| {"input": "CRS SQLi Rule 942522: Detects basic SQL authentication bypass attempts 4.1/4", "output": "id: safeline-942522\nname: Detects basic SQL authentication bypass attempts 4.1/4\ndescription: 'Converted from CRS Rule 942522: Detects basic SQL authentication bypass\n attempts 4.1/4'\nrule_type: regex\nconditions:\n- field: request.query\n operator: regex_match\n value: ^.*?\\x5c['\\\"`](?:.*?['\\\"`])?\\s*(?:and|or)\\b\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- query"} | |
| {"input": "CRS SQLi Rule 942101: SQL Injection Attack Detected via libinjection", "output": "id: safeline-942101\nname: SQL Injection Attack Detected via libinjection\ndescription: 'Converted from CRS Rule 942101: SQL Injection Attack Detected via libinjection'\nrule_type: semantic\nconditions:\n- field: request.path\n operator: semantic_match\n semantic_type: sqli\n threshold: 0.8\naction: block\nseverity: critical\ntags:\n- sqli\n- injection\n- database\nsemantic_type: sqli\ntargets:\n- path"} | |
| {"input": "CRS SQLi Rule 942152: SQL Injection Attack: SQL function name detected", "output": "id: safeline-942152\nname: 'SQL Injection Attack: SQL function name detected'\ndescription: 'Converted from CRS Rule 942152: SQL Injection Attack: SQL function name\n detected'\nrule_type: regex\nconditions:\n- field: request.header\n operator: regex_match\n value: (?i)\\b(?:a(?:dd(?:dat|tim)e|es_(?:de|en)crypt|s(?:cii(?:str)?|in)|tan2?)|b(?:enchmark|i(?:n_to_num|t_(?:and|count|length|x?or)))|c(?:har(?:acter)?_length|eil(?:ing)?|o(?:alesce|ercibility|llation|(?:m\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- header"} | |
| {"input": "CRS SQLi Rule 942321: Detects MySQL and PostgreSQL stored procedure/function injections", "output": "id: safeline-942321\nname: Detects MySQL and PostgreSQL stored procedure/function injections\ndescription: 'Converted from CRS Rule 942321: Detects MySQL and PostgreSQL stored\n procedure/function injections'\nrule_type: regex\nconditions:\n- field: request.header\n operator: regex_match\n value: (?i)create[\\s\\x0b]+(?:function|procedure)[\\s\\x0b]*?[0-9A-Z_a-z]+[\\s\\x0b]*?\\([\\s\\x0b]*?\\)[\\s\\x0b]*?-|d(?:eclare[^0-9A-Z_a-z]+[#@][\\s\\x0b]*?[0-9A-Z_a-z]+|iv[\\s\\x0b]*?\\([\\+\\-]*[\\s\\x0b\\.0-9]+,[\\+\\-]*[\\s\\x\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- header"} | |
| {"input": "CRS SQLi Rule 942251: Detects HAVING injections", "output": "id: safeline-942251\nname: Detects HAVING injections\ndescription: 'Converted from CRS Rule 942251: Detects HAVING injections'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)\\W+\\d*?\\s*?\\bhaving\\b\\s*?[^\\s\\-]\n- field: request.query\n operator: regex_match\n value: (?i)\\W+\\d*?\\s*?\\bhaving\\b\\s*?[^\\s\\-]\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"} | |
| {"input": "CRS SQLi Rule 942490: Detects classic SQL injection probings 3/3", "output": "id: safeline-942490\nname: Detects classic SQL injection probings 3/3\ndescription: 'Converted from CRS Rule 942490: Detects classic SQL injection probings\n 3/3'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: '[\\\"''`][\\s\\d]*?[^\\w\\s]\\W*?\\d\\W*?.*?[\\\"''`\\d]'\n- field: request.query\n operator: regex_match\n value: '[\\\"''`][\\s\\d]*?[^\\w\\s]\\W*?\\d\\W*?.*?[\\\"''`\\d]'\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"} | |
| {"input": "CRS SQLi Rule 942420: Restricted SQL Character Anomaly Detection (cookies): # of special characters exceeded (8)", "output": "id: safeline-942420\nname: 'Restricted SQL Character Anomaly Detection (cookies): # of special characters\n exceeded (8)'\ndescription: 'Converted from CRS Rule 942420: Restricted SQL Character Anomaly Detection\n (cookies): # of special characters exceeded (8)'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: ((?:[~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'Β΄ββ`<>][^~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'Β΄ββ`<>]*?){8})\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie"} | |
