Te0f commited on
Commit
514b139
·
verified ·
1 Parent(s): d15e303

Upload folder using huggingface_hub

Browse files
map-waf/AWS-WAF-Mapping.jsonl ADDED
The diff for this file is too large to render. See raw diff
 
map-waf/Bunker-Rules-Mapping.jsonl ADDED
@@ -0,0 +1,93 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {"input": "CRS XSS Rule 941100: XSS Attack Detected via libinjection", "output": "id: bunker-941100\nname: XSS Attack Detected via libinjection\nconditions:\n- field: request.cookies\n operator: ml_detect\n threshold: 0.7\n- field: request.headers.user-agent\n operator: ml_detect\n threshold: 0.7\n- field: request.query\n operator: ml_detect\n threshold: 0.7\naction: block\nseverity: medium"}
2
+ {"input": "CRS XSS Rule 941110: XSS Filter - Category 1: Script Tag Vector", "output": "id: bunker-941110\nname: 'XSS Filter - Category 1: Script Tag Vector'\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)<script[^>]*>[\\s\\S]*?\n- field: request.headers.referer\n operator: regex\n value: (?i)<script[^>]*>[\\s\\S]*?\n- field: request.headers.user-agent\n operator: regex\n value: (?i)<script[^>]*>[\\s\\S]*?\n- field: request.query\n operator: regex\n value: (?i)<script[^>]*>[\\s\\S]*?\n- field: request.uri\n operator: regex\n value: (?i)<script[^>]*>[\\s\\S]*?\naction: block\nseverity: medium"}
3
+ {"input": "CRS XSS Rule 941130: XSS Filter - Category 3: Attribute Vector", "output": "id: bunker-941130\nname: 'XSS Filter - Category 3: Attribute Vector'\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i).(?:\\b(?:(?:x(?:link:href|html|mlns)|data:text/html|formaction)\\b|pattern[\\s\\x0b]*=)|(?:!ENTITY[\\s\\x0b]+(?:%[\\s\\x0b]+)?[^\\s\\x0b]+[\\s\\x0b]+(?:SYSTEM|PUBLIC)|@import|;base64)\\b)\n- field: request.headers.user-agent\n operator: regex\n value: (?i).(?:\\b(?:(?:x(?:link:href|html|mlns)|data:text/html|formaction)\\b|pattern[\\s\\x0b]*=)|(?:!ENTITY[\\s\\x0b]+(?:%[\\s\\x0b]+)?[^\\s\\x0b]+[\\s\\x0b]+(?:SYSTEM|PUBLIC)|@import|;base64)\\b)\n- field: request.query\n operator: regex\n value: (?i).(?:\\b(?:(?:x(?:link:href|html|mlns)|data:text/html|formaction)\\b|pattern[\\s\\x0b]*=)|(?:!ENTITY[\\s\\x0b]+(?:%[\\s\\x0b]+)?[^\\s\\x0b]+[\\s\\x0b]+(?:SYSTEM|PUBLIC)|@import|;base64)\\b)\n- field: request.uri\n operator: regex\n value: (?i).(?:\\b(?:(?:x(?:link:href|html|mlns)|data:text/html|formaction)\\b|pattern[\\s\\x0b]*=)|(?:!ENTITY[\\s\\x0b]+(?:%[\\s\\x0b]+)?[^\\s\\x0b]+[\\s\\x0b]+(?:SYSTEM|PUBLIC)|@import|;base64)\\b)\naction: block\nseverity: medium"}
4
+ {"input": "CRS XSS Rule 941140: XSS Filter - Category 4: Javascript URI Vector", "output": "id: bunker-941140\nname: 'XSS Filter - Category 4: Javascript URI Vector'\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)[a-z]+=(?:[^:=]+:.+;)*?[^:=]+:url\\(javascript\n- field: request.headers.referer\n operator: regex\n value: (?i)[a-z]+=(?:[^:=]+:.+;)*?[^:=]+:url\\(javascript\n- field: request.headers.user-agent\n operator: regex\n value: (?i)[a-z]+=(?:[^:=]+:.+;)*?[^:=]+:url\\(javascript\n- field: request.query\n operator: regex\n value: (?i)[a-z]+=(?:[^:=]+:.+;)*?[^:=]+:url\\(javascript\n- field: request.uri\n operator: regex\n value: (?i)[a-z]+=(?:[^:=]+:.+;)*?[^:=]+:url\\(javascript\naction: block\nseverity: medium"}
5
+ {"input": "CRS XSS Rule 941160: NoScript XSS InjectionChecker: HTML Injection", "output": "id: bunker-941160\nname: 'NoScript XSS InjectionChecker: HTML Injection'\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)<[^0-9<>A-Z_a-z]*(?:[^\\s\\x0b\\\"'<>]*:)?[^0-9<>A-Z_a-z]*[^0-9A-Z_a-z]*?(?:s[^0-9A-Z_a-z]*?(?:c[^0-9A-Z_a-z]*?r[^0-9A-Z_a-z]*?i[^0-9A-Z_a-z]*?p[^0-9A-Z_a-z]*?t|t[^0-9A-Z_a-z]*?y[^0-9A-Z_a-z]*?l[^0-9A\n- field: request.headers.referer\n operator: regex\n value: (?i)<[^0-9<>A-Z_a-z]*(?:[^\\s\\x0b\\\"'<>]*:)?[^0-9<>A-Z_a-z]*[^0-9A-Z_a-z]*?(?:s[^0-9A-Z_a-z]*?(?:c[^0-9A-Z_a-z]*?r[^0-9A-Z_a-z]*?i[^0-9A-Z_a-z]*?p[^0-9A-Z_a-z]*?t|t[^0-9A-Z_a-z]*?y[^0-9A-Z_a-z]*?l[^0-9A\n- field: request.headers.user-agent\n operator: regex\n value: (?i)<[^0-9<>A-Z_a-z]*(?:[^\\s\\x0b\\\"'<>]*:)?[^0-9<>A-Z_a-z]*[^0-9A-Z_a-z]*?(?:s[^0-9A-Z_a-z]*?(?:c[^0-9A-Z_a-z]*?r[^0-9A-Z_a-z]*?i[^0-9A-Z_a-z]*?p[^0-9A-Z_a-z]*?t|t[^0-9A-Z_a-z]*?y[^0-9A-Z_a-z]*?l[^0-9A\n- field: request.query\n operator: regex\n value: (?i)<[^0-9<>A-Z_a-z]*(?:[^\\s\\x0b\\\"'<>]*:)?[^0-9<>A-Z_a-z]*[^0-9A-Z_a-z]*?(?:s[^0-9A-Z_a-z]*?(?:c[^0-9A-Z_a-z]*?r[^0-9A-Z_a-z]*?i[^0-9A-Z_a-z]*?p[^0-9A-Z_a-z]*?t|t[^0-9A-Z_a-z]*?y[^0-9A-Z_a-z]*?l[^0-9A\n- field: request.uri\n operator: regex\n value: (?i)<[^0-9<>A-Z_a-z]*(?:[^\\s\\x0b\\\"'<>]*:)?[^0-9<>A-Z_a-z]*[^0-9A-Z_a-z]*?(?:s[^0-9A-Z_a-z]*?(?:c[^0-9A-Z_a-z]*?r[^0-9A-Z_a-z]*?i[^0-9A-Z_a-z]*?p[^0-9A-Z_a-z]*?t|t[^0-9A-Z_a-z]*?y[^0-9A-Z_a-z]*?l[^0-9A\naction: block\nseverity: medium"}
6
+ {"input": "CRS XSS Rule 941170: NoScript XSS InjectionChecker: Attribute Injection", "output": "id: bunker-941170\nname: 'NoScript XSS InjectionChecker: Attribute Injection'\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)(?:\\W|^)(?:javascript:(?:[\\s\\S]+[=\\x5c\\(\\[\\.<]|[\\s\\S]*?(?:\\bname\\b|\\x5c[ux]\\d))|data:(?:(?:[a-z]\\w+/\\w[\\w+-]+\\w)?[;,]|[\\s\\S]*?;[\\s\\S]*?\\b(?:base64|charset=)|[\\s\\S]*?,[\\s\\S]*?<[\\s\\S]*?\\w[\\s\\S]*?>))\n- field: request.headers.referer\n operator: regex\n value: (?i)(?:\\W|^)(?:javascript:(?:[\\s\\S]+[=\\x5c\\(\\[\\.<]|[\\s\\S]*?(?:\\bname\\b|\\x5c[ux]\\d))|data:(?:(?:[a-z]\\w+/\\w[\\w+-]+\\w)?[;,]|[\\s\\S]*?;[\\s\\S]*?\\b(?:base64|charset=)|[\\s\\S]*?,[\\s\\S]*?<[\\s\\S]*?\\w[\\s\\S]*?>))\n- field: request.headers.user-agent\n operator: regex\n value: (?i)(?:\\W|^)(?:javascript:(?:[\\s\\S]+[=\\x5c\\(\\[\\.<]|[\\s\\S]*?(?:\\bname\\b|\\x5c[ux]\\d))|data:(?:(?:[a-z]\\w+/\\w[\\w+-]+\\w)?[;,]|[\\s\\S]*?;[\\s\\S]*?\\b(?:base64|charset=)|[\\s\\S]*?,[\\s\\S]*?<[\\s\\S]*?\\w[\\s\\S]*?>))\n- field: request.query\n operator: regex\n value: (?i)(?:\\W|^)(?:javascript:(?:[\\s\\S]+[=\\x5c\\(\\[\\.<]|[\\s\\S]*?(?:\\bname\\b|\\x5c[ux]\\d))|data:(?:(?:[a-z]\\w+/\\w[\\w+-]+\\w)?[;,]|[\\s\\S]*?;[\\s\\S]*?\\b(?:base64|charset=)|[\\s\\S]*?,[\\s\\S]*?<[\\s\\S]*?\\w[\\s\\S]*?>))\n- field: request.uri\n operator: regex\n value: (?i)(?:\\W|^)(?:javascript:(?:[\\s\\S]+[=\\x5c\\(\\[\\.<]|[\\s\\S]*?(?:\\bname\\b|\\x5c[ux]\\d))|data:(?:(?:[a-z]\\w+/\\w[\\w+-]+\\w)?[;,]|[\\s\\S]*?;[\\s\\S]*?\\b(?:base64|charset=)|[\\s\\S]*?,[\\s\\S]*?<[\\s\\S]*?\\w[\\s\\S]*?>))\naction: block\nseverity: medium"}
7
+ {"input": "CRS XSS Rule 941180: Node-Validator Deny List Keywords", "output": "id: bunker-941180\nname: Node-Validator Deny List Keywords\nconditions:\n- field: request.cookies\n operator: regex\n value: document.cookie document.domain document.querySelector document.body.appendChild\n document.write .parentnode .innerhtml window.location -moz-binding <!-- <![cdata[\n- field: request.query\n operator: regex\n value: document.cookie document.domain document.querySelector document.body.appendChild\n document.write .parentnode .innerhtml window.location -moz-binding <!-- <![cdata[\n- field: request.uri\n operator: regex\n value: document.cookie document.domain document.querySelector document.body.appendChild\n document.write .parentnode .innerhtml window.location -moz-binding <!-- <![cdata[\naction: block\nseverity: medium"}
8
+ {"input": "CRS XSS Rule 941190: IE XSS Filters - Attack Detected", "output": "id: bunker-941190\nname: IE XSS Filters - Attack Detected\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i:<style.*?>.*?(?:@[i\\x5c]|(?:[:=]|&#x?0*(?:58|3A|61|3D);?).*?(?:[(\\x5c]|&#x?0*(?:40|28|92|5C);?)))\n- field: request.query\n operator: regex\n value: (?i:<style.*?>.*?(?:@[i\\x5c]|(?:[:=]|&#x?0*(?:58|3A|61|3D);?).*?(?:[(\\x5c]|&#x?0*(?:40|28|92|5C);?)))\n- field: request.uri\n operator: regex\n value: (?i:<style.*?>.*?(?:@[i\\x5c]|(?:[:=]|&#x?0*(?:58|3A|61|3D);?).*?(?:[(\\x5c]|&#x?0*(?:40|28|92|5C);?)))\naction: block\nseverity: medium"}
9
+ {"input": "CRS XSS Rule 941200: IE XSS Filters - Attack Detected", "output": "id: bunker-941200\nname: IE XSS Filters - Attack Detected\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i:<.*[:]?vmlframe.*?[\\s/+]*?src[\\s/+]*=)\n- field: request.query\n operator: regex\n value: (?i:<.*[:]?vmlframe.*?[\\s/+]*?src[\\s/+]*=)\n- field: request.uri\n operator: regex\n value: (?i:<.*[:]?vmlframe.*?[\\s/+]*?src[\\s/+]*=)\naction: block\nseverity: medium"}
10
+ {"input": "CRS XSS Rule 941210: Javascript Word Detected", "output": "id: bunker-941210\nname: Javascript Word Detected\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)(?:j|&#(?:0*(?:74|106)|x0*[46]A);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(?:a|&#(?:0*(?:65|97)|x0*[46]1);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(\n- field: request.query\n operator: regex\n value: (?i)(?:j|&#(?:0*(?:74|106)|x0*[46]A);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(?:a|&#(?:0*(?:65|97)|x0*[46]1);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(\n- field: request.uri\n operator: regex\n value: (?i)(?:j|&#(?:0*(?:74|106)|x0*[46]A);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(?:a|&#(?:0*(?:65|97)|x0*[46]1);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(\naction: block\nseverity: medium"}
11
+ {"input": "CRS XSS Rule 941220: IE XSS Filters - Attack Detected", "output": "id: bunker-941220\nname: IE XSS Filters - Attack Detected\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)(?:v|&#(?:0*(?:118|86)|x0*[57]6);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(?:b|&#(?:0*(?:98|66)|x0*[46]2);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(\n- field: request.query\n operator: regex\n value: (?i)(?:v|&#(?:0*(?:118|86)|x0*[57]6);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(?:b|&#(?:0*(?:98|66)|x0*[46]2);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(\n- field: request.uri\n operator: regex\n value: (?i)(?:v|&#(?:0*(?:118|86)|x0*[57]6);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(?:b|&#(?:0*(?:98|66)|x0*[46]2);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(\naction: block\nseverity: medium"}
12
+ {"input": "CRS XSS Rule 941230: IE XSS Filters - Attack Detected", "output": "id: bunker-941230\nname: IE XSS Filters - Attack Detected\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)<EMBED[\\s/+].*?(?:src|type).*?=\n- field: request.query\n operator: regex\n value: (?i)<EMBED[\\s/+].*?(?:src|type).*?=\n- field: request.uri\n operator: regex\n value: (?i)<EMBED[\\s/+].*?(?:src|type).*?=\naction: block\nseverity: medium"}
13
+ {"input": "CRS XSS Rule 941240: IE XSS Filters - Attack Detected", "output": "id: bunker-941240\nname: IE XSS Filters - Attack Detected\nconditions:\n- field: request.cookies\n operator: regex\n value: <[?]?import[\\s/+\\S]*?implementation[\\s/+]*?=\n- field: request.query\n operator: regex\n value: <[?]?import[\\s/+\\S]*?implementation[\\s/+]*?=\n- field: request.uri\n operator: regex\n value: <[?]?import[\\s/+\\S]*?implementation[\\s/+]*?=\naction: block\nseverity: medium"}
14
+ {"input": "CRS XSS Rule 941250: IE XSS Filters - Attack Detected", "output": "id: bunker-941250\nname: IE XSS Filters - Attack Detected\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i:<META[\\s/+].*?http-equiv[\\s/+]*=[\\s/+]*[\\\"'`]?(?:(?:c|&#x?0*(?:67|43|99|63);?)|(?:r|&#x?0*(?:82|52|114|72);?)|(?:s|&#x?0*(?:83|53|115|73);?)))\n- field: request.query\n operator: regex\n value: (?i:<META[\\s/+].*?http-equiv[\\s/+]*=[\\s/+]*[\\\"'`]?(?:(?:c|&#x?0*(?:67|43|99|63);?)|(?:r|&#x?0*(?:82|52|114|72);?)|(?:s|&#x?0*(?:83|53|115|73);?)))\n- field: request.uri\n operator: regex\n value: (?i:<META[\\s/+].*?http-equiv[\\s/+]*=[\\s/+]*[\\\"'`]?(?:(?:c|&#x?0*(?:67|43|99|63);?)|(?:r|&#x?0*(?:82|52|114|72);?)|(?:s|&#x?0*(?:83|53|115|73);?)))\naction: block\nseverity: medium"}
15
+ {"input": "CRS XSS Rule 941260: IE XSS Filters - Attack Detected", "output": "id: bunker-941260\nname: IE XSS Filters - Attack Detected\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i:<META[\\s/+].*?charset[\\s/+]*=)\n- field: request.query\n operator: regex\n value: (?i:<META[\\s/+].*?charset[\\s/+]*=)\n- field: request.uri\n operator: regex\n value: (?i:<META[\\s/+].*?charset[\\s/+]*=)\naction: block\nseverity: medium"}
16
+ {"input": "CRS XSS Rule 941270: IE XSS Filters - Attack Detected", "output": "id: bunker-941270\nname: IE XSS Filters - Attack Detected\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)<LINK[\\s/+].*?href[\\s/+]*=\n- field: request.query\n operator: regex\n value: (?i)<LINK[\\s/+].*?href[\\s/+]*=\n- field: request.uri\n operator: regex\n value: (?i)<LINK[\\s/+].*?href[\\s/+]*=\naction: block\nseverity: medium"}
17
+ {"input": "CRS XSS Rule 941280: IE XSS Filters - Attack Detected", "output": "id: bunker-941280\nname: IE XSS Filters - Attack Detected\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)<BASE[\\s/+].*?href[\\s/+]*=\n- field: request.query\n operator: regex\n value: (?i)<BASE[\\s/+].*?href[\\s/+]*=\n- field: request.uri\n operator: regex\n value: (?i)<BASE[\\s/+].*?href[\\s/+]*=\naction: block\nseverity: medium"}
18
+ {"input": "CRS XSS Rule 941290: IE XSS Filters - Attack Detected", "output": "id: bunker-941290\nname: IE XSS Filters - Attack Detected\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)<APPLET[\\s/+>]\n- field: request.query\n operator: regex\n value: (?i)<APPLET[\\s/+>]\n- field: request.uri\n operator: regex\n value: (?i)<APPLET[\\s/+>]\naction: block\nseverity: medium"}
19
+ {"input": "CRS XSS Rule 941300: IE XSS Filters - Attack Detected", "output": "id: bunker-941300\nname: IE XSS Filters - Attack Detected\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)<OBJECT[\\s/+].*?(?:type|codetype|classid|code|data)[\\s/+]*=\n- field: request.query\n operator: regex\n value: (?i)<OBJECT[\\s/+].*?(?:type|codetype|classid|code|data)[\\s/+]*=\n- field: request.uri\n operator: regex\n value: (?i)<OBJECT[\\s/+].*?(?:type|codetype|classid|code|data)[\\s/+]*=\naction: block\nseverity: medium"}
20
+ {"input": "CRS XSS Rule 941310: US-ASCII Malformed Encoding XSS Filter - Attack Detected", "output": "id: bunker-941310\nname: US-ASCII Malformed Encoding XSS Filter - Attack Detected\nconditions:\n- field: request.cookies\n operator: regex\n value: \\xbc[^\\xbe>]*[\\xbe>]|<[^\\xbe]*\\xbe\n- field: request.query\n operator: regex\n value: \\xbc[^\\xbe>]*[\\xbe>]|<[^\\xbe]*\\xbe\n- field: request.uri\n operator: regex\n value: \\xbc[^\\xbe>]*[\\xbe>]|<[^\\xbe]*\\xbe\naction: block\nseverity: medium"}
21
+ {"input": "CRS XSS Rule 941350: UTF-7 Encoding IE XSS - Attack Detected", "output": "id: bunker-941350\nname: UTF-7 Encoding IE XSS - Attack Detected\nconditions:\n- field: request.cookies\n operator: regex\n value: \\+ADw-.*(?:\\+AD4-|>)|<.*\\+AD4-\n- field: request.query\n operator: regex\n value: \\+ADw-.*(?:\\+AD4-|>)|<.*\\+AD4-\n- field: request.uri\n operator: regex\n value: \\+ADw-.*(?:\\+AD4-|>)|<.*\\+AD4-\naction: block\nseverity: medium"}
22
+ {"input": "CRS XSS Rule 941360: JSFuck / Hieroglyphy obfuscation detected", "output": "id: bunker-941360\nname: JSFuck / Hieroglyphy obfuscation detected\nconditions:\n- field: request.cookies\n operator: regex\n value: '![!+ ]\\[\\]'\n- field: request.query\n operator: regex\n value: '![!+ ]\\[\\]'\n- field: request.uri\n operator: regex\n value: '![!+ ]\\[\\]'\naction: block\nseverity: medium"}
23
+ {"input": "CRS XSS Rule 941370: JavaScript global variable found", "output": "id: bunker-941370\nname: JavaScript global variable found\nconditions:\n- field: request.cookies\n operator: regex\n value: (?:self|document|this|top|window)\\s*(?:/\\*|[\\[)]).+?(?:\\]|\\*/)\n- field: request.query\n operator: regex\n value: (?:self|document|this|top|window)\\s*(?:/\\*|[\\[)]).+?(?:\\]|\\*/)\n- field: request.uri\n operator: regex\n value: (?:self|document|this|top|window)\\s*(?:/\\*|[\\[)]).+?(?:\\]|\\*/)\naction: block\nseverity: medium"}
24
+ {"input": "CRS XSS Rule 941390: Javascript method detected", "output": "id: bunker-941390\nname: Javascript method detected\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)\\b(?:eval|set(?:timeout|interval)|new[\\s\\x0b]+Function|a(?:lert|tob)|btoa|(?:promp|impor)t|con(?:firm|sole\\.(?:log|dir))|fetch)[\\s\\x0b]*[\\(\\{]\n- field: request.query\n operator: regex\n value: (?i)\\b(?:eval|set(?:timeout|interval)|new[\\s\\x0b]+Function|a(?:lert|tob)|btoa|(?:promp|impor)t|con(?:firm|sole\\.(?:log|dir))|fetch)[\\s\\x0b]*[\\(\\{]\n- field: request.uri\n operator: regex\n value: (?i)\\b(?:eval|set(?:timeout|interval)|new[\\s\\x0b]+Function|a(?:lert|tob)|btoa|(?:promp|impor)t|con(?:firm|sole\\.(?:log|dir))|fetch)[\\s\\x0b]*[\\(\\{]\naction: block\nseverity: medium"}
25
+ {"input": "CRS XSS Rule 941400: XSS JavaScript function without parentheses", "output": "id: bunker-941400\nname: XSS JavaScript function without parentheses\nconditions:\n- field: request.cookies\n operator: regex\n value: ((?:\\[[^\\]]*\\][^.]*\\.)|Reflect[^.]*\\.).*(?:map|sort|apply)[^.]*\\..*call[^`]*`.*`\n- field: request.query\n operator: regex\n value: ((?:\\[[^\\]]*\\][^.]*\\.)|Reflect[^.]*\\.).*(?:map|sort|apply)[^.]*\\..*call[^`]*`.*`\n- field: request.uri\n operator: regex\n value: ((?:\\[[^\\]]*\\][^.]*\\.)|Reflect[^.]*\\.).*(?:map|sort|apply)[^.]*\\..*call[^`]*`.*`\naction: block\nseverity: medium"}
26
+ {"input": "CRS XSS Rule 941101: XSS Attack Detected via libinjection", "output": "id: bunker-941101\nname: XSS Attack Detected via libinjection\nconditions:\n- field: request.headers.referer\n operator: ml_detect\n threshold: 0.7\n- field: request.uri\n operator: ml_detect\n threshold: 0.7\naction: block\nseverity: medium"}
27
+ {"input": "CRS XSS Rule 941120: XSS Filter - Category 2: Event Handler Vector", "output": "id: bunker-941120\nname: 'XSS Filter - Category 2: Event Handler Vector'\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)[\\s\\\"'`;/0-9=\\x0B\\x09\\x0C\\x3B\\x2C\\x28\\x3B]on[a-zA-Z]{3,50}[\\s\\x0B\\x09\\x0C\\x3B\\x2C\\x28\\x3B]*?=[^=]\n- field: request.headers.referer\n operator: regex\n value: (?i)[\\s\\\"'`;/0-9=\\x0B\\x09\\x0C\\x3B\\x2C\\x28\\x3B]on[a-zA-Z]{3,50}[\\s\\x0B\\x09\\x0C\\x3B\\x2C\\x28\\x3B]*?=[^=]\n- field: request.headers.user-agent\n operator: regex\n value: (?i)[\\s\\\"'`;/0-9=\\x0B\\x09\\x0C\\x3B\\x2C\\x28\\x3B]on[a-zA-Z]{3,50}[\\s\\x0B\\x09\\x0C\\x3B\\x2C\\x28\\x3B]*?=[^=]\n- field: request.query\n operator: regex\n value: (?i)[\\s\\\"'`;/0-9=\\x0B\\x09\\x0C\\x3B\\x2C\\x28\\x3B]on[a-zA-Z]{3,50}[\\s\\x0B\\x09\\x0C\\x3B\\x2C\\x28\\x3B]*?=[^=]\n- field: request.uri\n operator: regex\n value: (?i)[\\s\\\"'`;/0-9=\\x0B\\x09\\x0C\\x3B\\x2C\\x28\\x3B]on[a-zA-Z]{3,50}[\\s\\x0B\\x09\\x0C\\x3B\\x2C\\x28\\x3B]*?=[^=]\naction: block\nseverity: medium"}
28
+ {"input": "CRS XSS Rule 941150: XSS Filter - Category 5: Disallowed HTML Attributes", "output": "id: bunker-941150\nname: 'XSS Filter - Category 5: Disallowed HTML Attributes'\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)\\b(?:s(?:tyle|rc)|href)\\b[\\s\\S]*?=\n- field: request.headers.user-agent\n operator: regex\n value: (?i)\\b(?:s(?:tyle|rc)|href)\\b[\\s\\S]*?=\n- field: request.query\n operator: regex\n value: (?i)\\b(?:s(?:tyle|rc)|href)\\b[\\s\\S]*?=\n- field: request.uri\n operator: regex\n value: (?i)\\b(?:s(?:tyle|rc)|href)\\b[\\s\\S]*?=\naction: block\nseverity: medium"}
29
+ {"input": "CRS XSS Rule 941181: Node-Validator Deny List Keywords", "output": "id: bunker-941181\nname: Node-Validator Deny List Keywords\nconditions:\n- field: request.cookies\n operator: contains\n value: -->\n- field: request.query\n operator: contains\n value: -->\n- field: request.uri\n operator: contains\n value: -->\naction: block\nseverity: medium"}
30
+ {"input": "CRS XSS Rule 941320: Possible XSS Attack Detected - HTML Tag Handler", "output": "id: bunker-941320\nname: Possible XSS Attack Detected - HTML Tag Handler\nconditions:\n- field: request.cookies\n operator: regex\n value: <(?:a|abbr|acronym|address|applet|area|audioscope|b|base|basefront|bdo|bgsound|big|blackface|blink|blockquote|body|bq|br|button|caption|center|cite|code|col|colgroup|comment|dd|del|dfn|dir|div|dl|dt|e\n- field: request.query\n operator: regex\n value: <(?:a|abbr|acronym|address|applet|area|audioscope|b|base|basefront|bdo|bgsound|big|blackface|blink|blockquote|body|bq|br|button|caption|center|cite|code|col|colgroup|comment|dd|del|dfn|dir|div|dl|dt|e\n- field: request.uri\n operator: regex\n value: <(?:a|abbr|acronym|address|applet|area|audioscope|b|base|basefront|bdo|bgsound|big|blackface|blink|blockquote|body|bq|br|button|caption|center|cite|code|col|colgroup|comment|dd|del|dfn|dir|div|dl|dt|e\naction: block\nseverity: medium"}
31
+ {"input": "CRS XSS Rule 941330: IE XSS Filters - Attack Detected", "output": "id: bunker-941330\nname: IE XSS Filters - Attack Detected\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i:[\\\"'][ ]*(?:[^a-z0-9~_:' ]|in).*?(?:(?:l|\\x5cu006C)(?:o|\\x5cu006F)(?:c|\\x5cu0063)(?:a|\\x5cu0061)(?:t|\\x5cu0074)(?:i|\\x5cu0069)(?:o|\\x5cu006F)(?:n|\\x5cu006E)|(?:n|\\x5cu006E)(?:a|\\x5cu0061)(?:m|\\x5c\n- field: request.query\n operator: regex\n value: (?i:[\\\"'][ ]*(?:[^a-z0-9~_:' ]|in).*?(?:(?:l|\\x5cu006C)(?:o|\\x5cu006F)(?:c|\\x5cu0063)(?:a|\\x5cu0061)(?:t|\\x5cu0074)(?:i|\\x5cu0069)(?:o|\\x5cu006F)(?:n|\\x5cu006E)|(?:n|\\x5cu006E)(?:a|\\x5cu0061)(?:m|\\x5c\n- field: request.uri\n operator: regex\n value: (?i:[\\\"'][ ]*(?:[^a-z0-9~_:' ]|in).*?(?:(?:l|\\x5cu006C)(?:o|\\x5cu006F)(?:c|\\x5cu0063)(?:a|\\x5cu0061)(?:t|\\x5cu0074)(?:i|\\x5cu0069)(?:o|\\x5cu006F)(?:n|\\x5cu006E)|(?:n|\\x5cu006E)(?:a|\\x5cu0061)(?:m|\\x5c\naction: block\nseverity: medium"}
32
+ {"input": "CRS XSS Rule 941340: IE XSS Filters - Attack Detected", "output": "id: bunker-941340\nname: IE XSS Filters - Attack Detected\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)[\\\"\\'][ ]*(?:[^a-z0-9~_:\\' ]|in).+?[.].+?=\n- field: request.query\n operator: regex\n value: (?i)[\\\"\\'][ ]*(?:[^a-z0-9~_:\\' ]|in).+?[.].+?=\n- field: request.uri\n operator: regex\n value: (?i)[\\\"\\'][ ]*(?:[^a-z0-9~_:\\' ]|in).+?[.].+?=\naction: block\nseverity: medium"}
33
+ {"input": "CRS XSS Rule 941380: AngularJS client side template injection detected", "output": "id: bunker-941380\nname: AngularJS client side template injection detected\nconditions:\n- field: request.cookies\n operator: regex\n value: '{{.*?}}'\n- field: request.query\n operator: regex\n value: '{{.*?}}'\n- field: request.uri\n operator: regex\n value: '{{.*?}}'\naction: block\nseverity: medium"}
34
+ {"input": "CRS SQLi Rule 942100: SQL Injection Attack Detected via libinjection", "output": "id: bunker-942100\nname: SQL Injection Attack Detected via libinjection\nconditions:\n- field: request.cookies\n operator: ml_detect\n threshold: 0.7\n- field: request.headers.referer\n operator: ml_detect\n threshold: 0.7\n- field: request.headers.user-agent\n operator: ml_detect\n threshold: 0.7\n- field: request.query\n operator: ml_detect\n threshold: 0.7\naction: block\nseverity: medium"}
35
+ {"input": "CRS SQLi Rule 942140: SQL Injection Attack: Common DB Names Detected", "output": "id: bunker-942140\nname: 'SQL Injection Attack: Common DB Names Detected'\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)\\b(?:d(?:atabas|b_nam)e[^0-9A-Z_a-z]*\\(|(?:information_schema|m(?:aster\\.\\.sysdatabases|s(?:db|ys(?:ac(?:cess(?:objects|storage|xml)|es)|modules2?|(?:object|querie|relationship)s))|ysql\\.db)|north\n- field: request.query\n operator: regex\n value: (?i)\\b(?:d(?:atabas|b_nam)e[^0-9A-Z_a-z]*\\(|(?:information_schema|m(?:aster\\.\\.sysdatabases|s(?:db|ys(?:ac(?:cess(?:objects|storage|xml)|es)|modules2?|(?:object|querie|relationship)s))|ysql\\.db)|north\naction: block\nseverity: medium"}
36
+ {"input": "CRS SQLi Rule 942151: SQL Injection Attack: SQL function name detected", "output": "id: bunker-942151\nname: 'SQL Injection Attack: SQL function name detected'\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)\\b(?:a(?:dd(?:dat|tim)e|es_(?:de|en)crypt|s(?:cii(?:str)?|in)|tan2?)|b(?:enchmark|i(?:n_to_num|t_(?:and|count|length|x?or)))|c(?:har(?:acter)?_length|eil(?:ing)?|o(?:alesce|ercibility|llation|(?:m\n- field: request.query\n operator: regex\n value: (?i)\\b(?:a(?:dd(?:dat|tim)e|es_(?:de|en)crypt|s(?:cii(?:str)?|in)|tan2?)|b(?:enchmark|i(?:n_to_num|t_(?:and|count|length|x?or)))|c(?:har(?:acter)?_length|eil(?:ing)?|o(?:alesce|ercibility|llation|(?:m\naction: block\nseverity: medium"}
37
+ {"input": "CRS SQLi Rule 942160: Detects blind sqli tests using sleep() or benchmark()", "output": "id: bunker-942160\nname: Detects blind sqli tests using sleep() or benchmark()\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i:sleep\\s*?\\(.*?\\)|benchmark\\s*?\\(.*?\\,.*?\\))\n- field: request.query\n operator: regex\n value: (?i:sleep\\s*?\\(.*?\\)|benchmark\\s*?\\(.*?\\,.*?\\))\n- field: request.uri\n operator: regex\n value: (?i:sleep\\s*?\\(.*?\\)|benchmark\\s*?\\(.*?\\,.*?\\))\naction: block\nseverity: medium"}
38
+ {"input": "CRS SQLi Rule 942170: Detects SQL benchmark and sleep injection attempts including conditional queries", "output": "id: bunker-942170\nname: Detects SQL benchmark and sleep injection attempts including conditional queries\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)(?:select|;)[\\s\\x0b]+(?:benchmark|if|sleep)[\\s\\x0b]*?\\([\\s\\x0b]*?\\(?[\\s\\x0b]*?[0-9A-Z_a-z]+\n- field: request.query\n operator: regex\n value: (?i)(?:select|;)[\\s\\x0b]+(?:benchmark|if|sleep)[\\s\\x0b]*?\\([\\s\\x0b]*?\\(?[\\s\\x0b]*?[0-9A-Z_a-z]+\naction: block\nseverity: medium"}
39
+ {"input": "CRS SQLi Rule 942190: Detects MSSQL code execution and information gathering attempts", "output": "id: bunker-942190\nname: Detects MSSQL code execution and information gathering attempts\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)[\\\"'`](?:[\\s\\x0b]*![\\s\\x0b]*[\\\"'0-9A-Z_-z]|;?[\\s\\x0b]*(?:having|select|union\\b[\\s\\x0b]*(?:all|(?:distin|sele)ct))\\b[\\s\\x0b]*[^\\s\\x0b])|\\b(?:(?:(?:c(?:onnection_id|urrent_user)|database|schema|user\n- field: request.query\n operator: regex\n value: (?i)[\\\"'`](?:[\\s\\x0b]*![\\s\\x0b]*[\\\"'0-9A-Z_-z]|;?[\\s\\x0b]*(?:having|select|union\\b[\\s\\x0b]*(?:all|(?:distin|sele)ct))\\b[\\s\\x0b]*[^\\s\\x0b])|\\b(?:(?:(?:c(?:onnection_id|urrent_user)|database|schema|user\naction: block\nseverity: medium"}
40
+ {"input": "CRS SQLi Rule 942220: Looking for integer overflow attacks, these are taken from skipfish, except 2.2.2250738585072011e-308 is the \\\"magic number\\\" crash", "output": "id: bunker-942220\nname: Looking for integer overflow attacks, these are taken from skipfish, except\n 2.2.2250738585072011e-308 is the \\\"magic number\\\" crash\nconditions:\n- field: request.cookies\n operator: regex\n value: ^(?i:-0000023456|4294967295|4294967296|2147483648|2147483647|0000012345|-2147483648|-2147483649|0000023456|2.2250738585072007e-308|2.2250738585072011e-308|1e309)$\n- field: request.query\n operator: regex\n value: ^(?i:-0000023456|4294967295|4294967296|2147483648|2147483647|0000012345|-2147483648|-2147483649|0000023456|2.2250738585072007e-308|2.2250738585072011e-308|1e309)$\naction: block\nseverity: medium"}
41
+ {"input": "CRS SQLi Rule 942230: Detects conditional SQL injection attempts", "output": "id: bunker-942230\nname: Detects conditional SQL injection attempts\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)[\\s\\x0b\\(\\)]case[\\s\\x0b]+when.*?then|\\)[\\s\\x0b]*?like[\\s\\x0b]*?\\(|select.*?having[\\s\\x0b]*?[^\\s\\x0b]+[\\s\\x0b]*?[^\\s\\x0b0-9A-Z_a-z]|if[\\s\\x0b]?\\([0-9A-Z_a-z]+[\\s\\x0b]*?[<->~]\n- field: request.query\n operator: regex\n value: (?i)[\\s\\x0b\\(\\)]case[\\s\\x0b]+when.*?then|\\)[\\s\\x0b]*?like[\\s\\x0b]*?\\(|select.*?having[\\s\\x0b]*?[^\\s\\x0b]+[\\s\\x0b]*?[^\\s\\x0b0-9A-Z_a-z]|if[\\s\\x0b]?\\([0-9A-Z_a-z]+[\\s\\x0b]*?[<->~]\naction: block\nseverity: medium"}
42
+ {"input": "CRS SQLi Rule 942240: Detects MySQL charset switch and MSSQL DoS attempts", "output": "id: bunker-942240\nname: Detects MySQL charset switch and MSSQL DoS attempts\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)alter[\\s\\x0b]*?[0-9A-Z_a-z]+.*?char(?:acter)?[\\s\\x0b]+set[\\s\\x0b]+[0-9A-Z_a-z]+|[\\\"'`](?:;*?[\\s\\x0b]*?waitfor[\\s\\x0b]+(?:time|delay)[\\s\\x0b]+[\\\"'`]|;.*?:[\\s\\x0b]*?goto)\n- field: request.query\n operator: regex\n value: (?i)alter[\\s\\x0b]*?[0-9A-Z_a-z]+.*?char(?:acter)?[\\s\\x0b]+set[\\s\\x0b]+[0-9A-Z_a-z]+|[\\\"'`](?:;*?[\\s\\x0b]*?waitfor[\\s\\x0b]+(?:time|delay)[\\s\\x0b]+[\\\"'`]|;.*?:[\\s\\x0b]*?goto)\naction: block\nseverity: medium"}
43
+ {"input": "CRS SQLi Rule 942250: Detects MATCH AGAINST, MERGE and EXECUTE IMMEDIATE injections", "output": "id: bunker-942250\nname: Detects MATCH AGAINST, MERGE and EXECUTE IMMEDIATE injections\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i:merge.*?using\\s*?\\(|execute\\s*?immediate\\s*?[\\\"'`]|match\\s*?[\\w(),+-]+\\s*?against\\s*?\\()\n- field: request.query\n operator: regex\n value: (?i:merge.*?using\\s*?\\(|execute\\s*?immediate\\s*?[\\\"'`]|match\\s*?[\\w(),+-]+\\s*?against\\s*?\\()\naction: block\nseverity: medium"}
44
+ {"input": "CRS SQLi Rule 942270: Looking for basic sql injection. Common attack string for mysql, oracle and others", "output": "id: bunker-942270\nname: Looking for basic sql injection. Common attack string for mysql, oracle and\n others\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)union.*?select.*?from\n- field: request.query\n operator: regex\n value: (?i)union.*?select.*?from\naction: block\nseverity: medium"}
45
+ {"input": "CRS SQLi Rule 942280: Detects Postgres pg_sleep injection, waitfor delay attacks and database shutdown attempts", "output": "id: bunker-942280\nname: Detects Postgres pg_sleep injection, waitfor delay attacks and database shutdown\n attempts\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)select[\\s\\x0b]*?pg_sleep|waitfor[\\s\\x0b]*?delay[\\s\\x0b]?[\\\"'`]+[\\s\\x0b]?[0-9]|;[\\s\\x0b]*?shutdown[\\s\\x0b]*?(?:[#;\\{]|/\\*|--)\n- field: request.headers.referer\n operator: regex\n value: (?i)select[\\s\\x0b]*?pg_sleep|waitfor[\\s\\x0b]*?delay[\\s\\x0b]?[\\\"'`]+[\\s\\x0b]?[0-9]|;[\\s\\x0b]*?shutdown[\\s\\x0b]*?(?:[#;\\{]|/\\*|--)\n- field: request.headers.user-agent\n operator: regex\n value: (?i)select[\\s\\x0b]*?pg_sleep|waitfor[\\s\\x0b]*?delay[\\s\\x0b]?[\\\"'`]+[\\s\\x0b]?[0-9]|;[\\s\\x0b]*?shutdown[\\s\\x0b]*?(?:[#;\\{]|/\\*|--)\n- field: request.query\n operator: regex\n value: (?i)select[\\s\\x0b]*?pg_sleep|waitfor[\\s\\x0b]*?delay[\\s\\x0b]?[\\\"'`]+[\\s\\x0b]?[0-9]|;[\\s\\x0b]*?shutdown[\\s\\x0b]*?(?:[#;\\{]|/\\*|--)\naction: block\nseverity: medium"}
46
+ {"input": "CRS SQLi Rule 942290: Finds basic MongoDB SQL injection attempts", "output": "id: bunker-942290\nname: Finds basic MongoDB SQL injection attempts\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)\\[?\\$(?:a(?:bs|c(?:cumulator|osh?)|dd(?:ToSet)?|ll(?:ElementsTrue)?|n(?:d|yElementTrue)|rray(?:ElemA|ToObjec)t|sinh?|tan[2h]?|vg)|b(?:etween|i(?:narySize|t(?:And|Not|(?:O|Xo)r)?)|ottomN?|sonSize|u\n- field: request.query\n operator: regex\n value: (?i)\\[?\\$(?:a(?:bs|c(?:cumulator|osh?)|dd(?:ToSet)?|ll(?:ElementsTrue)?|n(?:d|yElementTrue)|rray(?:ElemA|ToObjec)t|sinh?|tan[2h]?|vg)|b(?:etween|i(?:narySize|t(?:And|Not|(?:O|Xo)r)?)|ottomN?|sonSize|u\naction: block\nseverity: medium"}
47
+ {"input": "CRS SQLi Rule 942320: Detects MySQL and PostgreSQL stored procedure/function injections", "output": "id: bunker-942320\nname: Detects MySQL and PostgreSQL stored procedure/function injections\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)create[\\s\\x0b]+(?:function|procedure)[\\s\\x0b]*?[0-9A-Z_a-z]+[\\s\\x0b]*?\\([\\s\\x0b]*?\\)[\\s\\x0b]*?-|d(?:eclare[^0-9A-Z_a-z]+[#@][\\s\\x0b]*?[0-9A-Z_a-z]+|iv[\\s\\x0b]*?\\([\\+\\-]*[\\s\\x0b\\.0-9]+,[\\+\\-]*[\\s\\x\n- field: request.query\n operator: regex\n value: (?i)create[\\s\\x0b]+(?:function|procedure)[\\s\\x0b]*?[0-9A-Z_a-z]+[\\s\\x0b]*?\\([\\s\\x0b]*?\\)[\\s\\x0b]*?-|d(?:eclare[^0-9A-Z_a-z]+[#@][\\s\\x0b]*?[0-9A-Z_a-z]+|iv[\\s\\x0b]*?\\([\\+\\-]*[\\s\\x0b\\.0-9]+,[\\+\\-]*[\\s\\x\naction: block\nseverity: medium"}
48
+ {"input": "CRS SQLi Rule 942350: Detects MySQL UDF injection and other data/structure manipulation attempts", "output": "id: bunker-942350\nname: Detects MySQL UDF injection and other data/structure manipulation attempts\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)create[\\s\\x0b]+function[\\s\\x0b].+[\\s\\x0b]returns|;[\\s\\x0b]*?(?:alter|(?:(?:cre|trunc|upd)at|renam)e|d(?:e(?:lete|sc)|rop)|(?:inser|selec)t|load)\\b[\\s\\x0b]*?[\\(\\[]?[0-9A-Z_a-z]{2,}\n- field: request.query\n operator: regex\n value: (?i)create[\\s\\x0b]+function[\\s\\x0b].+[\\s\\x0b]returns|;[\\s\\x0b]*?(?:alter|(?:(?:cre|trunc|upd)at|renam)e|d(?:e(?:lete|sc)|rop)|(?:inser|selec)t|load)\\b[\\s\\x0b]*?[\\(\\[]?[0-9A-Z_a-z]{2,}\naction: block\nseverity: medium"}
49
+ {"input": "CRS SQLi Rule 942360: Detects concatenated basic SQL injection and SQLLFI attempts", "output": "id: bunker-942360\nname: Detects concatenated basic SQL injection and SQLLFI attempts\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)\\b(?:(?:alter|(?:(?:cre|trunc|upd)at|renam)e|de(?:lete|sc)|(?:inser|selec)t|load)[\\s\\x0b]+(?:char|group_concat|load_file)\\b[\\s\\x0b]*\\(?|end[\\s\\x0b]*?\\);)|[\\s\\x0b\\(]load_file[\\s\\x0b]*?\\(|[\\\"'`][\\s\\\n- field: request.query\n operator: regex\n value: (?i)\\b(?:(?:alter|(?:(?:cre|trunc|upd)at|renam)e|de(?:lete|sc)|(?:inser|selec)t|load)[\\s\\x0b]+(?:char|group_concat|load_file)\\b[\\s\\x0b]*\\(?|end[\\s\\x0b]*?\\);)|[\\s\\x0b\\(]load_file[\\s\\x0b]*?\\(|[\\\"'`][\\s\\\naction: block\nseverity: medium"}
50
+ {"input": "CRS SQLi Rule 942500: MySQL in-line comment detected", "output": "id: bunker-942500\nname: MySQL in-line comment detected\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)/\\*[\\s\\x0b]*?[!\\+](?:[\\s\\x0b\\(\\)\\-0-9=A-Z_a-z]+)?\\*/\n- field: request.query\n operator: regex\n value: (?i)/\\*[\\s\\x0b]*?[!\\+](?:[\\s\\x0b\\(\\)\\-0-9=A-Z_a-z]+)?\\*/\naction: block\nseverity: medium"}
51
+ {"input": "CRS SQLi Rule 942540: SQL Authentication bypass (split query)", "output": "id: bunker-942540\nname: SQL Authentication bypass (split query)\nconditions:\n- field: request.cookies\n operator: regex\n value: ^(?:[^']*'|[^\\\"]*\\\"|[^`]*`)[\\s\\x0b]*;\n- field: request.query\n operator: regex\n value: ^(?:[^']*'|[^\\\"]*\\\"|[^`]*`)[\\s\\x0b]*;\naction: block\nseverity: medium"}
52
+ {"input": "CRS SQLi Rule 942560: MySQL Scientific Notation payload detected", "output": "id: bunker-942560\nname: MySQL Scientific Notation payload detected\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)1\\.e(?:[\\(\\),]|\\.[\\$0-9A-Z_a-z])\n- field: request.query\n operator: regex\n value: (?i)1\\.e(?:[\\(\\),]|\\.[\\$0-9A-Z_a-z])\naction: block\nseverity: medium"}
53
+ {"input": "CRS SQLi Rule 942550: JSON-Based SQL Injection", "output": "id: bunker-942550\nname: JSON-Based SQL Injection\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)[\\\"'`][\\[\\{][^#\\]\\}]*[\\]\\}]+[\\\"'`]|(?:[\\-@]>?|<@|@[\\?@]|\\?(?:(?:)|&|\\|#>)|#(?:>>|-)|->>|[<>])[\\\"'`](?:[\\[\\{][^#\\]\\}]*[\\]\\}]+[\\\"'`]|\\$[\\.\\[])|\\bjson_extract\\b[^\\(]*\\([^\\)]*\\)\n- field: request.query\n operator: regex\n value: (?i)[\\\"'`][\\[\\{][^#\\]\\}]*[\\]\\}]+[\\\"'`]|(?:[\\-@]>?|<@|@[\\?@]|\\?(?:(?:)|&|\\|#>)|#(?:>>|-)|->>|[<>])[\\\"'`](?:[\\[\\{][^#\\]\\}]*[\\]\\}]+[\\\"'`]|\\$[\\.\\[])|\\bjson_extract\\b[^\\(]*\\([^\\)]*\\)\n- field: request.uri\n operator: regex\n value: (?i)[\\\"'`][\\[\\{][^#\\]\\}]*[\\]\\}]+[\\\"'`]|(?:[\\-@]>?|<@|@[\\?@]|\\?(?:(?:)|&|\\|#>)|#(?:>>|-)|->>|[<>])[\\\"'`](?:[\\[\\{][^#\\]\\}]*[\\]\\}]+[\\\"'`]|\\$[\\.\\[])|\\bjson_extract\\b[^\\(]*\\([^\\)]*\\)\naction: block\nseverity: medium"}
54