| {"input": "CRS SQLi Rule 942431: Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (6)", "output": "id: safeline-942431\nname: 'Restricted SQL Character Anomaly Detection (args): # of special characters\n exceeded (6)'\ndescription: 'Converted from CRS Rule 942431: Restricted SQL Character Anomaly Detection\n (args): # of special characters exceeded (6)'\nrule_type: regex\nconditions:\n- field: request.query\n operator: regex_match\n value: ((?:[~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'Β΄ββ`<>][^~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'Β΄ββ`<>]*?){6})\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- query"} | |
| {"input": "CRS SQLi Rule 942460: Meta-Character Anomaly Detection Alert - Repetitive Non-Word Characters", "output": "id: safeline-942460\nname: Meta-Character Anomaly Detection Alert - Repetitive Non-Word Characters\ndescription: 'Converted from CRS Rule 942460: Meta-Character Anomaly Detection Alert\n - Repetitive Non-Word Characters'\nrule_type: regex\nconditions:\n- field: request.query\n operator: regex_match\n value: \\W{4}\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- query"} | |
| {"input": "CRS SQLi Rule 942511: SQLi bypass attempt by ticks detected", "output": "id: safeline-942511\nname: SQLi bypass attempt by ticks detected\ndescription: 'Converted from CRS Rule 942511: SQLi bypass attempt by ticks detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?:'(?:(?:[\\w\\s=_\\-+{}()<@]){2,29}|(?:[A-Za-z0-9+/]{4})+(?:[A-Za-z0-9+/]{2}==|[A-Za-z0-9+/]{3}=)?)')\n- field: request.query\n operator: regex_match\n value: (?:'(?:(?:[\\w\\s=_\\-+{}()<@]){2,29}|(?:[A-Za-z0-9+/]{4})+(?:[A-Za-z0-9+/]{2}==|[A-Za-z0-9+/]{3}=)?)')\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"} | |
| {"input": "CRS SQLi Rule 942530: SQLi query termination detected", "output": "id: safeline-942530\nname: SQLi query termination detected\ndescription: 'Converted from CRS Rule 942530: SQLi query termination detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: ''';'\n- field: request.query\n operator: regex_match\n value: ''';'\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"} | |
| {"input": "CRS SQLi Rule 942421: Restricted SQL Character Anomaly Detection (cookies): # of special characters exceeded (3)", "output": "id: safeline-942421\nname: 'Restricted SQL Character Anomaly Detection (cookies): # of special characters\n exceeded (3)'\ndescription: 'Converted from CRS Rule 942421: Restricted SQL Character Anomaly Detection\n (cookies): # of special characters exceeded (3)'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: ((?:[~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'Β΄ββ`<>][^~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'Β΄ββ`<>]*?){3})\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie"} | |
| {"input": "CRS SQLi Rule 942432: Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (2)", "output": "id: safeline-942432\nname: 'Restricted SQL Character Anomaly Detection (args): # of special characters\n exceeded (2)'\ndescription: 'Converted from CRS Rule 942432: Restricted SQL Character Anomaly Detection\n (args): # of special characters exceeded (2)'\nrule_type: regex\nconditions:\n- field: request.query\n operator: regex_match\n value: ((?:[~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'Β΄ββ`<>][^~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'Β΄ββ`<>]*?){2})\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- query"} | |