+ {"input": "CRS SQLi Rule 942120: SQL Injection Attack: SQL Operator Detected", "output": "id: bunker-942120\nname: 'SQL Injection Attack: SQL Operator Detected'\nconditions:\n- field: request.query\n operator: regex\n value: (?i)[!=]=|&&|\\|\\||->|>[=>]|<(?:[<=]|>(?:[\\s\\x0b]+binary)?)|\\b(?:(?:xor|r(?:egexp|like)|i(?:snull|like)|notnull)\\b|collate(?:[^0-9A-Z_a-z]*?(?:U&)?[\\\"'`]|[^0-9A-Z_a-z]+(?:(?:binary|nocase|rtrim)\\b|[0-9\n- field: request.uri\n operator: regex\n value: (?i)[!=]=|&&|\\|\\||->|>[=>]|<(?:[<=]|>(?:[\\s\\x0b]+binary)?)|\\b(?:(?:xor|r(?:egexp|like)|i(?:snull|like)|notnull)\\b|collate(?:[^0-9A-Z_a-z]*?(?:U&)?[\\\"'`]|[^0-9A-Z_a-z]+(?:(?:binary|nocase|rtrim)\\b|[0-9\naction: block\nseverity: medium"}
55
+ {"input": "CRS SQLi Rule 942130: SQL Injection Attack: SQL Boolean-based attack detected", "output": "id: bunker-942130\nname: 'SQL Injection Attack: SQL Boolean-based attack detected'\nconditions:\n- field: request.query\n operator: regex\n value: (?i)[\\s\\x0b\\\"'-\\)`]*?\\b([0-9A-Z_a-z]+)\\b[\\s\\x0b\\\"'-\\)`]*?(?:=|<=>|(?:sounds[\\s\\x0b]+)?like|glob|r(?:like|egexp))[\\s\\x0b\\\"'-\\)`]*?\\b([0-9A-Z_a-z]+)\\b\naction: block\nseverity: medium"}
56
+ {"input": "CRS SQLi Rule 942131: SQL Injection Attack: SQL Boolean-based attack detected", "output": "id: bunker-942131\nname: 'SQL Injection Attack: SQL Boolean-based attack detected'\nconditions:\n- field: request.query\n operator: regex\n value: (?i)[\\s\\x0b\\\"'-\\)`]*?\\b([0-9A-Z_a-z]+)\\b[\\s\\x0b\\\"'-\\)`]*?(?:![<->]|<[=>]?|>=?|\\^|is[\\s\\x0b]+not|not[\\s\\x0b]+(?:like|r(?:like|egexp)))[\\s\\x0b\\\"'-\\)`]*?\\b([0-9A-Z_a-z]+)\\b\naction: block\nseverity: medium"}
57
+ {"input": "CRS SQLi Rule 942150: SQL Injection Attack: SQL function name detected", "output": "id: bunker-942150\nname: 'SQL Injection Attack: SQL function name detected'\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)\\b(?:json(?:_[0-9A-Z_a-z]+)?|a(?:bs|(?:cos|sin)h?|tan[2h]?|vg)|c(?:eil(?:ing)?|h(?:a(?:nges|r(?:set)?)|r)|o(?:alesce|sh?|unt)|ast)|d(?:e(?:grees|fault)|a(?:te|y))|exp|f(?:loor(?:avg)?|ormat|ield)|\n- field: request.query\n operator: regex\n value: (?i)\\b(?:json(?:_[0-9A-Z_a-z]+)?|a(?:bs|(?:cos|sin)h?|tan[2h]?|vg)|c(?:eil(?:ing)?|h(?:a(?:nges|r(?:set)?)|r)|o(?:alesce|sh?|unt)|ast)|d(?:e(?:grees|fault)|a(?:te|y))|exp|f(?:loor(?:avg)?|ormat|ield)|\naction: block\nseverity: medium"}
58
+ {"input": "CRS SQLi Rule 942180: Detects basic SQL authentication bypass attempts 1/3", "output": "id: bunker-942180\nname: Detects basic SQL authentication bypass attempts 1/3\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)(?:/\\*)+[\\\"'`]+[\\s\\x0b]?(?:--|[#\\{]|/\\*)?|[\\\"'`](?:[\\s\\x0b]*(?:(?:x?or|and|div|like|between)[\\s\\x0b\\-0-9A-Z_a-z]+[\\(\\)\\+-\\-<->][\\s\\x0b]*[\\\"'0-9`]|[!=\\|](?:[\\s\\x0b!\\+\\-0-9=]+[^\\[]*[\\\"'\\(`].*|[\\s\\x0\n- field: request.query\n operator: regex\n value: (?i)(?:/\\*)+[\\\"'`]+[\\s\\x0b]?(?:--|[#\\{]|/\\*)?|[\\\"'`](?:[\\s\\x0b]*(?:(?:x?or|and|div|like|between)[\\s\\x0b\\-0-9A-Z_a-z]+[\\(\\)\\+-\\-<->][\\s\\x0b]*[\\\"'0-9`]|[!=\\|](?:[\\s\\x0b!\\+\\-0-9=]+[^\\[]*[\\\"'\\(`].*|[\\s\\x0\naction: block\nseverity: medium"}
59
+ {"input": "CRS SQLi Rule 942200: Detects MySQL comment-/space-obfuscated injections and backtick termination", "output": "id: bunker-942200\nname: Detects MySQL comment-/space-obfuscated injections and backtick termination\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i),.*?[\\\"'\\)0-9`-f][\\\"'`](?:[\\\"'`].*?[\\\"'`]|(?:\\r?\\n)?\\z|[^\\\"'`]+)|[^0-9A-Z_a-z]select.+[^0-9A-Z_a-z]*?from|(?:alter|(?:(?:cre|trunc|upd)at|renam)e|d(?:e(?:lete|sc)|rop)|(?:inser|selec)t|load)[\\s\\x0\n- field: request.headers.referer\n operator: regex\n value: (?i),.*?[\\\"'\\)0-9`-f][\\\"'`](?:[\\\"'`].*?[\\\"'`]|(?:\\r?\\n)?\\z|[^\\\"'`]+)|[^0-9A-Z_a-z]select.+[^0-9A-Z_a-z]*?from|(?:alter|(?:(?:cre|trunc|upd)at|renam)e|d(?:e(?:lete|sc)|rop)|(?:inser|selec)t|load)[\\s\\x0\n- field: request.headers.user-agent\n operator: regex\n value: (?i),.*?[\\\"'\\)0-9`-f][\\\"'`](?:[\\\"'`].*?[\\\"'`]|(?:\\r?\\n)?\\z|[^\\\"'`]+)|[^0-9A-Z_a-z]select.+[^0-9A-Z_a-z]*?from|(?:alter|(?:(?:cre|trunc|upd)at|renam)e|d(?:e(?:lete|sc)|rop)|(?:inser|selec)t|load)[\\s\\x0\n- field: request.query\n operator: regex\n value: (?i),.*?[\\\"'\\)0-9`-f][\\\"'`](?:[\\\"'`].*?[\\\"'`]|(?:\\r?\\n)?\\z|[^\\\"'`]+)|[^0-9A-Z_a-z]select.+[^0-9A-Z_a-z]*?from|(?:alter|(?:(?:cre|trunc|upd)at|renam)e|d(?:e(?:lete|sc)|rop)|(?:inser|selec)t|load)[\\s\\x0\naction: block\nseverity: medium"}
60
+ {"input": "CRS SQLi Rule 942210: Detects chained SQL injection attempts 1/2", "output": "id: bunker-942210\nname: Detects chained SQL injection attempts 1/2\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)(?:&&|\\|\\||and|between|div|like|n(?:and|ot)|(?:xx?)?or)[\\s\\x0b\\(]+[0-9A-Z_a-z]+[\\s\\x0b\\)]*?[!\\+=]+[\\s\\x0b0-9]*?[\\\"'-\\)=`]|[0-9](?:[\\s\\x0b]*?(?:and|between|div|like|x?or)[\\s\\x0b]*?[0-9]+[\\s\\x0b]*?[\n- field: request.query\n operator: regex\n value: (?i)(?:&&|\\|\\||and|between|div|like|n(?:and|ot)|(?:xx?)?or)[\\s\\x0b\\(]+[0-9A-Z_a-z]+[\\s\\x0b\\)]*?[!\\+=]+[\\s\\x0b0-9]*?[\\\"'-\\)=`]|[0-9](?:[\\s\\x0b]*?(?:and|between|div|like|x?or)[\\s\\x0b]*?[0-9]+[\\s\\x0b]*?[\naction: block\nseverity: medium"}
61
+ {"input": "CRS SQLi Rule 942260: Detects basic SQL authentication bypass attempts 2/3", "output": "id: bunker-942260\nname: Detects basic SQL authentication bypass attempts 2/3\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)[\\\"'`][\\s\\x0b]*?(?:(?:and|n(?:and|ot)|(?:xx?)?or|div|like|between|\\|\\||&&)[\\s\\x0b]+[\\s\\x0b0-9A-Z_a-z]+=[\\s\\x0b]*?[0-9A-Z_a-z]+[\\s\\x0b]*?having[\\s\\x0b]+|like[^0-9A-Z_a-z]*?[\\\"'0-9`])|[0-9A-Z_a-z][\\\n- field: request.query\n operator: regex\n value: (?i)[\\\"'`][\\s\\x0b]*?(?:(?:and|n(?:and|ot)|(?:xx?)?or|div|like|between|\\|\\||&&)[\\s\\x0b]+[\\s\\x0b0-9A-Z_a-z]+=[\\s\\x0b]*?[0-9A-Z_a-z]+[\\s\\x0b]*?having[\\s\\x0b]+|like[^0-9A-Z_a-z]*?[\\\"'0-9`])|[0-9A-Z_a-z][\\\naction: block\nseverity: medium"}
62
+ {"input": "CRS SQLi Rule 942300: Detects MySQL comments, conditions and ch(a)r injections", "output": "id: bunker-942300\nname: Detects MySQL comments, conditions and ch(a)r injections\nconditions:\n- field: request.cookies\n operator: regex\n value: '(?i)\\)[\\s\\x0b]*?when[\\s\\x0b]*?[0-9]+[\\s\\x0b]*?then|[\\\"''`][\\s\\x0b]*?(?:[#\\{]|--)|/\\*![\\s\\x0b]?[0-9]+|\\b(?:(?:binary|cha?r)[\\s\\x0b]*?\\([\\s\\x0b]*?[0-9]|(?:and|n(?:and|ot)|(?:xx?)?or|div|like|between|r(?:'\n- field: request.query\n operator: regex\n value: '(?i)\\)[\\s\\x0b]*?when[\\s\\x0b]*?[0-9]+[\\s\\x0b]*?then|[\\\"''`][\\s\\x0b]*?(?:[#\\{]|--)|/\\*![\\s\\x0b]?[0-9]+|\\b(?:(?:binary|cha?r)[\\s\\x0b]*?\\([\\s\\x0b]*?[0-9]|(?:and|n(?:and|ot)|(?:xx?)?or|div|like|between|r(?:'\naction: block\nseverity: medium"}
63
+ {"input": "CRS SQLi Rule 942310: Detects chained SQL injection attempts 2/2", "output": "id: bunker-942310\nname: Detects chained SQL injection attempts 2/2\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)(?:\\([\\s\\x0b]*?select[\\s\\x0b]*?[0-9A-Z_a-z]+|coalesce|order[\\s\\x0b]+by[\\s\\x0b]+if[0-9A-Z_a-z]*?)[\\s\\x0b]*?\\(|\\*/from|\\+[\\s\\x0b]*?[0-9]+[\\s\\x0b]*?\\+[\\s\\x0b]*?@|[0-9A-Z_a-z][\\\"'`][\\s\\x0b]*?(?:(?:[\\+\n- field: request.query\n operator: regex\n value: (?i)(?:\\([\\s\\x0b]*?select[\\s\\x0b]*?[0-9A-Z_a-z]+|coalesce|order[\\s\\x0b]+by[\\s\\x0b]+if[0-9A-Z_a-z]*?)[\\s\\x0b]*?\\(|\\*/from|\\+[\\s\\x0b]*?[0-9]+[\\s\\x0b]*?\\+[\\s\\x0b]*?@|[0-9A-Z_a-z][\\\"'`][\\s\\x0b]*?(?:(?:[\\+\naction: block\nseverity: medium"}
64
+ {"input": "CRS SQLi Rule 942330: Detects classic SQL injection probings 1/3", "output": "id: bunker-942330\nname: Detects classic SQL injection probings 1/3\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)[\\\"'`][\\s\\x0b]*?\\b(?:x?or|div|like|between|and)\\b[\\s\\x0b]*?[\\\"'`]?[0-9]|\\x5cx(?:2[37]|3d)|^(?:.?[\\\"'`]$|[\\\"'\\x5c`]*?(?:[\\\"'0-9`]+|[^\\\"'`]+[\\\"'`])[\\s\\x0b]*?\\b(?:and|n(?:and|ot)|(?:xx?)?or|div|like|\n- field: request.query\n operator: regex\n value: (?i)[\\\"'`][\\s\\x0b]*?\\b(?:x?or|div|like|between|and)\\b[\\s\\x0b]*?[\\\"'`]?[0-9]|\\x5cx(?:2[37]|3d)|^(?:.?[\\\"'`]$|[\\\"'\\x5c`]*?(?:[\\\"'0-9`]+|[^\\\"'`]+[\\\"'`])[\\s\\x0b]*?\\b(?:and|n(?:and|ot)|(?:xx?)?or|div|like|\naction: block\nseverity: medium"}
65
+ {"input": "CRS SQLi Rule 942340: Detects basic SQL authentication bypass attempts 3/3", "output": "id: bunker-942340\nname: Detects basic SQL authentication bypass attempts 3/3\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)in[\\s\\x0b]*?\\(+[\\s\\x0b]*?select|(?:(?:and|n(?:and|ot)|(?:xx?)?or|div|like|between)[\\s\\x0b]+|(?:\\|\\||&&)[\\s\\x0b]*?)[\\s\\x0b\\+0-9A-Z_a-z]+(?:regexp[\\s\\x0b]*?\\(|sounds[\\s\\x0b]+like[\\s\\x0b]*?[\\\"'`]|[0-\n- field: request.query\n operator: regex\n value: (?i)in[\\s\\x0b]*?\\(+[\\s\\x0b]*?select|(?:(?:and|n(?:and|ot)|(?:xx?)?or|div|like|between)[\\s\\x0b]+|(?:\\|\\||&&)[\\s\\x0b]*?)[\\s\\x0b\\+0-9A-Z_a-z]+(?:regexp[\\s\\x0b]*?\\(|sounds[\\s\\x0b]+like[\\s\\x0b]*?[\\\"'`]|[0-\naction: block\nseverity: medium"}
66
+ {"input": "CRS SQLi Rule 942361: Detects basic SQL injection based on keyword alter or union", "output": "id: bunker-942361\nname: Detects basic SQL injection based on keyword alter or union\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i:^[\\W\\d]+\\s*?(?:alter|union)\\b)\n- field: request.query\n operator: regex\n value: (?i:^[\\W\\d]+\\s*?(?:alter|union)\\b)\naction: block\nseverity: medium"}
67
+ {"input": "CRS SQLi Rule 942362: Detects concatenated basic SQL injection and SQLLFI attempts", "output": "id: bunker-942362\nname: Detects concatenated basic SQL injection and SQLLFI attempts\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)(?:alter|(?:(?:cre|trunc|upd)at|renam)e|de(?:lete|sc)|(?:inser|selec)t|load)[\\s\\x0b]+(?:char|group_concat|load_file)[\\s\\x0b]?\\(?|end[\\s\\x0b]*?\\);|[\\s\\x0b\\(]load_file[\\s\\x0b]*?\\(|[\\\"'`][\\s\\x0b]+reg\n- field: request.query\n operator: regex\n value: (?i)(?:alter|(?:(?:cre|trunc|upd)at|renam)e|de(?:lete|sc)|(?:inser|selec)t|load)[\\s\\x0b]+(?:char|group_concat|load_file)[\\s\\x0b]?\\(?|end[\\s\\x0b]*?\\);|[\\s\\x0b\\(]load_file[\\s\\x0b]*?\\(|[\\\"'`][\\s\\x0b]+reg\naction: block\nseverity: medium"}
68
+ {"input": "CRS SQLi Rule 942370: Detects classic SQL injection probings 2/3", "output": "id: bunker-942370\nname: Detects classic SQL injection probings 2/3\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)[\\\"'`](?:[\\s\\x0b]*?(?:(?:\\*.+(?:x?or|div|like|between|(?:an|i)d)[^0-9A-Z_a-z]*?[\\\"'`]|(?:x?or|div|like|between|and)[\\s\\x0b][^0-9]+[\\-0-9A-Z_a-z]+[^0-9]*)[0-9]|[^\\s\\x0b0-9\\?A-Z_a-z]+[\\s\\x0b]*?[^\\s\\\n- field: request.headers.referer\n operator: regex\n value: (?i)[\\\"'`](?:[\\s\\x0b]*?(?:(?:\\*.+(?:x?or|div|like|between|(?:an|i)d)[^0-9A-Z_a-z]*?[\\\"'`]|(?:x?or|div|like|between|and)[\\s\\x0b][^0-9]+[\\-0-9A-Z_a-z]+[^0-9]*)[0-9]|[^\\s\\x0b0-9\\?A-Z_a-z]+[\\s\\x0b]*?[^\\s\\\n- field: request.headers.user-agent\n operator: regex\n value: (?i)[\\\"'`](?:[\\s\\x0b]*?(?:(?:\\*.+(?:x?or|div|like|between|(?:an|i)d)[^0-9A-Z_a-z]*?[\\\"'`]|(?:x?or|div|like|between|and)[\\s\\x0b][^0-9]+[\\-0-9A-Z_a-z]+[^0-9]*)[0-9]|[^\\s\\x0b0-9\\?A-Z_a-z]+[\\s\\x0b]*?[^\\s\\\n- field: request.query\n operator: regex\n value: (?i)[\\\"'`](?:[\\s\\x0b]*?(?:(?:\\*.+(?:x?or|div|like|between|(?:an|i)d)[^0-9A-Z_a-z]*?[\\\"'`]|(?:x?or|div|like|between|and)[\\s\\x0b][^0-9]+[\\-0-9A-Z_a-z]+[^0-9]*)[0-9]|[^\\s\\x0b0-9\\?A-Z_a-z]+[\\s\\x0b]*?[^\\s\\\naction: block\nseverity: medium"}
69
+ {"input": "CRS SQLi Rule 942380: SQL Injection Attack", "output": "id: bunker-942380\nname: SQL Injection Attack\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)\\b(?:having\\b(?:[\\s\\x0b]+(?:[0-9]{1,10}|'[^=]{1,10}')[\\s\\x0b]*?[<->]|\n ?(?:[0-9]{1,10} ?[<->]+|[\\\"'][^=]{1,10}[ \\\"'<-\\?\\[]+))|ex(?:ecute(?:\\(|[\\s\\x0b]{1,5}[\\$\\.0-9A-Z_a-z]{1,5}[\\s\\x0b]{0,3})|ists[\\\n- field: request.query\n operator: regex\n value: (?i)\\b(?:having\\b(?:[\\s\\x0b]+(?:[0-9]{1,10}|'[^=]{1,10}')[\\s\\x0b]*?[<->]|\n ?(?:[0-9]{1,10} ?[<->]+|[\\\"'][^=]{1,10}[ \\\"'<-\\?\\[]+))|ex(?:ecute(?:\\(|[\\s\\x0b]{1,5}[\\$\\.0-9A-Z_a-z]{1,5}[\\s\\x0b]{0,3})|ists[\\\naction: block\nseverity: medium"}
70
+ {"input": "CRS SQLi Rule 942390: SQL Injection Attack", "output": "id: bunker-942390\nname: SQL Injection Attack\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)\\b(?:or\\b(?:[\\s\\x0b]?(?:[0-9]{1,10}|[\\\"'][^=]{1,10}[\\\"'])[\\s\\x0b]?[<->]+|[\\s\\x0b]+(?:[0-9]{1,10}|'[^=]{1,10}')(?:[\\s\\x0b]*?[<->])?)|xor\\b[\\s\\x0b]+(?:[0-9]{1,10}|'[^=]{1,10}')(?:[\\s\\x0b]*?[<->])?)|\n- field: request.query\n operator: regex\n value: (?i)\\b(?:or\\b(?:[\\s\\x0b]?(?:[0-9]{1,10}|[\\\"'][^=]{1,10}[\\\"'])[\\s\\x0b]?[<->]+|[\\s\\x0b]+(?:[0-9]{1,10}|'[^=]{1,10}')(?:[\\s\\x0b]*?[<->])?)|xor\\b[\\s\\x0b]+(?:[0-9]{1,10}|'[^=]{1,10}')(?:[\\s\\x0b]*?[<->])?)|\naction: block\nseverity: medium"}
71
+ {"input": "CRS SQLi Rule 942400: SQL Injection Attack", "output": "id: bunker-942400\nname: SQL Injection Attack\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)\\band\\b(?:[\\s\\x0b]+(?:[0-9]{1,10}[\\s\\x0b]*?[<->]|'[^=]{1,10}')| ?(?:[0-9]{1,10}|[\\\"'][^=]{1,10}[\\\"'])\n ?[<->]+)\n- field: request.query\n operator: regex\n value: (?i)\\band\\b(?:[\\s\\x0b]+(?:[0-9]{1,10}[\\s\\x0b]*?[<->]|'[^=]{1,10}')| ?(?:[0-9]{1,10}|[\\\"'][^=]{1,10}[\\\"'])\n ?[<->]+)\naction: block\nseverity: medium"}
72
+ {"input": "CRS SQLi Rule 942410: SQL Injection Attack", "output": "id: bunker-942410\nname: SQL Injection Attack\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)\\b(?:a(?:(?:b|co)s|dd(?:dat|tim)e|es_(?:de|en)crypt|s(?:in|cii(?:str)?)|tan2?|vg)|b(?:enchmark|i(?:n(?:_to_num)?|t_(?:and|count|length|x?or)))|c(?:ast|h(?:ar(?:(?:acter)?_length|set)?|r)|iel(?:ing\n- field: request.query\n operator: regex\n value: (?i)\\b(?:a(?:(?:b|co)s|dd(?:dat|tim)e|es_(?:de|en)crypt|s(?:in|cii(?:str)?)|tan2?|vg)|b(?:enchmark|i(?:n(?:_to_num)?|t_(?:and|count|length|x?or)))|c(?:ast|h(?:ar(?:(?:acter)?_length|set)?|r)|iel(?:ing\naction: block\nseverity: medium"}
73
+ {"input": "CRS SQLi Rule 942470: SQL Injection Attack", "output": "id: bunker-942470\nname: SQL Injection Attack\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)autonomous_transaction|(?:current_use|n?varcha|tbcreato)r|db(?:a_users|ms_java)|open(?:owa_util|query|rowset)|s(?:p_(?:(?:addextendedpro|sqlexe)c|execute(?:sql)?|help|is_srvrolemember|makewebtask|\n- field: request.query\n operator: regex\n value: (?i)autonomous_transaction|(?:current_use|n?varcha|tbcreato)r|db(?:a_users|ms_java)|open(?:owa_util|query|rowset)|s(?:p_(?:(?:addextendedpro|sqlexe)c|execute(?:sql)?|help|is_srvrolemember|makewebtask|\naction: block\nseverity: medium"}
74
+ {"input": "CRS SQLi Rule 942480: SQL Injection Attack", "output": "id: bunker-942480\nname: SQL Injection Attack\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)\\b(?:(?:d(?:bms_[0-9A-Z_a-z]+\\.|elete\\b[^0-9A-Z_a-z]*?\\bfrom)|(?:group\\b.*?\\bby\\b.{1,100}?\\bhav|overlay\\b[^0-9A-Z_a-z]*?\\(.*?\\b[^0-9A-Z_a-z]*?plac)ing|in(?:ner\\b[^0-9A-Z_a-z]*?\\bjoin|sert\\b[^0-9A-\n- field: request.headers\n operator: regex\n value: (?i)\\b(?:(?:d(?:bms_[0-9A-Z_a-z]+\\.|elete\\b[^0-9A-Z_a-z]*?\\bfrom)|(?:group\\b.*?\\bby\\b.{1,100}?\\bhav|overlay\\b[^0-9A-Z_a-z]*?\\(.*?\\b[^0-9A-Z_a-z]*?plac)ing|in(?:ner\\b[^0-9A-Z_a-z]*?\\bjoin|sert\\b[^0-9A-\n- field: request.query\n operator: regex\n value: (?i)\\b(?:(?:d(?:bms_[0-9A-Z_a-z]+\\.|elete\\b[^0-9A-Z_a-z]*?\\bfrom)|(?:group\\b.*?\\bby\\b.{1,100}?\\bhav|overlay\\b[^0-9A-Z_a-z]*?\\(.*?\\b[^0-9A-Z_a-z]*?plac)ing|in(?:ner\\b[^0-9A-Z_a-z]*?\\bjoin|sert\\b[^0-9A-\naction: block\nseverity: medium"}
75
+ {"input": "CRS SQLi Rule 942430: Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (12)", "output": "id: bunker-942430\nname: 'Restricted SQL Character Anomaly Detection (args): # of special characters\n exceeded (12)'\nconditions:\n- field: request.query\n operator: regex\n value: \"((?:[~!@#\\\\$%\\\\^&\\\\*\\\\(\\\\)\\\\-\\\\+=\\\\{\\\\}\\\\[\\\\]\\\\|:;\\\\\\\"'\\xB4\\u2019\\u2018\\\n `<>][^~!@#\\\\$%\\\\^&\\\\*\\\\(\\\\)\\\\-\\\\+=\\\\{\\\\}\\\\[\\\\]\\\\|:;\\\\\\\"'\\xB4\\u2019\\u2018`<>]*?){12})\"\naction: block\nseverity: medium"}
76
+ {"input": "CRS SQLi Rule 942440: SQL Comment Sequence Detected", "output": "id: bunker-942440\nname: SQL Comment Sequence Detected\nconditions:\n- field: request.cookies\n operator: regex\n value: /\\*!?|\\*/|[';]--|--(?:[\\s\\x0b]|[^\\-]*?-)|[^&\\-]#.*?[\\s\\x0b]|;?\\x00\n- field: request.query\n operator: regex\n value: /\\*!?|\\*/|[';]--|--(?:[\\s\\x0b]|[^\\-]*?-)|[^&\\-]#.*?[\\s\\x0b]|;?\\x00\naction: block\nseverity: medium"}
77
+ {"input": "CRS SQLi Rule 942450: SQL Hex Encoding Identified", "output": "id: bunker-942450\nname: SQL Hex Encoding Identified\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i:\\b0x[a-f\\d]{3,})\n- field: request.query\n operator: regex\n value: (?i:\\b0x[a-f\\d]{3,})\naction: block\nseverity: medium"}
78
+ {"input": "CRS SQLi Rule 942510: SQLi bypass attempt by ticks or backticks detected", "output": "id: bunker-942510\nname: SQLi bypass attempt by ticks or backticks detected\nconditions:\n- field: request.cookies\n operator: regex\n value: (?:`(?:(?:[\\w\\s=_\\-+{}()<@]){2,29}|(?:[A-Za-z0-9+/]{4})+(?:[A-Za-z0-9+/]{2}==|[A-Za-z0-9+/]{3}=)?)`)\n- field: request.query\n operator: regex\n value: (?:`(?:(?:[\\w\\s=_\\-+{}()<@]){2,29}|(?:[A-Za-z0-9+/]{4})+(?:[A-Za-z0-9+/]{2}==|[A-Za-z0-9+/]{3}=)?)`)\naction: block\nseverity: medium"}
79
+ {"input": "CRS SQLi Rule 942520: Detects basic SQL authentication bypass attempts 4.0/4", "output": "id: bunker-942520\nname: Detects basic SQL authentication bypass attempts 4.0/4\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)[\\\"'`][\\s\\x0b]*?(?:(?:is[\\s\\x0b]+not|not[\\s\\x0b]+(?:like|glob|(?:betwee|i)n|null|regexp|match)|mod|div|sounds[\\s\\x0b]+like)\\b|[%&\\*\\+\\-/<->\\^\\|]{1,3})\n- field: request.query\n operator: regex\n value: (?i)[\\\"'`][\\s\\x0b]*?(?:(?:is[\\s\\x0b]+not|not[\\s\\x0b]+(?:like|glob|(?:betwee|i)n|null|regexp|match)|mod|div|sounds[\\s\\x0b]+like)\\b|[%&\\*\\+\\-/<->\\^\\|]{1,3})\naction: block\nseverity: medium"}
80
+ {"input": "CRS SQLi Rule 942521: Detects basic SQL authentication bypass attempts 4.1/4", "output": "id: bunker-942521\nname: Detects basic SQL authentication bypass attempts 4.1/4\nconditions:\n- field: request.headers.referer\n operator: regex\n value: (?i)^(?:[^']*?(?:'[^']*?'[^']*?)*?'|[^\\\"]*?(?:\\\"[^\\\"]*?\\\"[^\\\"]*?)*?\\\"|[^`]*?(?:`[^`]*?`[^`]*?)*?`)[\\s\\x0b]*([0-9A-Z_a-z]+)\\b\n- field: request.headers.user-agent\n operator: regex\n value: (?i)^(?:[^']*?(?:'[^']*?'[^']*?)*?'|[^\\\"]*?(?:\\\"[^\\\"]*?\\\"[^\\\"]*?)*?\\\"|[^`]*?(?:`[^`]*?`[^`]*?)*?`)[\\s\\x0b]*([0-9A-Z_a-z]+)\\b\n- field: request.query\n operator: regex\n value: (?i)^(?:[^']*?(?:'[^']*?'[^']*?)*?'|[^\\\"]*?(?:\\\"[^\\\"]*?\\\"[^\\\"]*?)*?\\\"|[^`]*?(?:`[^`]*?`[^`]*?)*?`)[\\s\\x0b]*([0-9A-Z_a-z]+)\\b\naction: block\nseverity: medium"}
81
+ {"input": "CRS SQLi Rule 942522: Detects basic SQL authentication bypass attempts 4.1/4", "output": "id: bunker-942522\nname: Detects basic SQL authentication bypass attempts 4.1/4\nconditions:\n- field: request.query\n operator: regex\n value: ^.*?\\x5c['\\\"`](?:.*?['\\\"`])?\\s*(?:and|or)\\b\naction: block\nseverity: medium"}
82
+ {"input": "CRS SQLi Rule 942101: SQL Injection Attack Detected via libinjection", "output": "id: bunker-942101\nname: SQL Injection Attack Detected via libinjection\nconditions:\n- field: request.uri\n operator: ml_detect\n threshold: 0.7\naction: block\nseverity: medium"}
83
+ {"input": "CRS SQLi Rule 942152: SQL Injection Attack: SQL function name detected", "output": "id: bunker-942152\nname: 'SQL Injection Attack: SQL function name detected'\nconditions:\n- field: request.headers.referer\n operator: regex\n value: (?i)\\b(?:a(?:dd(?:dat|tim)e|es_(?:de|en)crypt|s(?:cii(?:str)?|in)|tan2?)|b(?:enchmark|i(?:n_to_num|t_(?:and|count|length|x?or)))|c(?:har(?:acter)?_length|eil(?:ing)?|o(?:alesce|ercibility|llation|(?:m\n- field: request.headers.user-agent\n operator: regex\n value: (?i)\\b(?:a(?:dd(?:dat|tim)e|es_(?:de|en)crypt|s(?:cii(?:str)?|in)|tan2?)|b(?:enchmark|i(?:n_to_num|t_(?:and|count|length|x?or)))|c(?:har(?:acter)?_length|eil(?:ing)?|o(?:alesce|ercibility|llation|(?:m\naction: block\nseverity: medium"}
84
+ {"input": "CRS SQLi Rule 942321: Detects MySQL and PostgreSQL stored procedure/function injections", "output": "id: bunker-942321\nname: Detects MySQL and PostgreSQL stored procedure/function injections\nconditions:\n- field: request.headers.referer\n operator: regex\n value: (?i)create[\\s\\x0b]+(?:function|procedure)[\\s\\x0b]*?[0-9A-Z_a-z]+[\\s\\x0b]*?\\([\\s\\x0b]*?\\)[\\s\\x0b]*?-|d(?:eclare[^0-9A-Z_a-z]+[#@][\\s\\x0b]*?[0-9A-Z_a-z]+|iv[\\s\\x0b]*?\\([\\+\\-]*[\\s\\x0b\\.0-9]+,[\\+\\-]*[\\s\\x\n- field: request.headers.user-agent\n operator: regex\n value: (?i)create[\\s\\x0b]+(?:function|procedure)[\\s\\x0b]*?[0-9A-Z_a-z]+[\\s\\x0b]*?\\([\\s\\x0b]*?\\)[\\s\\x0b]*?-|d(?:eclare[^0-9A-Z_a-z]+[#@][\\s\\x0b]*?[0-9A-Z_a-z]+|iv[\\s\\x0b]*?\\([\\+\\-]*[\\s\\x0b\\.0-9]+,[\\+\\-]*[\\s\\x\naction: block\nseverity: medium"}
85
+ {"input": "CRS SQLi Rule 942251: Detects HAVING injections", "output": "id: bunker-942251\nname: Detects HAVING injections\nconditions:\n- field: request.cookies\n operator: regex\n value: (?i)\\W+\\d*?\\s*?\\bhaving\\b\\s*?[^\\s\\-]\n- field: request.query\n operator: regex\n value: (?i)\\W+\\d*?\\s*?\\bhaving\\b\\s*?[^\\s\\-]\naction: block\nseverity: medium"}
86
+ {"input": "CRS SQLi Rule 942490: Detects classic SQL injection probings 3/3", "output": "id: bunker-942490\nname: Detects classic SQL injection probings 3/3\nconditions:\n- field: request.cookies\n operator: regex\n value: '[\\\"''`][\\s\\d]*?[^\\w\\s]\\W*?\\d\\W*?.*?[\\\"''`\\d]'\n- field: request.query\n operator: regex\n value: '[\\\"''`][\\s\\d]*?[^\\w\\s]\\W*?\\d\\W*?.*?[\\\"''`\\d]'\naction: block\nseverity: medium"}
87
+ {"input": "CRS SQLi Rule 942420: Restricted SQL Character Anomaly Detection (cookies): # of special characters exceeded (8)", "output": "id: bunker-942420\nname: 'Restricted SQL Character Anomaly Detection (cookies): # of special characters\n exceeded (8)'\nconditions:\n- field: request.cookies\n operator: regex\n value: \"((?:[~!@#\\\\$%\\\\^&\\\\*\\\\(\\\\)\\\\-\\\\+=\\\\{\\\\}\\\\[\\\\]\\\\|:;\\\\\\\"'\\xB4\\u2019\\u2018\\\n `<>][^~!@#\\\\$%\\\\^&\\\\*\\\\(\\\\)\\\\-\\\\+=\\\\{\\\\}\\\\[\\\\]\\\\|:;\\\\\\\"'\\xB4\\u2019\\u2018`<>]*?){8})\"\naction: block\nseverity: medium"}
88
+ {"input": "CRS SQLi Rule 942431: Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (6)", "output": "id: bunker-942431\nname: 'Restricted SQL Character Anomaly Detection (args): # of special characters\n exceeded (6)'\nconditions:\n- field: request.query\n operator: regex\n value: \"((?:[~!@#\\\\$%\\\\^&\\\\*\\\\(\\\\)\\\\-\\\\+=\\\\{\\\\}\\\\[\\\\]\\\\|:;\\\\\\\"'\\xB4\\u2019\\u2018\\\n `<>][^~!@#\\\\$%\\\\^&\\\\*\\\\(\\\\)\\\\-\\\\+=\\\\{\\\\}\\\\[\\\\]\\\\|:;\\\\\\\"'\\xB4\\u2019\\u2018`<>]*?){6})\"\naction: block\nseverity: medium"}
89
+ {"input": "CRS SQLi Rule 942460: Meta-Character Anomaly Detection Alert - Repetitive Non-Word Characters", "output": "id: bunker-942460\nname: Meta-Character Anomaly Detection Alert - Repetitive Non-Word Characters\nconditions:\n- field: request.query\n operator: regex\n value: \\W{4}\naction: block\nseverity: medium"}
90
+ {"input": "CRS SQLi Rule 942511: SQLi bypass attempt by ticks detected", "output": "id: bunker-942511\nname: SQLi bypass attempt by ticks detected\nconditions:\n- field: request.cookies\n operator: regex\n value: (?:'(?:(?:[\\w\\s=_\\-+{}()<@]){2,29}|(?:[A-Za-z0-9+/]{4})+(?:[A-Za-z0-9+/]{2}==|[A-Za-z0-9+/]{3}=)?)')\n- field: request.query\n operator: regex\n value: (?:'(?:(?:[\\w\\s=_\\-+{}()<@]){2,29}|(?:[A-Za-z0-9+/]{4})+(?:[A-Za-z0-9+/]{2}==|[A-Za-z0-9+/]{3}=)?)')\naction: block\nseverity: medium"}
91
+ {"input": "CRS SQLi Rule 942530: SQLi query termination detected", "output": "id: bunker-942530\nname: SQLi query termination detected\nconditions:\n- field: request.cookies\n operator: regex\n value: ''';'\n- field: request.query\n operator: regex\n value: ''';'\naction: block\nseverity: medium"}
92
+ {"input": "CRS SQLi Rule 942421: Restricted SQL Character Anomaly Detection (cookies): # of special characters exceeded (3)", "output": "id: bunker-942421\nname: 'Restricted SQL Character Anomaly Detection (cookies): # of special characters\n exceeded (3)'\nconditions:\n- field: request.cookies\n operator: regex\n value: \"((?:[~!@#\\\\$%\\\\^&\\\\*\\\\(\\\\)\\\\-\\\\+=\\\\{\\\\}\\\\[\\\\]\\\\|:;\\\\\\\"'\\xB4\\u2019\\u2018\\\n `<>][^~!@#\\\\$%\\\\^&\\\\*\\\\(\\\\)\\\\-\\\\+=\\\\{\\\\}\\\\[\\\\]\\\\|:;\\\\\\\"'\\xB4\\u2019\\u2018`<>]*?){3})\"\naction: block\nseverity: medium"}
93
+ {"input": "CRS SQLi Rule 942432: Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (2)", "output": "id: bunker-942432\nname: 'Restricted SQL Character Anomaly Detection (args): # of special characters\n exceeded (2)'\nconditions:\n- field: request.query\n operator: regex\n value: \"((?:[~!@#\\\\$%\\\\^&\\\\*\\\\(\\\\)\\\\-\\\\+=\\\\{\\\\}\\\\[\\\\]\\\\|:;\\\\\\\"'\\xB4\\u2019\\u2018\\\n `<>][^~!@#\\\\$%\\\\^&\\\\*\\\\(\\\\)\\\\-\\\\+=\\\\{\\\\}\\\\[\\\\]\\\\|:;\\\\\\\"'\\xB4\\u2019\\u2018`<>]*?){2})\"\naction: block\nseverity: medium"}
map-waf/Cloudflare-Rules-Mapping.jsonl ADDED
@@ -0,0 +1,93 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {"input": "CRS Rule 941100: XSS Attack Detected via libinjection", "output": "(cf.waf.score.xss ge 40)"}
2
+ {"input": "CRS Rule 941110: XSS Filter - Category 1: Script Tag Vector | Pattern: (?i)<script[^>]*>[\\s\\S]*?", "output": "(http.request.uri.query contains \"<script\" or http.request.body contains \"<script\" or any(http.request.headers.values[*] contains \"<script\"))"}
3
+ {"input": "CRS Rule 941130: XSS Filter - Category 3: Attribute Vector | Pattern: (?i).(?:\\b(?:(?:x(?:link:href|html|mlns)|data:text/html|formaction)\\b|pattern[\\s\\x0b]*=)|(?:!ENTITY[", "output": "(http.request.uri.query matches \"(xlink:href|formaction|data:text)\" or http.request.body matches \"(xlink:href|formaction|data:text)\")"}
4
+ {"input": "CRS Rule 941140: XSS Filter - Category 4: Javascript URI Vector | Pattern: (?i)[a-z]+=(?:[^:=]+:.+;)*?[^:=]+:url\\(javascript", "output": "(http.request.uri.query contains \"javascript:\" or http.request.body contains \"javascript:\" or http.request.uri.query matches \"url\\(javascript\")"}
5
+ {"input": "CRS Rule 941160: NoScript XSS InjectionChecker: HTML Injection", "output": "(http.request.uri.query matches \"<(script|iframe|object|embed)\" or http.request.body matches \"<(script|iframe|object|embed)\")"}
6
+ {"input": "CRS Rule 941170: NoScript XSS InjectionChecker: Attribute Injection", "output": "(http.request.uri.query matches \"(xlink:href|formaction|data:text)\" or http.request.body matches \"(xlink:href|formaction|data:text)\")"}
7
+ {"input": "CRS Rule 941180: Node-Validator Deny List Keywords | Pattern: document.cookie document.domain document.querySelector document.body.appendChild document.write .par", "output": "(any(http.request.cookies.values[*] matches \"<[^>]*on[a-z]+\"))"}
8
+ {"input": "CRS Rule 941190: IE XSS Filters - Attack Detected | Pattern: (?i:<style.*?>.*?(?:@[i\\x5c]|(?:[:=]|&#x?0*(?:58|3A|61|3D);?).*?(?:[(\\x5c]|&#x?0*(?:40|28|92|5C);?))", "output": "(http.request.uri.query matches \"(?i:<style.*?>.*?(?:@[i\\\\x5c]|(?:[:=]|&#x?0*(?:58|3A|61|3D);?).*?(?:[(\\\\x5c]|&#x?0*(?:40|28|92|5C);?))\") or (any(http.request.cookies.values[*] matches \"<[^>]*on[a-z]+\"))"}
9
+ {"input": "CRS Rule 941200: IE XSS Filters - Attack Detected | Pattern: (?i:<.*[:]?vmlframe.*?[\\s/+]*?src[\\s/+]*=)", "output": "(http.request.uri.query matches \"(?i:<.*[:]?vmlframe.*?[\\\\s/+]*?src[\\\\s/+]*=)\") or (any(http.request.cookies.values[*] matches \"<[^>]*on[a-z]+\"))"}
10
+ {"input": "CRS Rule 941210: Javascript Word Detected", "output": "(any(http.request.cookies.values[*] contains \"<script\")) or (http.request.uri.query matches \"(?i)(?:j|&#(?:0*(?:74|106)|x0*[46]A);)(?:[\\\\t\\\\n\\\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);)\") or (http.request.uri.path contains \"<script\")"}
11
+ {"input": "CRS Rule 941220: IE XSS Filters - Attack Detected", "output": "(http.request.uri.query matches \"(?i)(?:v|&#(?:0*(?:118|86)|x0*[57]6);)(?:[\\\\t\\\\n\\\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);)\") or (any(http.request.cookies.values[*] matches \"<[^>]*on[a-z]+\"))"}
12
+ {"input": "CRS Rule 941230: IE XSS Filters - Attack Detected | Pattern: (?i)<EMBED[\\s/+].*?(?:src|type).*?=", "output": "(http.request.uri.query matches \"(?i)<EMBED[\\\\s/+].*?(?:src|type).*?=\") or (any(http.request.cookies.values[*] matches \"<[^>]*on[a-z]+\"))"}
13
+ {"input": "CRS Rule 941240: IE XSS Filters - Attack Detected | Pattern: <[?]?import[\\s/+\\S]*?implementation[\\s/+]*?=", "output": "(http.request.uri.query matches \"<[?]?import[\\\\s/+\\\\S]*?implementation[\\\\s/+]*?=\") or (any(http.request.cookies.values[*] matches \"<[^>]*on[a-z]+\"))"}
14
+ {"input": "CRS Rule 941250: IE XSS Filters - Attack Detected | Pattern: (?i:<META[\\s/+].*?http-equiv[\\s/+]*=[\\s/+]*[\\\"'`]?(?:(?:c|&#x?0*(?:67|43|99|63);?)|(?:r|&#x?0*(?:82|", "output": "(http.request.uri.query matches \"(?i:<META[\\\\s/+].*?http-equiv[\\\\s/+]*=[\\\\s/+]*[\\\\\\\"'`]?(?:(?:c|&#x?0*(?:67|43|99|63);?)|(?:r|&#x?0*(?:82|\") or (any(http.request.cookies.values[*] matches \"<[^>]*on[a-z]+\"))"}
15
+ {"input": "CRS Rule 941260: IE XSS Filters - Attack Detected | Pattern: (?i:<META[\\s/+].*?charset[\\s/+]*=)", "output": "(http.request.uri.query matches \"(?i:<META[\\\\s/+].*?charset[\\\\s/+]*=)\") or (any(http.request.cookies.values[*] matches \"<[^>]*on[a-z]+\"))"}
16
+ {"input": "CRS Rule 941270: IE XSS Filters - Attack Detected | Pattern: (?i)<LINK[\\s/+].*?href[\\s/+]*=", "output": "(http.request.uri.query matches \"(?i)<LINK[\\\\s/+].*?href[\\\\s/+]*=\") or (any(http.request.cookies.values[*] matches \"<[^>]*on[a-z]+\"))"}
17
+ {"input": "CRS Rule 941280: IE XSS Filters - Attack Detected | Pattern: (?i)<BASE[\\s/+].*?href[\\s/+]*=", "output": "(http.request.uri.query matches \"(?i)<BASE[\\\\s/+].*?href[\\\\s/+]*=\") or (any(http.request.cookies.values[*] matches \"<[^>]*on[a-z]+\"))"}
18
+ {"input": "CRS Rule 941290: IE XSS Filters - Attack Detected | Pattern: (?i)<APPLET[\\s/+>]", "output": "(http.request.uri.query matches \"(?i)<APPLET[\\\\s/+>]\") or (any(http.request.cookies.values[*] matches \"<[^>]*on[a-z]+\"))"}
19
+ {"input": "CRS Rule 941300: IE XSS Filters - Attack Detected | Pattern: (?i)<OBJECT[\\s/+].*?(?:type|codetype|classid|code|data)[\\s/+]*=", "output": "(http.request.uri.query matches \"(?i)<OBJECT[\\\\s/+].*?(?:type|codetype|classid|code|data)[\\\\s/+]*=\") or (any(http.request.cookies.values[*] matches \"<[^>]*on[a-z]+\"))"}
20
+ {"input": "CRS Rule 941310: US-ASCII Malformed Encoding XSS Filter - Attack Detected | Pattern: \\xbc[^\\xbe>]*[\\xbe>]|<[^\\xbe]*\\xbe", "output": "(http.request.uri.query matches \"\\\\xbc[^\\\\xbe>]*[\\\\xbe>]|<[^\\\\xbe]*\\\\xbe\") or (any(http.request.cookies.values[*] matches \"<[^>]*on[a-z]+\"))"}
21
+ {"input": "CRS Rule 941350: UTF-7 Encoding IE XSS - Attack Detected | Pattern: \\+ADw-.*(?:\\+AD4-|>)|<.*\\+AD4-", "output": "(http.request.uri.query matches \"\\\\+ADw-.*(?:\\\\+AD4-|>)|<.*\\\\+AD4-\") or (any(http.request.cookies.values[*] matches \"<[^>]*on[a-z]+\"))"}
22
+ {"input": "CRS Rule 941360: JSFuck / Hieroglyphy obfuscation detected | Pattern: ![!+ ]\\[\\]", "output": "(http.request.uri.query matches \"![!+ ]\\\\[\\\\]\") or (any(http.request.cookies.values[*] matches \"<[^>]*on[a-z]+\"))"}
23
+ {"input": "CRS Rule 941370: JavaScript global variable found | Pattern: (?:self|document|this|top|window)\\s*(?:/\\*|[\\[)]).+?(?:\\]|\\*/)", "output": "(any(http.request.cookies.values[*] contains \"<script\")) or (http.request.uri.query matches \"(?:self|document|this|top|window)\\\\s*(?:/\\\\*|[\\\\[)]).+?(?:\\\\]|\\\\*/)\") or (http.request.uri.path contains \"<script\")"}
24
+ {"input": "CRS Rule 941390: Javascript method detected | Pattern: (?i)\\b(?:eval|set(?:timeout|interval)|new[\\s\\x0b]+Function|a(?:lert|tob)|btoa|(?:promp|impor)t|con(?", "output": "(any(http.request.cookies.values[*] contains \"<script\")) or (http.request.uri.query matches \"(?i)\\\\b(?:eval|set(?:timeout|interval)|new[\\\\s\\\\x0b]+Function|a(?:lert|tob)|btoa|(?:promp|impor)t|con(?\") or (http.request.uri.path contains \"<script\")"}
25
+ {"input": "CRS Rule 941400: XSS JavaScript function without parentheses | Pattern: ((?:\\[[^\\]]*\\][^.]*\\.)|Reflect[^.]*\\.).*(?:map|sort|apply)[^.]*\\..*call[^`]*`.*`", "output": "(any(http.request.cookies.values[*] contains \"<script\")) or (http.request.uri.path contains \"<script\") or (http.request.uri.query matches \"((?:\\\\[[^\\\\]]*\\\\][^.]*\\\\.)|Reflect[^.]*\\\\.).*(?:map|sort|apply)[^.]*\\\\..*call[^`]*`.*`\")"}
26
+ {"input": "CRS Rule 941101: XSS Attack Detected via libinjection", "output": "(cf.waf.score.xss ge 40)"}
27
+ {"input": "CRS Rule 941120: XSS Filter - Category 2: Event Handler Vector | Pattern: (?i)[\\s\\\"'`;/0-9=\\x0B\\x09\\x0C\\x3B\\x2C\\x28\\x3B]on[a-zA-Z]{3,50}[\\s\\x0B\\x09\\x0C\\x3B\\x2C\\x28\\x3B]*?=[^=", "output": "(http.request.uri.query matches \"on(error|load|click|mouse)\" or http.request.body matches \"on(error|load|click|mouse)\")"}
28
+ {"input": "CRS Rule 941150: XSS Filter - Category 5: Disallowed HTML Attributes | Pattern: (?i)\\b(?:s(?:tyle|rc)|href)\\b[\\s\\S]*?=", "output": "(http.request.uri.query matches \"(?i)\\\\b(?:s(?:tyle|rc)|href)\\\\b[\\\\s\\\\S]*?=\") or (any(http.request.cookies.values[*] matches \"<[^>]*on[a-z]+\"))"}
29
+ {"input": "CRS Rule 941181: Node-Validator Deny List Keywords | Pattern: -->", "output": "(any(http.request.cookies.values[*] matches \"<[^>]*on[a-z]+\"))"}
30
+ {"input": "CRS Rule 941320: Possible XSS Attack Detected - HTML Tag Handler", "output": "(http.request.uri.query contains \"<script\") or (any(http.request.cookies.values[*] matches \"<[^>]*on[a-z]+\"))"}
31
+ {"input": "CRS Rule 941330: IE XSS Filters - Attack Detected", "output": "(http.request.uri.query matches \"(?i:[\\\\\\\"'][ ]*(?:[^a-z0-9~_:' ]|in).*?(?:(?:l|\\\\x5cu006C)(?:o|\\\\x5cu006F)(?:c|\\\\x5cu0063)(?:a|\\\\x5cu0061)\") or (any(http.request.cookies.values[*] matches \"<[^>]*on[a-z]+\"))"}
32
+ {"input": "CRS Rule 941340: IE XSS Filters - Attack Detected | Pattern: (?i)[\\\"\\'][ ]*(?:[^a-z0-9~_:\\' ]|in).+?[.].+?=", "output": "(http.request.uri.query matches \"(?i)[\\\\\\\"\\\\'][ ]*(?:[^a-z0-9~_:\\\\' ]|in).+?[.].+?=\") or (any(http.request.cookies.values[*] matches \"<[^>]*on[a-z]+\"))"}
33
+ {"input": "CRS Rule 941380: AngularJS client side template injection detected | Pattern: {{.*?}}", "output": "(http.request.uri.query matches \"\\{\\{.*\\}\\}\" or http.request.body matches \"\\{\\{.*\\}\\}\")"}
34
+ {"input": "CRS Rule 942100: SQL Injection Attack Detected via libinjection | Operator: @detectSQLi", "output": "(cf.waf.score.sqli ge 40)"}
35
+ {"input": "CRS Rule 942140: SQL Injection Attack: Common DB Names Detected | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(information_schema|mysql\\\\.|sys\\\\.|pg_catalog)\" or http.request.body matches \"(?i)(information_schema|mysql\\\\.|sys\\\\.|pg_catalog)\")"}
36
+ {"input": "CRS Rule 942151: SQL Injection Attack: SQL function name detected | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(concat|substring|ascii|char|count|group_concat)\\\\(\" or http.request.body matches \"(?i)(concat|substring|ascii|char|count|group_concat)\\\\(\")"}
37
+ {"input": "CRS Rule 942160: Detects blind sqli tests using sleep() or benchmark() | Pattern: (?i:sleep\\s*?\\(.*?\\)|benchmark\\s*?\\(.*?\\,.*?\\)) | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(sleep\\\\(|benchmark\\\\(|waitfor[\\\\s]+delay)\" or http.request.body matches \"(?i)(sleep\\\\(|benchmark\\\\(|waitfor[\\\\s]+delay)\")"}
38
+ {"input": "CRS Rule 942170: Detects SQL benchmark and sleep injection attempts including conditional queries | Pattern: (?i)(?:select|;)[\\s\\x0b]+(?:benchmark|if|sleep)[\\s\\x0b]*?\\([\\s\\x0b]*?\\(?[\\s\\x0b]*?[0-9A-Z_a-z]+ | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(sleep\\\\(|benchmark\\\\(|waitfor[\\\\s]+delay)\" or http.request.body matches \"(?i)(sleep\\\\(|benchmark\\\\(|waitfor[\\\\s]+delay)\")"}
39
+ {"input": "CRS Rule 942190: Detects MSSQL code execution and information gathering attempts | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)union[\\s\\+]+select\" or http.request.body matches \"(?i)union[\\s\\+]+select\")"}
40
+ {"input": "CRS Rule 942220: Looking for integer overflow attacks, these are taken from skipfish, except 2.2.2250738585072011e-308 is the \\\"magic number\\\" crash | Pattern: ^(?i:-0000023456|4294967295|4294967296|2147483648|2147483647|0000012345|-2147483648|-2147483649|0000023456|2.2250738585072007e-308|2.2250738585072011e-308|1e309)$ | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(2147483647|0x[0-9a-f]{8,}|999999999)\" or http.request.body matches \"(?i)(2147483647|0x[0-9a-f]{8,})\")"}
41
+ {"input": "CRS Rule 942230: Detects conditional SQL injection attempts | Pattern: (?i)[\\s\\x0b\\(\\)]case[\\s\\x0b]+when.*?then|\\)[\\s\\x0b]*?like[\\s\\x0b]*?\\(|select.*?having[\\s\\x0b]*?[^\\s\\x0b]+[\\s\\x0b]*?[^\\s\\x0b0-9A-Z_a-z]|if[\\s\\x0b]?\\([0-9A-Z_a-z]+[\\s\\x0b]*?[<->~] | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(and|or)[\\\\s]+[0-9]+[\\\\s]*(=|<|>)\" or http.request.body matches \"(?i)(and|or)[\\\\s]+[0-9]+[\\\\s]*(=|<|>)\" or http.request.uri.query matches \"(?i)(and|or)[\\\\s]+['\\\"][^'\\\"]*(=|like)\")"}
42
+ {"input": "CRS Rule 942240: Detects MySQL charset switch and MSSQL DoS attempts | Pattern: (?i)alter[\\s\\x0b]*?[0-9A-Z_a-z]+.*?char(?:acter)?[\\s\\x0b]+set[\\s\\x0b]+[0-9A-Z_a-z]+|[\\\"'`](?:;*?[\\s\\x0b]*?waitfor[\\s\\x0b]+(?:time|delay)[\\s\\x0b]+[\\\"'`]|;.*?:[\\s\\x0b]*?goto) | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(xp_cmdshell|sp_executesql|sp_makewebtask)\" or http.request.body matches \"(?i)(xp_cmdshell|sp_executesql|sp_makewebtask)\" or any(http.request.cookies.values[*] matches \"(?i)xp_cmdshell\"))"}
43
+ {"input": "CRS Rule 942250: Detects MATCH AGAINST, MERGE and EXECUTE IMMEDIATE injections | Pattern: (?i:merge.*?using\\s*?\\(|execute\\s*?immediate\\s*?[\\\"'`]|match\\s*?[\\w(),+-]+\\s*?against\\s*?\\() | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(match[\\\\s]+against|merge[\\\\s]+into|execute[\\\\s]+immediate)\" or http.request.body matches \"(?i)(match[\\\\s]+against|merge[\\\\s]+into|execute[\\\\s]+immediate)\")"}
44
+ {"input": "CRS Rule 942270: Looking for basic sql injection. Common attack string for mysql, oracle and others | Pattern: (?i)union.*?select.*?from | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)union[\\s\\+]+select\" or http.request.body matches \"(?i)union[\\s\\+]+select\")"}
45
+ {"input": "CRS Rule 942280: Detects Postgres pg_sleep injection, waitfor delay attacks and database shutdown attempts | Pattern: (?i)select[\\s\\x0b]*?pg_sleep|waitfor[\\s\\x0b]*?delay[\\s\\x0b]?[\\\"'`]+[\\s\\x0b]?[0-9]|;[\\s\\x0b]*?shutdown[\\s\\x0b]*?(?:[#;\\{]|/\\*|--) | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(sleep\\\\(|benchmark\\\\(|waitfor[\\\\s]+delay)\" or http.request.body matches \"(?i)(sleep\\\\(|benchmark\\\\(|waitfor[\\\\s]+delay)\")"}
46
+ {"input": "CRS Rule 942290: Finds basic MongoDB SQL injection attempts | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)union[\\s\\+]+select\" or http.request.body matches \"(?i)union[\\s\\+]+select\")"}
47
+ {"input": "CRS Rule 942320: Detects MySQL and PostgreSQL stored procedure/function injections | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(create|exec|declare)\" or http.request.body matches \"(?i)(create|exec|declare)\")"}
48
+ {"input": "CRS Rule 942350: Detects MySQL UDF injection and other data/structure manipulation attempts | Pattern: (?i)create[\\s\\x0b]+function[\\s\\x0b].+[\\s\\x0b]returns|;[\\s\\x0b]*?(?:alter|(?:(?:cre|trunc|upd)at|renam)e|d(?:e(?:lete|sc)|rop)|(?:inser|selec)t|load)\\b[\\s\\x0b]*?[\\(\\[]?[0-9A-Z_a-z]{2,} | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(create|alter)\" or http.request.body matches \"(?i)(create|alter)\")"}
49
+ {"input": "CRS Rule 942360: Detects concatenated basic SQL injection and SQLLFI attempts | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(select[\\\\s]+.*[\\\\s]+from|insert[\\\\s]+into|delete[\\\\s]+from|update[\\\\s]+.*[\\\\s]+set)\" or http.request.body matches \"(?i)(select[\\\\s]+.*[\\\\s]+from|insert[\\\\s]+into|delete[\\\\s]+from|update[\\\\s]+.*[\\\\s]+set)\" or any(http.request.cookies.values[*] matches \"(?i)select.*from\"))"}
50
+ {"input": "CRS Rule 942500: MySQL in-line comment detected | Pattern: (?i)/\\*[\\s\\x0b]*?[!\\+](?:[\\s\\x0b\\(\\)\\-0-9=A-Z_a-z]+)?\\*/ | Operator: @rx", "output": "(http.request.uri.query matches \"(--|\\\\#|/\\\\*)\" or http.request.body matches \"(--|\\\\#|/\\\\*)\")"}
51
+ {"input": "CRS Rule 942540: SQL Authentication bypass (split query) | Pattern: ^(?:[^']*'|[^\\\"]*\\\"|[^`]*`)[\\s\\x0b]*; | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(or[\\\\s]+1=1|or[\\\\s]+['\\\"]1['\\\"]\\\\s*=\\\\s*['\\\"]1)\" or http.request.body matches \"(?i)(or[\\\\s]+1=1|or[\\\\s]+['\\\"]1['\\\"]\\\\s*=\\\\s*['\\\"]1)\")"}
52
+ {"input": "CRS Rule 942560: MySQL Scientific Notation payload detected | Pattern: (?i)1\\.e(?:[\\(\\),]|\\.[\\$0-9A-Z_a-z]) | Operator: @rx", "output": "(cf.waf.score.sqli ge 40)"}
53
+ {"input": "CRS Rule 942550: JSON-Based SQL Injection | Pattern: (?i)[\\\"'`][\\[\\{][^#\\]\\}]*[\\]\\}]+[\\\"'`]|(?:[\\-@]>?|<@|@[\\?@]|\\?(?:(?:)|&|\\|#>)|#(?:>>|-)|->>|[<>])[\\\"'`](?:[\\[\\{][^#\\]\\}]*[\\]\\}]+[\\\"'`]|\\$[\\.\\[])|\\bjson_extract\\b[^\\(]*\\([^\\)]*\\) | Operator: @rx", "output": "(cf.waf.score.sqli ge 40)"}
54
+ {"input": "CRS Rule 942120: SQL Injection Attack: SQL Operator Detected | Operator: @rx", "output": "(cf.waf.score.sqli ge 40)"}
55
+ {"input": "CRS Rule 942130: SQL Injection Attack: SQL Boolean-based attack detected | Pattern: (?i)[\\s\\x0b\\\"'-\\)`]*?\\b([0-9A-Z_a-z]+)\\b[\\s\\x0b\\\"'-\\)`]*?(?:=|<=>|(?:sounds[\\s\\x0b]+)?like|glob|r(?:like|egexp))[\\s\\x0b\\\"'-\\)`]*?\\b([0-9A-Z_a-z]+)\\b | Operator: @rx", "output": "(cf.waf.score.sqli ge 40)"}
56
+ {"input": "CRS Rule 942131: SQL Injection Attack: SQL Boolean-based attack detected | Pattern: (?i)[\\s\\x0b\\\"'-\\)`]*?\\b([0-9A-Z_a-z]+)\\b[\\s\\x0b\\\"'-\\)`]*?(?:![<->]|<[=>]?|>=?|\\^|is[\\s\\x0b]+not|not[\\s\\x0b]+(?:like|r(?:like|egexp)))[\\s\\x0b\\\"'-\\)`]*?\\b([0-9A-Z_a-z]+)\\b | Operator: @rx", "output": "(cf.waf.score.sqli ge 40)"}
57
+ {"input": "CRS Rule 942150: SQL Injection Attack: SQL function name detected | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(concat|substring|ascii|char|count|group_concat)\\\\(\" or http.request.body matches \"(?i)(concat|substring|ascii|char|count|group_concat)\\\\(\")"}
58
+ {"input": "CRS Rule 942180: Detects basic SQL authentication bypass attempts 1/3 | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(or[\\\\s]+1=1|or[\\\\s]+['\\\"]1['\\\"]\\\\s*=\\\\s*['\\\"]1)\" or http.request.body matches \"(?i)(or[\\\\s]+1=1|or[\\\\s]+['\\\"]1['\\\"]\\\\s*=\\\\s*['\\\"]1)\")"}
59
+ {"input": "CRS Rule 942200: Detects MySQL comment-/space-obfuscated injections and backtick termination | Pattern: (?i),.*?[\\\"'\\)0-9`-f][\\\"'`](?:[\\\"'`].*?[\\\"'`]|(?:\\r?\\n)?\\z|[^\\\"'`]+)|[^0-9A-Z_a-z]select.+[^0-9A-Z_a-z]*?from|(?:alter|(?:(?:cre|trunc|upd)at|renam)e|d(?:e(?:lete|sc)|rop)|(?:inser|selec)t|load)[\\s\\x0 | Operator: @rx", "output": "(http.request.uri.query matches \"(--|\\\\#|/\\\\*)\" or http.request.body matches \"(--|\\\\#|/\\\\*)\")"}
60
+ {"input": "CRS Rule 942210: Detects chained SQL injection attempts 1/2 | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(select|insert|update|drop|alter)\" or http.request.body matches \"(?i)(select|insert|update|drop|alter)\")"}
61
+ {"input": "CRS Rule 942260: Detects basic SQL authentication bypass attempts 2/3 | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(or[\\\\s]+1=1|or[\\\\s]+['\\\"]1['\\\"]\\\\s*=\\\\s*['\\\"]1)\" or http.request.body matches \"(?i)(or[\\\\s]+1=1|or[\\\\s]+['\\\"]1['\\\"]\\\\s*=\\\\s*['\\\"]1)\")"}
62
+ {"input": "CRS Rule 942300: Detects MySQL comments, conditions and ch(a)r injections | Pattern: (?i)\\)[\\s\\x0b]*?when[\\s\\x0b]*?[0-9]+[\\s\\x0b]*?then|[\\\"'`][\\s\\x0b]*?(?:[#\\{]|--)|/\\*![\\s\\x0b]?[0-9]+|\\b(?:(?:binary|cha?r)[\\s\\x0b]*?\\([\\s\\x0b]*?[0-9]|(?:and|n(?:and|ot)|(?:xx?)?or|div|like|between|r(?: | Operator: @rx", "output": "(http.request.uri.query matches \"(--|\\\\#|/\\\\*)\" or http.request.body matches \"(--|\\\\#|/\\\\*)\")"}
63
+ {"input": "CRS Rule 942310: Detects chained SQL injection attempts 2/2 | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(select)\" or http.request.body matches \"(?i)(select)\")"}
64
+ {"input": "CRS Rule 942330: Detects classic SQL injection probings 1/3 | Operator: @rx", "output": "(cf.waf.score.sqli ge 40)"}
65
+ {"input": "CRS Rule 942340: Detects basic SQL authentication bypass attempts 3/3 | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(or[\\\\s]+1=1|or[\\\\s]+['\\\"]1['\\\"]\\\\s*=\\\\s*['\\\"]1)\" or http.request.body matches \"(?i)(or[\\\\s]+1=1|or[\\\\s]+['\\\"]1['\\\"]\\\\s*=\\\\s*['\\\"]1)\")"}
66
+ {"input": "CRS Rule 942361: Detects basic SQL injection based on keyword alter or union | Pattern: (?i:^[\\W\\d]+\\s*?(?:alter|union)\\b) | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)union[\\s\\+]+select\" or http.request.body matches \"(?i)union[\\s\\+]+select\")"}
67
+ {"input": "CRS Rule 942362: Detects concatenated basic SQL injection and SQLLFI attempts | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(select[\\\\s]+.*[\\\\s]+from|insert[\\\\s]+into|delete[\\\\s]+from|update[\\\\s]+.*[\\\\s]+set)\" or http.request.body matches \"(?i)(select[\\\\s]+.*[\\\\s]+from|insert[\\\\s]+into|delete[\\\\s]+from|update[\\\\s]+.*[\\\\s]+set)\" or any(http.request.cookies.values[*] matches \"(?i)select.*from\"))"}
68
+ {"input": "CRS Rule 942370: Detects classic SQL injection probings 2/3 | Operator: @rx", "output": "(cf.waf.score.sqli ge 40)"}
69
+ {"input": "CRS Rule 942380: SQL Injection Attack | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(select|create)\" or http.request.body matches \"(?i)(select|create)\")"}
70
+ {"input": "CRS Rule 942390: SQL Injection Attack | Pattern: (?i)\\b(?:or\\b(?:[\\s\\x0b]?(?:[0-9]{1,10}|[\\\"'][^=]{1,10}[\\\"'])[\\s\\x0b]?[<->]+|[\\s\\x0b]+(?:[0-9]{1,10}|'[^=]{1,10}')(?:[\\s\\x0b]*?[<->])?)|xor\\b[\\s\\x0b]+(?:[0-9]{1,10}|'[^=]{1,10}')(?:[\\s\\x0b]*?[<->])?)| | Operator: @rx", "output": "(cf.waf.score.sqli ge 40)"}
71
+ {"input": "CRS Rule 942400: SQL Injection Attack | Pattern: (?i)\\band\\b(?:[\\s\\x0b]+(?:[0-9]{1,10}[\\s\\x0b]*?[<->]|'[^=]{1,10}')| ?(?:[0-9]{1,10}|[\\\"'][^=]{1,10}[\\\"']) ?[<->]+) | Operator: @rx", "output": "(cf.waf.score.sqli ge 40)"}
72
+ {"input": "CRS Rule 942410: SQL Injection Attack | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(insert)\" or http.request.body matches \"(?i)(insert)\")"}
73
+ {"input": "CRS Rule 942470: SQL Injection Attack | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(delete|create|exec|execute)\" or http.request.body matches \"(?i)(delete|create|exec|execute)\")"}
74
+ {"input": "CRS Rule 942480: SQL Injection Attack | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(select|drop)\" or http.request.body matches \"(?i)(select|drop)\")"}
75
+ {"input": "CRS Rule 942430: Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (12) | Pattern: ((?:[~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'´’‘`<>][^~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'´’‘`<>]*?){12}) | Operator: @rx", "output": "(http.request.uri.query matches \";[\\\\s]*(select|insert|update|delete|drop)\" or http.request.body matches \";[\\\\s]*(select|insert|update|delete|drop)\")"}
76
+ {"input": "CRS Rule 942440: SQL Comment Sequence Detected | Pattern: /\\*!?|\\*/|[';]--|--(?:[\\s\\x0b]|[^\\-]*?-)|[^&\\-]#.*?[\\s\\x0b]|;?\\x00 | Operator: @rx", "output": "(http.request.uri.query matches \"(--|\\\\#|/\\\\*)\" or http.request.body matches \"(--|\\\\#|/\\\\*)\")"}
77
+ {"input": "CRS Rule 942450: SQL Hex Encoding Identified | Pattern: (?i:\\b0x[a-f\\d]{3,}) | Operator: @rx", "output": "(cf.waf.score.sqli ge 40)"}
78
+ {"input": "CRS Rule 942510: SQLi bypass attempt by ticks or backticks detected | Pattern: (?:`(?:(?:[\\w\\s=_\\-+{}()<@]){2,29}|(?:[A-Za-z0-9+/]{4})+(?:[A-Za-z0-9+/]{2}==|[A-Za-z0-9+/]{3}=)?)`) | Operator: @rx", "output": "(cf.waf.score.sqli ge 40)"}
79
+ {"input": "CRS Rule 942520: Detects basic SQL authentication bypass attempts 4.0/4 | Pattern: (?i)[\\\"'`][\\s\\x0b]*?(?:(?:is[\\s\\x0b]+not|not[\\s\\x0b]+(?:like|glob|(?:betwee|i)n|null|regexp|match)|mod|div|sounds[\\s\\x0b]+like)\\b|[%&\\*\\+\\-/<->\\^\\|]{1,3}) | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(or[\\\\s]+1=1|or[\\\\s]+['\\\"]1['\\\"]\\\\s*=\\\\s*['\\\"]1)\" or http.request.body matches \"(?i)(or[\\\\s]+1=1|or[\\\\s]+['\\\"]1['\\\"]\\\\s*=\\\\s*['\\\"]1)\")"}
80
+ {"input": "CRS Rule 942521: Detects basic SQL authentication bypass attempts 4.1/4 | Pattern: (?i)^(?:[^']*?(?:'[^']*?'[^']*?)*?'|[^\\\"]*?(?:\\\"[^\\\"]*?\\\"[^\\\"]*?)*?\\\"|[^`]*?(?:`[^`]*?`[^`]*?)*?`)[\\s\\x0b]*([0-9A-Z_a-z]+)\\b | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(or[\\\\s]+1=1|or[\\\\s]+['\\\"]1['\\\"]\\\\s*=\\\\s*['\\\"]1)\" or http.request.body matches \"(?i)(or[\\\\s]+1=1|or[\\\\s]+['\\\"]1['\\\"]\\\\s*=\\\\s*['\\\"]1)\")"}
81
+ {"input": "CRS Rule 942522: Detects basic SQL authentication bypass attempts 4.1/4 | Pattern: ^.*?\\x5c['\\\"`](?:.*?['\\\"`])?\\s*(?:and|or)\\b | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(or[\\\\s]+1=1|or[\\\\s]+['\\\"]1['\\\"]\\\\s*=\\\\s*['\\\"]1)\" or http.request.body matches \"(?i)(or[\\\\s]+1=1|or[\\\\s]+['\\\"]1['\\\"]\\\\s*=\\\\s*['\\\"]1)\")"}
82
+ {"input": "CRS Rule 942101: SQL Injection Attack Detected via libinjection | Operator: @detectSQLi", "output": "(cf.waf.score.sqli ge 40)"}
83
+ {"input": "CRS Rule 942152: SQL Injection Attack: SQL function name detected | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(concat|substring|ascii|char|count|group_concat)\\\\(\" or http.request.body matches \"(?i)(concat|substring|ascii|char|count|group_concat)\\\\(\")"}
84
+ {"input": "CRS Rule 942321: Detects MySQL and PostgreSQL stored procedure/function injections | Operator: @rx", "output": "(http.request.uri.query matches \"(?i)(create|exec|declare)\" or http.request.body matches \"(?i)(create|exec|declare)\")"}
85
+ {"input": "CRS Rule 942251: Detects HAVING injections | Pattern: (?i)\\W+\\d*?\\s*?\\bhaving\\b\\s*?[^\\s\\-] | Operator: @rx", "output": "(cf.waf.score.sqli ge 40)"}
86
+ {"input": "CRS Rule 942490: Detects classic SQL injection probings 3/3 | Pattern: [\\\"'`][\\s\\d]*?[^\\w\\s]\\W*?\\d\\W*?.*?[\\\"'`\\d] | Operator: @rx", "output": "(cf.waf.score.sqli ge 40)"}
87
+ {"input": "CRS Rule 942420: Restricted SQL Character Anomaly Detection (cookies): # of special characters exceeded (8) | Pattern: ((?:[~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'´’‘`<>][^~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'´’‘`<>]*?){8}) | Operator: @rx", "output": "(http.request.uri.query matches \";[\\\\s]*(select|insert|update|delete|drop)\" or http.request.body matches \";[\\\\s]*(select|insert|update|delete|drop)\")"}
88
+ {"input": "CRS Rule 942431: Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (6) | Pattern: ((?:[~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'´’‘`<>][^~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'´’‘`<>]*?){6}) | Operator: @rx", "output": "(http.request.uri.query matches \";[\\\\s]*(select|insert|update|delete|drop)\" or http.request.body matches \";[\\\\s]*(select|insert|update|delete|drop)\")"}
89
+ {"input": "CRS Rule 942460: Meta-Character Anomaly Detection Alert - Repetitive Non-Word Characters | Pattern: \\W{4} | Operator: @rx", "output": "(cf.waf.score.sqli ge 40)"}
90
+ {"input": "CRS Rule 942511: SQLi bypass attempt by ticks detected | Pattern: (?:'(?:(?:[\\w\\s=_\\-+{}()<@]){2,29}|(?:[A-Za-z0-9+/]{4})+(?:[A-Za-z0-9+/]{2}==|[A-Za-z0-9+/]{3}=)?)') | Operator: @rx", "output": "(cf.waf.score.sqli ge 40)"}
91
+ {"input": "CRS Rule 942530: SQLi query termination detected | Pattern: '; | Operator: @rx", "output": "(http.request.uri.query matches \";[\\\\s]*(select|insert|update|delete|drop)\" or http.request.body matches \";[\\\\s]*(select|insert|update|delete|drop)\")"}
92
+ {"input": "CRS Rule 942421: Restricted SQL Character Anomaly Detection (cookies): # of special characters exceeded (3) | Pattern: ((?:[~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'´’‘`<>][^~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'´’‘`<>]*?){3}) | Operator: @rx", "output": "(http.request.uri.query matches \";[\\\\s]*(select|insert|update|delete|drop)\" or http.request.body matches \";[\\\\s]*(select|insert|update|delete|drop)\")"}
93
+ {"input": "CRS Rule 942432: Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (2) | Pattern: ((?:[~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'´’‘`<>][^~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'´’‘`<>]*?){2}) | Operator: @rx", "output": "(http.request.uri.query matches \";[\\\\s]*(select|insert|update|delete|drop)\" or http.request.body matches \";[\\\\s]*(select|insert|update|delete|drop)\")"}
map-waf/Naxsi-Rules-Mapping.jsonl ADDED
@@ -0,0 +1,93 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {"input": "CRS XSS Rule 941100: XSS Attack Detected via libinjection", "output": "MainRule \"rx:<script|javascript:|onerror|onload\" \"msg:XSS Attack Detected via libinjection\" \"mz:ARGS|HEADERS\" \"s:$XSS:8\" id:941100;"}
2
+ {"input": "CRS XSS Rule 941110: XSS Filter - Category 1: Script Tag Vector", "output": "MainRule \"rx:(?i)<script[^>]*>[\\s\\S]*?\" \"msg:XSS Filter - Category 1: Script Tag Vector\" \"mz:ARGS|HEADERS|URL\" \"s:$XSS:8\" id:941110;"}
3
+ {"input": "CRS XSS Rule 941130: XSS Filter - Category 3: Attribute Vector", "output": "MainRule \"rx:(?i).(?:\\b(?:(?:x(?:link:href|html|mlns)|data:text/html|formaction)\\b|pattern[\\s\" \"msg:XSS Filter - Category 3: Attribute Vector\" \"mz:ARGS|HEADERS|URL\" \"s:$XSS:8\" id:941130;"}
4
+ {"input": "CRS XSS Rule 941140: XSS Filter - Category 4: Javascript URI Vector", "output": "MainRule \"rx:(?i)[a-z]+=(?:[^:=]+:.+;)*?[^:=]+:url\\(javascript\" \"msg:XSS Filter - Category 4: Javascript URI Vector\" \"mz:ARGS|HEADERS|URL\" \"s:$XSS:8\" id:941140;"}
5
+ {"input": "CRS XSS Rule 941160: NoScript XSS InjectionChecker: HTML Injection", "output": "MainRule \"rx:(?i)<script\" \"msg:NoScript XSS InjectionChecker: HTML Injection\" \"mz:ARGS|HEADERS|URL\" \"s:$XSS:8\" id:941160;"}
6
+ {"input": "CRS XSS Rule 941170: NoScript XSS InjectionChecker: Attribute Injection", "output": "MainRule \"rx:(?i)<script\" \"msg:NoScript XSS InjectionChecker: Attribute Injection\" \"mz:ARGS|HEADERS|URL\" \"s:$XSS:8\" id:941170;"}
7
+ {"input": "CRS XSS Rule 941180: Node-Validator Deny List Keywords", "output": "MainRule \"str:document.cookie document.domain document.querySelector document.body.appendChild\" \"msg:Node-Validator Deny List Keywords\" \"mz:ARGS|HEADERS|URL\" \"s:$XSS:8\" id:941180;"}
8
+ {"input": "CRS XSS Rule 941190: IE XSS Filters - Attack Detected", "output": "MainRule \"rx:(?i:<style.*?>.*?(?:@[i\\x5c]|(?:[:=]|&#x?0*(?:58|3A|61|3D);?).*?(?:[(\\x5c]|&#x?0\" \"msg:IE XSS Filters - Attack Detected\" \"mz:ARGS|HEADERS|URL\" \"s:$XSS:8\" id:941190;"}
9
+ {"input": "CRS XSS Rule 941200: IE XSS Filters - Attack Detected", "output": "MainRule \"rx:(?i:<.*[:]?vmlframe.*?[\\s/+]*?src[\\s/+]*=)\" \"msg:IE XSS Filters - Attack Detected\" \"mz:ARGS|HEADERS|URL\" \"s:$XSS:8\" id:941200;"}
10
+ {"input": "CRS XSS Rule 941210: Javascript Word Detected", "output": "MainRule \"rx:(?i)(?:j|&#(?:0*(?:74|106)|x0*[46]A);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD])\" \"msg:Javascript Word Detected\" \"mz:ARGS|HEADERS|URL\" \"s:$XSS:8\" id:941210;"}
11
+ {"input": "CRS XSS Rule 941220: IE XSS Filters - Attack Detected", "output": "MainRule \"rx:(?i)(?:v|&#(?:0*(?:118|86)|x0*[57]6);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD])\" \"msg:IE XSS Filters - Attack Detected\" \"mz:ARGS|HEADERS|URL\" \"s:$XSS:8\" id:941220;"}
12
+ {"input": "CRS XSS Rule 941230: IE XSS Filters - Attack Detected", "output": "MainRule \"rx:(?i)<EMBED[\\s/+].*?(?:src|type).*?=\" \"msg:IE XSS Filters - Attack Detected\" \"mz:ARGS|HEADERS|URL\" \"s:$XSS:8\" id:941230;"}
13
+ {"input": "CRS XSS Rule 941240: IE XSS Filters - Attack Detected", "output": "MainRule \"rx:<[?]?import[\\s/+\\S]*?implementation[\\s/+]*?=\" \"msg:IE XSS Filters - Attack Detected\" \"mz:ARGS|HEADERS|URL\" \"s:$XSS:8\" id:941240;"}
14
+ {"input": "CRS XSS Rule 941250: IE XSS Filters - Attack Detected", "output": "MainRule \"rx:(?i:<META[\\s/+].*?http-equiv[\\s/+]*=[\\s/+]*[\\\\\"'`]?(?:(?:c|&#x?0*(?:67|43|99|63)\" \"msg:IE XSS Filters - Attack Detected\" \"mz:ARGS|HEADERS|URL\" \"s:$XSS:8\" id:941250;"}
15
+ {"input": "CRS XSS Rule 941260: IE XSS Filters - Attack Detected", "output": "MainRule \"rx:(?i:<META[\\s/+].*?charset[\\s/+]*=)\" \"msg:IE XSS Filters - Attack Detected\" \"mz:ARGS|HEADERS|URL\" \"s:$XSS:8\" id:941260;"}
16
+ {"input": "CRS XSS Rule 941270: IE XSS Filters - Attack Detected", "output": "MainRule \"rx:(?i)<LINK[\\s/+].*?href[\\s/+]*=\" \"msg:IE XSS Filters - Attack Detected\" \"mz:ARGS|HEADERS|URL\" \"s:$XSS:8\" id:941270;"}
17
+ {"input": "CRS XSS Rule 941280: IE XSS Filters - Attack Detected", "output": "MainRule \"rx:(?i)<BASE[\\s/+].*?href[\\s/+]*=\" \"msg:IE XSS Filters - Attack Detected\" \"mz:ARGS|HEADERS|URL\" \"s:$XSS:8\" id:941280;"}
18
+ {"input": "CRS XSS Rule 941290: IE XSS Filters - Attack Detected", "output": "MainRule \"rx:(?i)<APPLET[\\s/+>]\" \"msg:IE XSS Filters - Attack Detected\" \"mz:ARGS|HEADERS|URL\" \"s:$XSS:8\" id:941290;"}
19
+ {"input": "CRS XSS Rule 941300: IE XSS Filters - Attack Detected", "output": "MainRule \"rx:(?i)<OBJECT[\\s/+].*?(?:type|codetype|classid|code|data)[\\s/+]*=\" \"msg:IE XSS Filters - Attack Detected\" \"mz:ARGS|HEADERS|URL\" \"s:$XSS:8\" id:941300;"}
20
+ {"input": "CRS XSS Rule 941310: US-ASCII Malformed Encoding XSS Filter - Attack Detected", "output": "MainRule \"rx:\\xbc[^\\xbe>]*[\\xbe>]|<[^\\xbe]*\\xbe\" \"msg:US-ASCII Malformed Encoding XSS Filter - Attack Detected\" \"mz:ARGS|HEADERS|URL\" \"s:$XSS:8\" id:941310;"}
21
+ {"input": "CRS XSS Rule 941350: UTF-7 Encoding IE XSS - Attack Detected", "output": "MainRule \"rx:\\+ADw-.*(?:\\+AD4-|>)|<.*\\+AD4-\" \"msg:UTF-7 Encoding IE XSS - Attack Detected\" \"mz:ARGS|HEADERS|URL\" \"s:$XSS:8\" id:941350;"}
22
+ {"input": "CRS XSS Rule 941360: JSFuck / Hieroglyphy obfuscation detected", "output": "MainRule \"rx:![!+ ]\\[\\]\" \"msg:JSFuck / Hieroglyphy obfuscation detected\" \"mz:ARGS|HEADERS|URL\" \"s:$XSS:8\" id:941360;"}
23
+ {"input": "CRS XSS Rule 941370: JavaScript global variable found", "output": "MainRule \"rx:(?:self|document|this|top|window)\\s*(?:/\\*|[\\[)]).+?(?:\\]|\\*/)\" \"msg:JavaScript global variable found\" \"mz:ARGS|HEADERS|URL\" \"s:$XSS:8\" id:941370;"}
24
+ {"input": "CRS XSS Rule 941390: Javascript method detected", "output": "MainRule \"rx:(?i)\\b(?:eval|set(?:timeout|interval)|new[\\s\\x0b]+Function|a(?:lert|tob)|btoa|(?\" \"msg:Javascript method detected\" \"mz:ARGS|HEADERS|URL\" \"s:$XSS:8\" id:941390;"}
25
+ {"input": "CRS XSS Rule 941400: XSS JavaScript function without parentheses", "output": "MainRule \"rx:((?:\\[[^\\]]*\\][^.]*\\.)|Reflect[^.]*\\.).*(?:map|sort|apply)[^.]*\\..*call[^`]*`.*`\" \"msg:XSS JavaScript function without parentheses\" \"mz:ARGS|HEADERS|URL\" \"s:$XSS:8\" id:941400;"}
26
+ {"input": "CRS XSS Rule 941101: XSS Attack Detected via libinjection", "output": "MainRule \"rx:<script|javascript:|onerror|onload\" \"msg:XSS Attack Detected via libinjection\" \"mz:HEADERS|URL\" \"s:$XSS:8\" id:941101;"}
27
+ {"input": "CRS XSS Rule 941120: XSS Filter - Category 2: Event Handler Vector", "output": "MainRule \"rx:(?i)[\\s\\\\\"'`;/0-9=\\x0B\\x09\\x0C\\x3B\\x2C\\x28\\x3B]on[a-zA-Z]{3,50}[\\s\\x0B\\x09\\x0C\\x\" \"msg:XSS Filter - Category 2: Event Handler Vector\" \"mz:ARGS|HEADERS|URL\" \"s:$XSS:8\" id:941120;"}
28
+ {"input": "CRS XSS Rule 941150: XSS Filter - Category 5: Disallowed HTML Attributes", "output": "MainRule \"rx:(?i)\\b(?:s(?:tyle|rc)|href)\\b[\\s\\S]*?=\" \"msg:XSS Filter - Category 5: Disallowed HTML Attributes\" \"mz:ARGS|HEADERS|URL\" \"s:$XSS:8\" id:941150;"}
29
+ {"input": "CRS XSS Rule 941181: Node-Validator Deny List Keywords", "output": "MainRule \"str:-->\" \"msg:Node-Validator Deny List Keywords\" \"mz:ARGS|HEADERS|URL\" \"s:$XSS:8\" id:941181;"}
30
+ {"input": "CRS XSS Rule 941320: Possible XSS Attack Detected - HTML Tag Handler", "output": "MainRule \"rx:(?i)<script\" \"msg:Possible XSS Attack Detected - HTML Tag Handler\" \"mz:ARGS|HEADERS|URL\" \"s:$XSS:8\" id:941320;"}
31
+ {"input": "CRS XSS Rule 941330: IE XSS Filters - Attack Detected", "output": "MainRule \"rx:(?i:[\\\\\"'][ ]*(?:[^a-z0-9~_:' ]|in).*?(?:(?:l|\\x5cu006C)(?:o|\\x5cu006F)(?:c|\\x5c\" \"msg:IE XSS Filters - Attack Detected\" \"mz:ARGS|HEADERS|URL\" \"s:$XSS:8\" id:941330;"}
32
+ {"input": "CRS XSS Rule 941340: IE XSS Filters - Attack Detected", "output": "MainRule \"rx:(?i)[\\\\\"\\'][ ]*(?:[^a-z0-9~_:\\' ]|in).+?[.].+?=\" \"msg:IE XSS Filters - Attack Detected\" \"mz:ARGS|HEADERS|URL\" \"s:$XSS:8\" id:941340;"}
33
+ {"input": "CRS XSS Rule 941380: AngularJS client side template injection detected", "output": "MainRule \"rx:{{.*?}}\" \"msg:AngularJS client side template injection detected\" \"mz:ARGS|HEADERS|URL\" \"s:$XSS:8\" id:941380;"}
34
+ {"input": "CRS SQLi Rule 942100: SQL Injection Attack Detected via libinjection", "output": "MainRule \"rx:union.*select|insert.*into|drop.*table\" \"msg:SQL Injection Attack Detected via libinjection\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942100;"}
35
+ {"input": "CRS SQLi Rule 942140: SQL Injection Attack: Common DB Names Detected", "output": "MainRule \"rx:(?i)\\b(?:d(?:atabas|b_nam)e[^0-9A-Z_a-z]*\\(|(?:information_schema|m(?:aster\\.\\.s\" \"msg:SQL Injection Attack: Common DB Names Detected\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942140;"}
36
+ {"input": "CRS SQLi Rule 942151: SQL Injection Attack: SQL function name detected", "output": "MainRule \"rx:(?i)\\b(?:a(?:dd(?:dat|tim)e|es_(?:de|en)crypt|s(?:cii(?:str)?|in)|tan2?)|b(?:enc\" \"msg:SQL Injection Attack: SQL function name detected\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942151;"}
37
+ {"input": "CRS SQLi Rule 942160: Detects blind sqli tests using sleep() or benchmark()", "output": "MainRule \"rx:(?i:sleep\\s*?\\(.*?\\)|benchmark\\s*?\\(.*?\\,.*?\\))\" \"msg:Detects blind sqli tests using sleep() or benchmark()\" \"mz:ARGS|HEADERS|URL\" \"s:$SQL:8\" id:942160;"}
38
+ {"input": "CRS SQLi Rule 942170: Detects SQL benchmark and sleep injection attempts including conditional queries", "output": "MainRule \"rx:(?i)(?:select|;)[\\s\\x0b]+(?:benchmark|if|sleep)[\\s\\x0b]*?\\([\\s\\x0b]*?\\(?[\\s\\x0b]*?[0-9A-Z_a-z]+\" \"msg:Detects SQL benchmark and sleep injection attempts including...\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942170;"}
39
+ {"input": "CRS SQLi Rule 942190: Detects MSSQL code execution and information gathering attempts", "output": "MainRule \"rx:(?i)union.*select\" \"msg:Detects MSSQL code execution and information gathering attem...\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942190;"}
40
+ {"input": "CRS SQLi Rule 942220: Looking for integer overflow attacks, these are taken from skipfish, except 2.2.2250738585072011e-308 is the \\\"magic number\\\" crash", "output": "MainRule \"rx:^(?i:-0000023456|4294967295|4294967296|2147483648|2147483647|0000012345|-2147483\" \"msg:Looking for integer overflow attacks, these are taken from s...\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942220;"}
41
+ {"input": "CRS SQLi Rule 942230: Detects conditional SQL injection attempts", "output": "MainRule \"rx:(?i)[\\s\\x0b\\(\\)]case[\\s\\x0b]+when.*?then|\\)[\\s\\x0b]*?like[\\s\\x0b]*?\\(|select.*?h\" \"msg:Detects conditional SQL injection attempts\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942230;"}
42
+ {"input": "CRS SQLi Rule 942240: Detects MySQL charset switch and MSSQL DoS attempts", "output": "MainRule \"rx:(?i)alter[\\s\\x0b]*?[0-9A-Z_a-z]+.*?char(?:acter)?[\\s\\x0b]+set[\\s\\x0b]+[0-9A-Z_a-\" \"msg:Detects MySQL charset switch and MSSQL DoS attempts\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942240;"}
43
+ {"input": "CRS SQLi Rule 942250: Detects MATCH AGAINST, MERGE and EXECUTE IMMEDIATE injections", "output": "MainRule \"rx:(?i:merge.*?using\\s*?\\(|execute\\s*?immediate\\s*?[\\\\\"'`]|match\\s*?[\\w(),+-]+\\s*?against\\s*?\\()\" \"msg:Detects MATCH AGAINST, MERGE and EXECUTE IMMEDIATE injection...\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942250;"}
44
+ {"input": "CRS SQLi Rule 942270: Looking for basic sql injection. Common attack string for mysql, oracle and others", "output": "MainRule \"rx:(?i)union.*?select.*?from\" \"msg:Looking for basic sql injection. Common attack string for my...\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942270;"}
45
+ {"input": "CRS SQLi Rule 942280: Detects Postgres pg_sleep injection, waitfor delay attacks and database shutdown attempts", "output": "MainRule \"rx:(?i)select[\\s\\x0b]*?pg_sleep|waitfor[\\s\\x0b]*?delay[\\s\\x0b]?[\\\\\"'`]+[\\s\\x0b]?[0-\" \"msg:Detects Postgres pg_sleep injection, waitfor delay attacks a...\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942280;"}
46
+ {"input": "CRS SQLi Rule 942290: Finds basic MongoDB SQL injection attempts", "output": "MainRule \"rx:(?i)union.*select\" \"msg:Finds basic MongoDB SQL injection attempts\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942290;"}
47
+ {"input": "CRS SQLi Rule 942320: Detects MySQL and PostgreSQL stored procedure/function injections", "output": "MainRule \"rx:(?i)create[\\s\\x0b]+(?:function|procedure)[\\s\\x0b]*?[0-9A-Z_a-z]+[\\s\\x0b]*?\\([\\s\\\" \"msg:Detects MySQL and PostgreSQL stored procedure/function injec...\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942320;"}
48
+ {"input": "CRS SQLi Rule 942350: Detects MySQL UDF injection and other data/structure manipulation attempts", "output": "MainRule \"rx:(?i)create[\\s\\x0b]+function[\\s\\x0b].+[\\s\\x0b]returns|;[\\s\\x0b]*?(?:alter|(?:(?:c\" \"msg:Detects MySQL UDF injection and other data/structure manipul...\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942350;"}
49
+ {"input": "CRS SQLi Rule 942360: Detects concatenated basic SQL injection and SQLLFI attempts", "output": "MainRule \"rx:(?i)\\b(?:(?:alter|(?:(?:cre|trunc|upd)at|renam)e|de(?:lete|sc)|(?:inser|selec)t|\" \"msg:Detects concatenated basic SQL injection and SQLLFI attempts\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942360;"}
50
+ {"input": "CRS SQLi Rule 942500: MySQL in-line comment detected", "output": "MainRule \"rx:(?i)/\\*[\\s\\x0b]*?[!\\+](?:[\\s\\x0b\\(\\)\\-0-9=A-Z_a-z]+)?\\*/\" \"msg:MySQL in-line comment detected\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942500;"}
51
+ {"input": "CRS SQLi Rule 942540: SQL Authentication bypass (split query)", "output": "MainRule \"rx:^(?:[^']*'|[^\\\\\"]*\\\\\"|[^`]*`)[\\s\\x0b]*;\" \"msg:SQL Authentication bypass (split query)\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942540;"}
52
+ {"input": "CRS SQLi Rule 942560: MySQL Scientific Notation payload detected", "output": "MainRule \"rx:(?i)1\\.e(?:[\\(\\),]|\\.[\\$0-9A-Z_a-z])\" \"msg:MySQL Scientific Notation payload detected\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942560;"}
53
+ {"input": "CRS SQLi Rule 942550: JSON-Based SQL Injection", "output": "MainRule \"rx:(?i)[\\\\\"'`][\\[\\{][^#\\]\\}]*[\\]\\}]+[\\\\\"'`]|(?:[\\-@]>?|<@|@[\\?@]|\\?(?:(?:)|&|\\|#>)|\" \"msg:JSON-Based SQL Injection\" \"mz:ARGS|HEADERS|URL\" \"s:$SQL:8\" id:942550;"}
54
+ {"input": "CRS SQLi Rule 942120: SQL Injection Attack: SQL Operator Detected", "output": "MainRule \"rx:(?i)[!=]=|&&|\\|\\||->|>[=>]|<(?:[<=]|>(?:[\\s\\x0b]+binary)?)|\\b(?:(?:xor|r(?:egexp\" \"msg:SQL Injection Attack: SQL Operator Detected\" \"mz:ARGS|URL\" \"s:$SQL:8\" id:942120;"}
55
+ {"input": "CRS SQLi Rule 942130: SQL Injection Attack: SQL Boolean-based attack detected", "output": "MainRule \"rx:(?i)[\\s\\x0b\\\\\"'-\\)`]*?\\b([0-9A-Z_a-z]+)\\b[\\s\\x0b\\\\\"'-\\)`]*?(?:=|<=>|(?:sounds[\\s\" \"msg:SQL Injection Attack: SQL Boolean-based attack detected\" \"mz:ARGS\" \"s:$SQL:8\" id:942130;"}
56
+ {"input": "CRS SQLi Rule 942131: SQL Injection Attack: SQL Boolean-based attack detected", "output": "MainRule \"rx:(?i)[\\s\\x0b\\\\\"'-\\)`]*?\\b([0-9A-Z_a-z]+)\\b[\\s\\x0b\\\\\"'-\\)`]*?(?:![<->]|<[=>]?|>=?|\" \"msg:SQL Injection Attack: SQL Boolean-based attack detected\" \"mz:ARGS\" \"s:$SQL:8\" id:942131;"}
57
+ {"input": "CRS SQLi Rule 942150: SQL Injection Attack: SQL function name detected", "output": "MainRule \"rx:(?i)\\b(?:json(?:_[0-9A-Z_a-z]+)?|a(?:bs|(?:cos|sin)h?|tan[2h]?|vg)|c(?:eil(?:ing\" \"msg:SQL Injection Attack: SQL function name detected\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942150;"}
58
+ {"input": "CRS SQLi Rule 942180: Detects basic SQL authentication bypass attempts 1/3", "output": "MainRule \"rx:(?i)(?:/\\*)+[\\\\\"'`]+[\\s\\x0b]?(?:--|[#\\{]|/\\*)?|[\\\\\"'`](?:[\\s\\x0b]*(?:(?:x?or|and\" \"msg:Detects basic SQL authentication bypass attempts 1/3\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942180;"}
59
+ {"input": "CRS SQLi Rule 942200: Detects MySQL comment-/space-obfuscated injections and backtick termination", "output": "MainRule \"rx:(?i),.*?[\\\\\"'\\)0-9`-f][\\\\\"'`](?:[\\\\\"'`].*?[\\\\\"'`]|(?:\\r?\\n)?\\z|[^\\\\\"'`]+)|[^0-9A\" \"msg:Detects MySQL comment-/space-obfuscated injections and backt...\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942200;"}
60
+ {"input": "CRS SQLi Rule 942210: Detects chained SQL injection attempts 1/2", "output": "MainRule \"rx:(?i)(?:&&|\\|\\||and|between|div|like|n(?:and|ot)|(?:xx?)?or)[\\s\\x0b\\(]+[0-9A-Z_a-\" \"msg:Detects chained SQL injection attempts 1/2\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942210;"}
61
+ {"input": "CRS SQLi Rule 942260: Detects basic SQL authentication bypass attempts 2/3", "output": "MainRule \"rx:(?i)[\\\\\"'`][\\s\\x0b]*?(?:(?:and|n(?:and|ot)|(?:xx?)?or|div|like|between|\\|\\||&&)[\" \"msg:Detects basic SQL authentication bypass attempts 2/3\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942260;"}
62
+ {"input": "CRS SQLi Rule 942300: Detects MySQL comments, conditions and ch(a)r injections", "output": "MainRule \"rx:(?i)\\)[\\s\\x0b]*?when[\\s\\x0b]*?[0-9]+[\\s\\x0b]*?then|[\\\\\"'`][\\s\\x0b]*?(?:[#\\{]|--)\" \"msg:Detects MySQL comments, conditions and ch(a)r injections\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942300;"}
63
+ {"input": "CRS SQLi Rule 942310: Detects chained SQL injection attempts 2/2", "output": "MainRule \"rx:(?i)(?:\\([\\s\\x0b]*?select[\\s\\x0b]*?[0-9A-Z_a-z]+|coalesce|order[\\s\\x0b]+by[\\s\\x0\" \"msg:Detects chained SQL injection attempts 2/2\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942310;"}
64
+ {"input": "CRS SQLi Rule 942330: Detects classic SQL injection probings 1/3", "output": "MainRule \"rx:(?i)[\\\\\"'`][\\s\\x0b]*?\\b(?:x?or|div|like|between|and)\\b[\\s\\x0b]*?[\\\\\"'`]?[0-9]|\\x\" \"msg:Detects classic SQL injection probings 1/3\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942330;"}
65
+ {"input": "CRS SQLi Rule 942340: Detects basic SQL authentication bypass attempts 3/3", "output": "MainRule \"rx:(?i)in[\\s\\x0b]*?\\(+[\\s\\x0b]*?select|(?:(?:and|n(?:and|ot)|(?:xx?)?or|div|like|be\" \"msg:Detects basic SQL authentication bypass attempts 3/3\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942340;"}
66
+ {"input": "CRS SQLi Rule 942361: Detects basic SQL injection based on keyword alter or union", "output": "MainRule \"rx:(?i:^[\\W\\d]+\\s*?(?:alter|union)\\b)\" \"msg:Detects basic SQL injection based on keyword alter or union\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942361;"}
67
+ {"input": "CRS SQLi Rule 942362: Detects concatenated basic SQL injection and SQLLFI attempts", "output": "MainRule \"rx:(?i)(?:alter|(?:(?:cre|trunc|upd)at|renam)e|de(?:lete|sc)|(?:inser|selec)t|load)\" \"msg:Detects concatenated basic SQL injection and SQLLFI attempts\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942362;"}
68
+ {"input": "CRS SQLi Rule 942370: Detects classic SQL injection probings 2/3", "output": "MainRule \"rx:(?i)[\\\\\"'`](?:[\\s\\x0b]*?(?:(?:\\*.+(?:x?or|div|like|between|(?:an|i)d)[^0-9A-Z_a-\" \"msg:Detects classic SQL injection probings 2/3\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942370;"}
69
+ {"input": "CRS SQLi Rule 942380: SQL Injection Attack", "output": "MainRule \"rx:(?i)\\b(?:having\\b(?:[\\s\\x0b]+(?:[0-9]{1,10}|'[^=]{1,10}')[\\s\\x0b]*?[<->]| ?(?:[0\" \"msg:SQL Injection Attack\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942380;"}
70
+ {"input": "CRS SQLi Rule 942390: SQL Injection Attack", "output": "MainRule \"rx:(?i)\\b(?:or\\b(?:[\\s\\x0b]?(?:[0-9]{1,10}|[\\\\\"'][^=]{1,10}[\\\\\"'])[\\s\\x0b]?[<->]+|[\" \"msg:SQL Injection Attack\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942390;"}
71
+ {"input": "CRS SQLi Rule 942400: SQL Injection Attack", "output": "MainRule \"rx:(?i)\\band\\b(?:[\\s\\x0b]+(?:[0-9]{1,10}[\\s\\x0b]*?[<->]|'[^=]{1,10}')| ?(?:[0-9]{1,\" \"msg:SQL Injection Attack\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942400;"}
72
+ {"input": "CRS SQLi Rule 942410: SQL Injection Attack", "output": "MainRule \"rx:(?i)\\b(?:a(?:(?:b|co)s|dd(?:dat|tim)e|es_(?:de|en)crypt|s(?:in|cii(?:str)?)|tan2\" \"msg:SQL Injection Attack\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942410;"}
73
+ {"input": "CRS SQLi Rule 942470: SQL Injection Attack", "output": "MainRule \"rx:(?i)autonomous_transaction|(?:current_use|n?varcha|tbcreato)r|db(?:a_users|ms_ja\" \"msg:SQL Injection Attack\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942470;"}
74
+ {"input": "CRS SQLi Rule 942480: SQL Injection Attack", "output": "MainRule \"rx:(?i)\\b(?:(?:d(?:bms_[0-9A-Z_a-z]+\\.|elete\\b[^0-9A-Z_a-z]*?\\bfrom)|(?:group\\b.*?\\\" \"msg:SQL Injection Attack\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942480;"}
75
+ {"input": "CRS SQLi Rule 942430: Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (12)", "output": "MainRule \"rx:((?:[~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\\\"'´’‘`<>][^~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\" \"msg:Restricted SQL Character Anomaly Detection (args): # of spec...\" \"mz:ARGS\" \"s:$SQL:8\" id:942430;"}
76
+ {"input": "CRS SQLi Rule 942440: SQL Comment Sequence Detected", "output": "MainRule \"rx:/\\*!?|\\*/|[';]--|--(?:[\\s\\x0b]|[^\\-]*?-)|[^&\\-]#.*?[\\s\\x0b]|;?\\x00\" \"msg:SQL Comment Sequence Detected\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942440;"}
77
+ {"input": "CRS SQLi Rule 942450: SQL Hex Encoding Identified", "output": "MainRule \"rx:(?i:\\b0x[a-f\\d]{3,})\" \"msg:SQL Hex Encoding Identified\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942450;"}
78
+ {"input": "CRS SQLi Rule 942510: SQLi bypass attempt by ticks or backticks detected", "output": "MainRule \"rx:(?:`(?:(?:[\\w\\s=_\\-+{}()<@]){2,29}|(?:[A-Za-z0-9+/]{4})+(?:[A-Za-z0-9+/]{2}==|[A-Za-z0-9+/]{3}=)?)`)\" \"msg:SQLi bypass attempt by ticks or backticks detected\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942510;"}
79
+ {"input": "CRS SQLi Rule 942520: Detects basic SQL authentication bypass attempts 4.0/4", "output": "MainRule \"rx:(?i)[\\\\\"'`][\\s\\x0b]*?(?:(?:is[\\s\\x0b]+not|not[\\s\\x0b]+(?:like|glob|(?:betwee|i)n\" \"msg:Detects basic SQL authentication bypass attempts 4.0/4\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942520;"}
80
+ {"input": "CRS SQLi Rule 942521: Detects basic SQL authentication bypass attempts 4.1/4", "output": "MainRule \"rx:(?i)^(?:[^']*?(?:'[^']*?'[^']*?)*?'|[^\\\\\"]*?(?:\\\\\"[^\\\\\"]*?\\\\\"[^\\\\\"]*?)*?\\\\\"|[^`]\" \"msg:Detects basic SQL authentication bypass attempts 4.1/4\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942521;"}
81
+ {"input": "CRS SQLi Rule 942522: Detects basic SQL authentication bypass attempts 4.1/4", "output": "MainRule \"rx:^.*?\\x5c['\\\\\"`](?:.*?['\\\\\"`])?\\s*(?:and|or)\\b\" \"msg:Detects basic SQL authentication bypass attempts 4.1/4\" \"mz:ARGS\" \"s:$SQL:8\" id:942522;"}
82
+ {"input": "CRS SQLi Rule 942101: SQL Injection Attack Detected via libinjection", "output": "MainRule \"rx:union.*select|insert.*into|drop.*table\" \"msg:SQL Injection Attack Detected via libinjection\" \"mz:URL\" \"s:$SQL:8\" id:942101;"}
83
+ {"input": "CRS SQLi Rule 942152: SQL Injection Attack: SQL function name detected", "output": "MainRule \"rx:(?i)\\b(?:a(?:dd(?:dat|tim)e|es_(?:de|en)crypt|s(?:cii(?:str)?|in)|tan2?)|b(?:enc\" \"msg:SQL Injection Attack: SQL function name detected\" \"mz:HEADERS\" \"s:$SQL:8\" id:942152;"}
84
+ {"input": "CRS SQLi Rule 942321: Detects MySQL and PostgreSQL stored procedure/function injections", "output": "MainRule \"rx:(?i)create[\\s\\x0b]+(?:function|procedure)[\\s\\x0b]*?[0-9A-Z_a-z]+[\\s\\x0b]*?\\([\\s\\\" \"msg:Detects MySQL and PostgreSQL stored procedure/function injec...\" \"mz:HEADERS\" \"s:$SQL:8\" id:942321;"}
85
+ {"input": "CRS SQLi Rule 942251: Detects HAVING injections", "output": "MainRule \"rx:(?i)\\W+\\d*?\\s*?\\bhaving\\b\\s*?[^\\s\\-]\" \"msg:Detects HAVING injections\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942251;"}
86
+ {"input": "CRS SQLi Rule 942490: Detects classic SQL injection probings 3/3", "output": "MainRule \"rx:[\\\\\"'`][\\s\\d]*?[^\\w\\s]\\W*?\\d\\W*?.*?[\\\\\"'`\\d]\" \"msg:Detects classic SQL injection probings 3/3\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942490;"}
87
+ {"input": "CRS SQLi Rule 942420: Restricted SQL Character Anomaly Detection (cookies): # of special characters exceeded (8)", "output": "MainRule \"rx:((?:[~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\\\"'´’‘`<>][^~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\" \"msg:Restricted SQL Character Anomaly Detection (cookies): # of s...\" \"mz:HEADERS\" \"s:$SQL:8\" id:942420;"}
88
+ {"input": "CRS SQLi Rule 942431: Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (6)", "output": "MainRule \"rx:((?:[~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\\\"'´’‘`<>][^~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\" \"msg:Restricted SQL Character Anomaly Detection (args): # of spec...\" \"mz:ARGS\" \"s:$SQL:8\" id:942431;"}
89
+ {"input": "CRS SQLi Rule 942460: Meta-Character Anomaly Detection Alert - Repetitive Non-Word Characters", "output": "MainRule \"rx:\\W{4}\" \"msg:Meta-Character Anomaly Detection Alert - Repetitive Non-Word...\" \"mz:ARGS\" \"s:$SQL:8\" id:942460;"}
90
+ {"input": "CRS SQLi Rule 942511: SQLi bypass attempt by ticks detected", "output": "MainRule \"rx:(?:'(?:(?:[\\w\\s=_\\-+{}()<@]){2,29}|(?:[A-Za-z0-9+/]{4})+(?:[A-Za-z0-9+/]{2}==|[A-Za-z0-9+/]{3}=)?)')\" \"msg:SQLi bypass attempt by ticks detected\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942511;"}
91
+ {"input": "CRS SQLi Rule 942530: SQLi query termination detected", "output": "MainRule \"rx:';\" \"msg:SQLi query termination detected\" \"mz:ARGS|HEADERS\" \"s:$SQL:8\" id:942530;"}
92
+ {"input": "CRS SQLi Rule 942421: Restricted SQL Character Anomaly Detection (cookies): # of special characters exceeded (3)", "output": "MainRule \"rx:((?:[~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\\\"'´’‘`<>][^~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\" \"msg:Restricted SQL Character Anomaly Detection (cookies): # of s...\" \"mz:HEADERS\" \"s:$SQL:8\" id:942421;"}
93
+ {"input": "CRS SQLi Rule 942432: Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (2)", "output": "MainRule \"rx:((?:[~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\\\"'´’‘`<>][^~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\" \"msg:Restricted SQL Character Anomaly Detection (args): # of spec...\" \"mz:ARGS\" \"s:$SQL:8\" id:942432;"}
map-waf/SafeLine-Rules-Mapping.jsonl ADDED
@@ -0,0 +1,93 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {"input": "CRS XSS Rule 941100: XSS Attack Detected via libinjection", "output": "id: safeline-941100\nname: XSS Attack Detected via libinjection\ndescription: 'Converted from CRS Rule 941100: XSS Attack Detected via libinjection'\nrule_type: semantic\nconditions:\n- field: request.cookie\n operator: semantic_match\n semantic_type: xss\n threshold: 0.8\n- field: request.header\n operator: semantic_match\n semantic_type: xss\n threshold: 0.8\n- field: request.query\n operator: semantic_match\n semantic_type: xss\n threshold: 0.8\naction: block\nseverity: critical\ntags:\n- xss\n- injection\n- web-attack\nsemantic_type: xss\ntargets:\n- cookie\n- header\n- query"}
2
+ {"input": "CRS XSS Rule 941110: XSS Filter - Category 1: Script Tag Vector", "output": "id: safeline-941110\nname: 'XSS Filter - Category 1: Script Tag Vector'\ndescription: 'Converted from CRS Rule 941110: XSS Filter - Category 1: Script Tag\n Vector'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)<script[^>]*>[\\s\\S]*?\n- field: request.header\n operator: regex_match\n value: (?i)<script[^>]*>[\\s\\S]*?\n- field: request.path\n operator: regex_match\n value: (?i)<script[^>]*>[\\s\\S]*?\n- field: request.query\n operator: regex_match\n value: (?i)<script[^>]*>[\\s\\S]*?\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- header\n- path\n- query"}
3
+ {"input": "CRS XSS Rule 941130: XSS Filter - Category 3: Attribute Vector", "output": "id: safeline-941130\nname: 'XSS Filter - Category 3: Attribute Vector'\ndescription: 'Converted from CRS Rule 941130: XSS Filter - Category 3: Attribute Vector'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i).(?:\\b(?:(?:x(?:link:href|html|mlns)|data:text/html|formaction)\\b|pattern[\\s\\x0b]*=)|(?:!ENTITY[\\s\\x0b]+(?:%[\\s\\x0b]+)?[^\\s\\x0b]+[\\s\\x0b]+(?:SYSTEM|PUBLIC)|@import|;base64)\\b)\n- field: request.header\n operator: regex_match\n value: (?i).(?:\\b(?:(?:x(?:link:href|html|mlns)|data:text/html|formaction)\\b|pattern[\\s\\x0b]*=)|(?:!ENTITY[\\s\\x0b]+(?:%[\\s\\x0b]+)?[^\\s\\x0b]+[\\s\\x0b]+(?:SYSTEM|PUBLIC)|@import|;base64)\\b)\n- field: request.path\n operator: regex_match\n value: (?i).(?:\\b(?:(?:x(?:link:href|html|mlns)|data:text/html|formaction)\\b|pattern[\\s\\x0b]*=)|(?:!ENTITY[\\s\\x0b]+(?:%[\\s\\x0b]+)?[^\\s\\x0b]+[\\s\\x0b]+(?:SYSTEM|PUBLIC)|@import|;base64)\\b)\n- field: request.query\n operator: regex_match\n value: (?i).(?:\\b(?:(?:x(?:link:href|html|mlns)|data:text/html|formaction)\\b|pattern[\\s\\x0b]*=)|(?:!ENTITY[\\s\\x0b]+(?:%[\\s\\x0b]+)?[^\\s\\x0b]+[\\s\\x0b]+(?:SYSTEM|PUBLIC)|@import|;base64)\\b)\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- header\n- path\n- query"}
4
+ {"input": "CRS XSS Rule 941140: XSS Filter - Category 4: Javascript URI Vector", "output": "id: safeline-941140\nname: 'XSS Filter - Category 4: Javascript URI Vector'\ndescription: 'Converted from CRS Rule 941140: XSS Filter - Category 4: Javascript\n URI Vector'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)[a-z]+=(?:[^:=]+:.+;)*?[^:=]+:url\\(javascript\n- field: request.header\n operator: regex_match\n value: (?i)[a-z]+=(?:[^:=]+:.+;)*?[^:=]+:url\\(javascript\n- field: request.path\n operator: regex_match\n value: (?i)[a-z]+=(?:[^:=]+:.+;)*?[^:=]+:url\\(javascript\n- field: request.query\n operator: regex_match\n value: (?i)[a-z]+=(?:[^:=]+:.+;)*?[^:=]+:url\\(javascript\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- header\n- path\n- query"}
5
+ {"input": "CRS XSS Rule 941160: NoScript XSS InjectionChecker: HTML Injection", "output": "id: safeline-941160\nname: 'NoScript XSS InjectionChecker: HTML Injection'\ndescription: 'Converted from CRS Rule 941160: NoScript XSS InjectionChecker: HTML\n Injection'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)<[^0-9<>A-Z_a-z]*(?:[^\\s\\x0b\\\"'<>]*:)?[^0-9<>A-Z_a-z]*[^0-9A-Z_a-z]*?(?:s[^0-9A-Z_a-z]*?(?:c[^0-9A-Z_a-z]*?r[^0-9A-Z_a-z]*?i[^0-9A-Z_a-z]*?p[^0-9A-Z_a-z]*?t|t[^0-9A-Z_a-z]*?y[^0-9A-Z_a-z]*?l[^0-9A\n- field: request.header\n operator: regex_match\n value: (?i)<[^0-9<>A-Z_a-z]*(?:[^\\s\\x0b\\\"'<>]*:)?[^0-9<>A-Z_a-z]*[^0-9A-Z_a-z]*?(?:s[^0-9A-Z_a-z]*?(?:c[^0-9A-Z_a-z]*?r[^0-9A-Z_a-z]*?i[^0-9A-Z_a-z]*?p[^0-9A-Z_a-z]*?t|t[^0-9A-Z_a-z]*?y[^0-9A-Z_a-z]*?l[^0-9A\n- field: request.path\n operator: regex_match\n value: (?i)<[^0-9<>A-Z_a-z]*(?:[^\\s\\x0b\\\"'<>]*:)?[^0-9<>A-Z_a-z]*[^0-9A-Z_a-z]*?(?:s[^0-9A-Z_a-z]*?(?:c[^0-9A-Z_a-z]*?r[^0-9A-Z_a-z]*?i[^0-9A-Z_a-z]*?p[^0-9A-Z_a-z]*?t|t[^0-9A-Z_a-z]*?y[^0-9A-Z_a-z]*?l[^0-9A\n- field: request.query\n operator: regex_match\n value: (?i)<[^0-9<>A-Z_a-z]*(?:[^\\s\\x0b\\\"'<>]*:)?[^0-9<>A-Z_a-z]*[^0-9A-Z_a-z]*?(?:s[^0-9A-Z_a-z]*?(?:c[^0-9A-Z_a-z]*?r[^0-9A-Z_a-z]*?i[^0-9A-Z_a-z]*?p[^0-9A-Z_a-z]*?t|t[^0-9A-Z_a-z]*?y[^0-9A-Z_a-z]*?l[^0-9A\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- header\n- path\n- query"}
6
+ {"input": "CRS XSS Rule 941170: NoScript XSS InjectionChecker: Attribute Injection", "output": "id: safeline-941170\nname: 'NoScript XSS InjectionChecker: Attribute Injection'\ndescription: 'Converted from CRS Rule 941170: NoScript XSS InjectionChecker: Attribute\n Injection'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)<script[^>]*>\n- field: request.header\n operator: regex_match\n value: (?i)<script[^>]*>\n- field: request.path\n operator: regex_match\n value: (?i)<script[^>]*>\n- field: request.query\n operator: regex_match\n value: (?i)<script[^>]*>\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- header\n- path\n- query"}
7
+ {"input": "CRS XSS Rule 941180: Node-Validator Deny List Keywords", "output": "id: safeline-941180\nname: Node-Validator Deny List Keywords\ndescription: 'Converted from CRS Rule 941180: Node-Validator Deny List Keywords'\nrule_type: signature\nconditions:\n- field: request.cookie\n operator: contains\n value: <script|javascript:|onerror|onload\n- field: request.path\n operator: contains\n value: <script|javascript:|onerror|onload\n- field: request.query\n operator: contains\n value: <script|javascript:|onerror|onload\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"}
8
+ {"input": "CRS XSS Rule 941190: IE XSS Filters - Attack Detected", "output": "id: safeline-941190\nname: IE XSS Filters - Attack Detected\ndescription: 'Converted from CRS Rule 941190: IE XSS Filters - Attack Detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i:<style.*?>.*?(?:@[i\\x5c]|(?:[:=]|&#x?0*(?:58|3A|61|3D);?).*?(?:[(\\x5c]|&#x?0*(?:40|28|92|5C);?)))\n- field: request.path\n operator: regex_match\n value: (?i:<style.*?>.*?(?:@[i\\x5c]|(?:[:=]|&#x?0*(?:58|3A|61|3D);?).*?(?:[(\\x5c]|&#x?0*(?:40|28|92|5C);?)))\n- field: request.query\n operator: regex_match\n value: (?i:<style.*?>.*?(?:@[i\\x5c]|(?:[:=]|&#x?0*(?:58|3A|61|3D);?).*?(?:[(\\x5c]|&#x?0*(?:40|28|92|5C);?)))\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"}
9
+ {"input": "CRS XSS Rule 941200: IE XSS Filters - Attack Detected", "output": "id: safeline-941200\nname: IE XSS Filters - Attack Detected\ndescription: 'Converted from CRS Rule 941200: IE XSS Filters - Attack Detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i:<.*[:]?vmlframe.*?[\\s/+]*?src[\\s/+]*=)\n- field: request.path\n operator: regex_match\n value: (?i:<.*[:]?vmlframe.*?[\\s/+]*?src[\\s/+]*=)\n- field: request.query\n operator: regex_match\n value: (?i:<.*[:]?vmlframe.*?[\\s/+]*?src[\\s/+]*=)\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"}
10
+ {"input": "CRS XSS Rule 941210: Javascript Word Detected", "output": "id: safeline-941210\nname: Javascript Word Detected\ndescription: 'Converted from CRS Rule 941210: Javascript Word Detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)(?:j|&#(?:0*(?:74|106)|x0*[46]A);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(?:a|&#(?:0*(?:65|97)|x0*[46]1);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(\n- field: request.path\n operator: regex_match\n value: (?i)(?:j|&#(?:0*(?:74|106)|x0*[46]A);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(?:a|&#(?:0*(?:65|97)|x0*[46]1);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(\n- field: request.query\n operator: regex_match\n value: (?i)(?:j|&#(?:0*(?:74|106)|x0*[46]A);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(?:a|&#(?:0*(?:65|97)|x0*[46]1);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"}
11
+ {"input": "CRS XSS Rule 941220: IE XSS Filters - Attack Detected", "output": "id: safeline-941220\nname: IE XSS Filters - Attack Detected\ndescription: 'Converted from CRS Rule 941220: IE XSS Filters - Attack Detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)(?:v|&#(?:0*(?:118|86)|x0*[57]6);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(?:b|&#(?:0*(?:98|66)|x0*[46]2);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(\n- field: request.path\n operator: regex_match\n value: (?i)(?:v|&#(?:0*(?:118|86)|x0*[57]6);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(?:b|&#(?:0*(?:98|66)|x0*[46]2);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(\n- field: request.query\n operator: regex_match\n value: (?i)(?:v|&#(?:0*(?:118|86)|x0*[57]6);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(?:b|&#(?:0*(?:98|66)|x0*[46]2);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"}
12
+ {"input": "CRS XSS Rule 941230: IE XSS Filters - Attack Detected", "output": "id: safeline-941230\nname: IE XSS Filters - Attack Detected\ndescription: 'Converted from CRS Rule 941230: IE XSS Filters - Attack Detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)<EMBED[\\s/+].*?(?:src|type).*?=\n- field: request.path\n operator: regex_match\n value: (?i)<EMBED[\\s/+].*?(?:src|type).*?=\n- field: request.query\n operator: regex_match\n value: (?i)<EMBED[\\s/+].*?(?:src|type).*?=\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"}
13
+ {"input": "CRS XSS Rule 941240: IE XSS Filters - Attack Detected", "output": "id: safeline-941240\nname: IE XSS Filters - Attack Detected\ndescription: 'Converted from CRS Rule 941240: IE XSS Filters - Attack Detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: <[?]?import[\\s/+\\S]*?implementation[\\s/+]*?=\n- field: request.path\n operator: regex_match\n value: <[?]?import[\\s/+\\S]*?implementation[\\s/+]*?=\n- field: request.query\n operator: regex_match\n value: <[?]?import[\\s/+\\S]*?implementation[\\s/+]*?=\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"}
14
+ {"input": "CRS XSS Rule 941250: IE XSS Filters - Attack Detected", "output": "id: safeline-941250\nname: IE XSS Filters - Attack Detected\ndescription: 'Converted from CRS Rule 941250: IE XSS Filters - Attack Detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i:<META[\\s/+].*?http-equiv[\\s/+]*=[\\s/+]*[\\\"'`]?(?:(?:c|&#x?0*(?:67|43|99|63);?)|(?:r|&#x?0*(?:82|52|114|72);?)|(?:s|&#x?0*(?:83|53|115|73);?)))\n- field: request.path\n operator: regex_match\n value: (?i:<META[\\s/+].*?http-equiv[\\s/+]*=[\\s/+]*[\\\"'`]?(?:(?:c|&#x?0*(?:67|43|99|63);?)|(?:r|&#x?0*(?:82|52|114|72);?)|(?:s|&#x?0*(?:83|53|115|73);?)))\n- field: request.query\n operator: regex_match\n value: (?i:<META[\\s/+].*?http-equiv[\\s/+]*=[\\s/+]*[\\\"'`]?(?:(?:c|&#x?0*(?:67|43|99|63);?)|(?:r|&#x?0*(?:82|52|114|72);?)|(?:s|&#x?0*(?:83|53|115|73);?)))\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"}
15
+ {"input": "CRS XSS Rule 941260: IE XSS Filters - Attack Detected", "output": "id: safeline-941260\nname: IE XSS Filters - Attack Detected\ndescription: 'Converted from CRS Rule 941260: IE XSS Filters - Attack Detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i:<META[\\s/+].*?charset[\\s/+]*=)\n- field: request.path\n operator: regex_match\n value: (?i:<META[\\s/+].*?charset[\\s/+]*=)\n- field: request.query\n operator: regex_match\n value: (?i:<META[\\s/+].*?charset[\\s/+]*=)\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"}
16
+ {"input": "CRS XSS Rule 941270: IE XSS Filters - Attack Detected", "output": "id: safeline-941270\nname: IE XSS Filters - Attack Detected\ndescription: 'Converted from CRS Rule 941270: IE XSS Filters - Attack Detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)<LINK[\\s/+].*?href[\\s/+]*=\n- field: request.path\n operator: regex_match\n value: (?i)<LINK[\\s/+].*?href[\\s/+]*=\n- field: request.query\n operator: regex_match\n value: (?i)<LINK[\\s/+].*?href[\\s/+]*=\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"}
17
+ {"input": "CRS XSS Rule 941280: IE XSS Filters - Attack Detected", "output": "id: safeline-941280\nname: IE XSS Filters - Attack Detected\ndescription: 'Converted from CRS Rule 941280: IE XSS Filters - Attack Detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)<BASE[\\s/+].*?href[\\s/+]*=\n- field: request.path\n operator: regex_match\n value: (?i)<BASE[\\s/+].*?href[\\s/+]*=\n- field: request.query\n operator: regex_match\n value: (?i)<BASE[\\s/+].*?href[\\s/+]*=\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"}
18
+ {"input": "CRS XSS Rule 941290: IE XSS Filters - Attack Detected", "output": "id: safeline-941290\nname: IE XSS Filters - Attack Detected\ndescription: 'Converted from CRS Rule 941290: IE XSS Filters - Attack Detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)<APPLET[\\s/+>]\n- field: request.path\n operator: regex_match\n value: (?i)<APPLET[\\s/+>]\n- field: request.query\n operator: regex_match\n value: (?i)<APPLET[\\s/+>]\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"}
19
+ {"input": "CRS XSS Rule 941300: IE XSS Filters - Attack Detected", "output": "id: safeline-941300\nname: IE XSS Filters - Attack Detected\ndescription: 'Converted from CRS Rule 941300: IE XSS Filters - Attack Detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)<OBJECT[\\s/+].*?(?:type|codetype|classid|code|data)[\\s/+]*=\n- field: request.path\n operator: regex_match\n value: (?i)<OBJECT[\\s/+].*?(?:type|codetype|classid|code|data)[\\s/+]*=\n- field: request.query\n operator: regex_match\n value: (?i)<OBJECT[\\s/+].*?(?:type|codetype|classid|code|data)[\\s/+]*=\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"}
20
+ {"input": "CRS XSS Rule 941310: US-ASCII Malformed Encoding XSS Filter - Attack Detected", "output": "id: safeline-941310\nname: US-ASCII Malformed Encoding XSS Filter - Attack Detected\ndescription: 'Converted from CRS Rule 941310: US-ASCII Malformed Encoding XSS Filter\n - Attack Detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: \\xbc[^\\xbe>]*[\\xbe>]|<[^\\xbe]*\\xbe\n- field: request.path\n operator: regex_match\n value: \\xbc[^\\xbe>]*[\\xbe>]|<[^\\xbe]*\\xbe\n- field: request.query\n operator: regex_match\n value: \\xbc[^\\xbe>]*[\\xbe>]|<[^\\xbe]*\\xbe\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"}
21
+ {"input": "CRS XSS Rule 941350: UTF-7 Encoding IE XSS - Attack Detected", "output": "id: safeline-941350\nname: UTF-7 Encoding IE XSS - Attack Detected\ndescription: 'Converted from CRS Rule 941350: UTF-7 Encoding IE XSS - Attack Detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: \\+ADw-.*(?:\\+AD4-|>)|<.*\\+AD4-\n- field: request.path\n operator: regex_match\n value: \\+ADw-.*(?:\\+AD4-|>)|<.*\\+AD4-\n- field: request.query\n operator: regex_match\n value: \\+ADw-.*(?:\\+AD4-|>)|<.*\\+AD4-\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"}
22
+ {"input": "CRS XSS Rule 941360: JSFuck / Hieroglyphy obfuscation detected", "output": "id: safeline-941360\nname: JSFuck / Hieroglyphy obfuscation detected\ndescription: 'Converted from CRS Rule 941360: JSFuck / Hieroglyphy obfuscation detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: '![!+ ]\\[\\]'\n- field: request.path\n operator: regex_match\n value: '![!+ ]\\[\\]'\n- field: request.query\n operator: regex_match\n value: '![!+ ]\\[\\]'\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"}
23
+ {"input": "CRS XSS Rule 941370: JavaScript global variable found", "output": "id: safeline-941370\nname: JavaScript global variable found\ndescription: 'Converted from CRS Rule 941370: JavaScript global variable found'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?:self|document|this|top|window)\\s*(?:/\\*|[\\[)]).+?(?:\\]|\\*/)\n- field: request.path\n operator: regex_match\n value: (?:self|document|this|top|window)\\s*(?:/\\*|[\\[)]).+?(?:\\]|\\*/)\n- field: request.query\n operator: regex_match\n value: (?:self|document|this|top|window)\\s*(?:/\\*|[\\[)]).+?(?:\\]|\\*/)\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"}
24
+ {"input": "CRS XSS Rule 941390: Javascript method detected", "output": "id: safeline-941390\nname: Javascript method detected\ndescription: 'Converted from CRS Rule 941390: Javascript method detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)\\b(?:eval|set(?:timeout|interval)|new[\\s\\x0b]+Function|a(?:lert|tob)|btoa|(?:promp|impor)t|con(?:firm|sole\\.(?:log|dir))|fetch)[\\s\\x0b]*[\\(\\{]\n- field: request.path\n operator: regex_match\n value: (?i)\\b(?:eval|set(?:timeout|interval)|new[\\s\\x0b]+Function|a(?:lert|tob)|btoa|(?:promp|impor)t|con(?:firm|sole\\.(?:log|dir))|fetch)[\\s\\x0b]*[\\(\\{]\n- field: request.query\n operator: regex_match\n value: (?i)\\b(?:eval|set(?:timeout|interval)|new[\\s\\x0b]+Function|a(?:lert|tob)|btoa|(?:promp|impor)t|con(?:firm|sole\\.(?:log|dir))|fetch)[\\s\\x0b]*[\\(\\{]\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"}
25
+ {"input": "CRS XSS Rule 941400: XSS JavaScript function without parentheses", "output": "id: safeline-941400\nname: XSS JavaScript function without parentheses\ndescription: 'Converted from CRS Rule 941400: XSS JavaScript function without parentheses'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: ((?:\\[[^\\]]*\\][^.]*\\.)|Reflect[^.]*\\.).*(?:map|sort|apply)[^.]*\\..*call[^`]*`.*`\n- field: request.path\n operator: regex_match\n value: ((?:\\[[^\\]]*\\][^.]*\\.)|Reflect[^.]*\\.).*(?:map|sort|apply)[^.]*\\..*call[^`]*`.*`\n- field: request.query\n operator: regex_match\n value: ((?:\\[[^\\]]*\\][^.]*\\.)|Reflect[^.]*\\.).*(?:map|sort|apply)[^.]*\\..*call[^`]*`.*`\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"}
26
+ {"input": "CRS XSS Rule 941101: XSS Attack Detected via libinjection", "output": "id: safeline-941101\nname: XSS Attack Detected via libinjection\ndescription: 'Converted from CRS Rule 941101: XSS Attack Detected via libinjection'\nrule_type: semantic\nconditions:\n- field: request.header\n operator: semantic_match\n semantic_type: xss\n threshold: 0.8\n- field: request.path\n operator: semantic_match\n semantic_type: xss\n threshold: 0.8\naction: block\nseverity: critical\ntags:\n- xss\n- injection\n- web-attack\nsemantic_type: xss\ntargets:\n- header\n- path"}
27
+ {"input": "CRS XSS Rule 941120: XSS Filter - Category 2: Event Handler Vector", "output": "id: safeline-941120\nname: 'XSS Filter - Category 2: Event Handler Vector'\ndescription: 'Converted from CRS Rule 941120: XSS Filter - Category 2: Event Handler\n Vector'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)[\\s\\\"'`;/0-9=\\x0B\\x09\\x0C\\x3B\\x2C\\x28\\x3B]on[a-zA-Z]{3,50}[\\s\\x0B\\x09\\x0C\\x3B\\x2C\\x28\\x3B]*?=[^=]\n- field: request.header\n operator: regex_match\n value: (?i)[\\s\\\"'`;/0-9=\\x0B\\x09\\x0C\\x3B\\x2C\\x28\\x3B]on[a-zA-Z]{3,50}[\\s\\x0B\\x09\\x0C\\x3B\\x2C\\x28\\x3B]*?=[^=]\n- field: request.path\n operator: regex_match\n value: (?i)[\\s\\\"'`;/0-9=\\x0B\\x09\\x0C\\x3B\\x2C\\x28\\x3B]on[a-zA-Z]{3,50}[\\s\\x0B\\x09\\x0C\\x3B\\x2C\\x28\\x3B]*?=[^=]\n- field: request.query\n operator: regex_match\n value: (?i)[\\s\\\"'`;/0-9=\\x0B\\x09\\x0C\\x3B\\x2C\\x28\\x3B]on[a-zA-Z]{3,50}[\\s\\x0B\\x09\\x0C\\x3B\\x2C\\x28\\x3B]*?=[^=]\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- header\n- path\n- query"}
28
+ {"input": "CRS XSS Rule 941150: XSS Filter - Category 5: Disallowed HTML Attributes", "output": "id: safeline-941150\nname: 'XSS Filter - Category 5: Disallowed HTML Attributes'\ndescription: 'Converted from CRS Rule 941150: XSS Filter - Category 5: Disallowed\n HTML Attributes'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)\\b(?:s(?:tyle|rc)|href)\\b[\\s\\S]*?=\n- field: request.header\n operator: regex_match\n value: (?i)\\b(?:s(?:tyle|rc)|href)\\b[\\s\\S]*?=\n- field: request.path\n operator: regex_match\n value: (?i)\\b(?:s(?:tyle|rc)|href)\\b[\\s\\S]*?=\n- field: request.query\n operator: regex_match\n value: (?i)\\b(?:s(?:tyle|rc)|href)\\b[\\s\\S]*?=\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- header\n- path\n- query"}
29
+ {"input": "CRS XSS Rule 941181: Node-Validator Deny List Keywords", "output": "id: safeline-941181\nname: Node-Validator Deny List Keywords\ndescription: 'Converted from CRS Rule 941181: Node-Validator Deny List Keywords'\nrule_type: signature\nconditions:\n- field: request.cookie\n operator: contains\n value: <script|javascript:|onerror|onload\n- field: request.path\n operator: contains\n value: <script|javascript:|onerror|onload\n- field: request.query\n operator: contains\n value: <script|javascript:|onerror|onload\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"}
30
+ {"input": "CRS XSS Rule 941320: Possible XSS Attack Detected - HTML Tag Handler", "output": "id: safeline-941320\nname: Possible XSS Attack Detected - HTML Tag Handler\ndescription: 'Converted from CRS Rule 941320: Possible XSS Attack Detected - HTML\n Tag Handler'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: <(?:a|abbr|acronym|address|applet|area|audioscope|b|base|basefront|bdo|bgsound|big|blackface|blink|blockquote|body|bq|br|button|caption|center|cite|code|col|colgroup|comment|dd|del|dfn|dir|div|dl|dt|e\n- field: request.path\n operator: regex_match\n value: <(?:a|abbr|acronym|address|applet|area|audioscope|b|base|basefront|bdo|bgsound|big|blackface|blink|blockquote|body|bq|br|button|caption|center|cite|code|col|colgroup|comment|dd|del|dfn|dir|div|dl|dt|e\n- field: request.query\n operator: regex_match\n value: <(?:a|abbr|acronym|address|applet|area|audioscope|b|base|basefront|bdo|bgsound|big|blackface|blink|blockquote|body|bq|br|button|caption|center|cite|code|col|colgroup|comment|dd|del|dfn|dir|div|dl|dt|e\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"}
31
+ {"input": "CRS XSS Rule 941330: IE XSS Filters - Attack Detected", "output": "id: safeline-941330\nname: IE XSS Filters - Attack Detected\ndescription: 'Converted from CRS Rule 941330: IE XSS Filters - Attack Detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i:[\\\"'][ ]*(?:[^a-z0-9~_:' ]|in).*?(?:(?:l|\\x5cu006C)(?:o|\\x5cu006F)(?:c|\\x5cu0063)(?:a|\\x5cu0061)(?:t|\\x5cu0074)(?:i|\\x5cu0069)(?:o|\\x5cu006F)(?:n|\\x5cu006E)|(?:n|\\x5cu006E)(?:a|\\x5cu0061)(?:m|\\x5c\n- field: request.path\n operator: regex_match\n value: (?i:[\\\"'][ ]*(?:[^a-z0-9~_:' ]|in).*?(?:(?:l|\\x5cu006C)(?:o|\\x5cu006F)(?:c|\\x5cu0063)(?:a|\\x5cu0061)(?:t|\\x5cu0074)(?:i|\\x5cu0069)(?:o|\\x5cu006F)(?:n|\\x5cu006E)|(?:n|\\x5cu006E)(?:a|\\x5cu0061)(?:m|\\x5c\n- field: request.query\n operator: regex_match\n value: (?i:[\\\"'][ ]*(?:[^a-z0-9~_:' ]|in).*?(?:(?:l|\\x5cu006C)(?:o|\\x5cu006F)(?:c|\\x5cu0063)(?:a|\\x5cu0061)(?:t|\\x5cu0074)(?:i|\\x5cu0069)(?:o|\\x5cu006F)(?:n|\\x5cu006E)|(?:n|\\x5cu006E)(?:a|\\x5cu0061)(?:m|\\x5c\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"}
32
+ {"input": "CRS XSS Rule 941340: IE XSS Filters - Attack Detected", "output": "id: safeline-941340\nname: IE XSS Filters - Attack Detected\ndescription: 'Converted from CRS Rule 941340: IE XSS Filters - Attack Detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)[\\\"\\'][ ]*(?:[^a-z0-9~_:\\' ]|in).+?[.].+?=\n- field: request.path\n operator: regex_match\n value: (?i)[\\\"\\'][ ]*(?:[^a-z0-9~_:\\' ]|in).+?[.].+?=\n- field: request.query\n operator: regex_match\n value: (?i)[\\\"\\'][ ]*(?:[^a-z0-9~_:\\' ]|in).+?[.].+?=\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"}
33
+ {"input": "CRS XSS Rule 941380: AngularJS client side template injection detected", "output": "id: safeline-941380\nname: AngularJS client side template injection detected\ndescription: 'Converted from CRS Rule 941380: AngularJS client side template injection\n detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: '{{.*?}}'\n- field: request.path\n operator: regex_match\n value: '{{.*?}}'\n- field: request.query\n operator: regex_match\n value: '{{.*?}}'\naction: block\nseverity: medium\ntags:\n- xss\n- injection\n- web-attack\ntargets:\n- cookie\n- path\n- query"}
34
+ {"input": "CRS SQLi Rule 942100: SQL Injection Attack Detected via libinjection", "output": "id: safeline-942100\nname: SQL Injection Attack Detected via libinjection\ndescription: 'Converted from CRS Rule 942100: SQL Injection Attack Detected via libinjection'\nrule_type: semantic\nconditions:\n- field: request.cookie\n operator: semantic_match\n semantic_type: sqli\n threshold: 0.8\n- field: request.header\n operator: semantic_match\n semantic_type: sqli\n threshold: 0.8\n- field: request.query\n operator: semantic_match\n semantic_type: sqli\n threshold: 0.8\naction: block\nseverity: critical\ntags:\n- sqli\n- injection\n- database\nsemantic_type: sqli\ntargets:\n- cookie\n- header\n- query"}
35
+ {"input": "CRS SQLi Rule 942140: SQL Injection Attack: Common DB Names Detected", "output": "id: safeline-942140\nname: 'SQL Injection Attack: Common DB Names Detected'\ndescription: 'Converted from CRS Rule 942140: SQL Injection Attack: Common DB Names\n Detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)\\b(?:d(?:atabas|b_nam)e[^0-9A-Z_a-z]*\\(|(?:information_schema|m(?:aster\\.\\.sysdatabases|s(?:db|ys(?:ac(?:cess(?:objects|storage|xml)|es)|modules2?|(?:object|querie|relationship)s))|ysql\\.db)|north\n- field: request.query\n operator: regex_match\n value: (?i)\\b(?:d(?:atabas|b_nam)e[^0-9A-Z_a-z]*\\(|(?:information_schema|m(?:aster\\.\\.sysdatabases|s(?:db|ys(?:ac(?:cess(?:objects|storage|xml)|es)|modules2?|(?:object|querie|relationship)s))|ysql\\.db)|north\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"}
36
+ {"input": "CRS SQLi Rule 942151: SQL Injection Attack: SQL function name detected", "output": "id: safeline-942151\nname: 'SQL Injection Attack: SQL function name detected'\ndescription: 'Converted from CRS Rule 942151: SQL Injection Attack: SQL function name\n detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)\\b(?:a(?:dd(?:dat|tim)e|es_(?:de|en)crypt|s(?:cii(?:str)?|in)|tan2?)|b(?:enchmark|i(?:n_to_num|t_(?:and|count|length|x?or)))|c(?:har(?:acter)?_length|eil(?:ing)?|o(?:alesce|ercibility|llation|(?:m\n- field: request.query\n operator: regex_match\n value: (?i)\\b(?:a(?:dd(?:dat|tim)e|es_(?:de|en)crypt|s(?:cii(?:str)?|in)|tan2?)|b(?:enchmark|i(?:n_to_num|t_(?:and|count|length|x?or)))|c(?:har(?:acter)?_length|eil(?:ing)?|o(?:alesce|ercibility|llation|(?:m\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"}
37
+ {"input": "CRS SQLi Rule 942160: Detects blind sqli tests using sleep() or benchmark()", "output": "id: safeline-942160\nname: Detects blind sqli tests using sleep() or benchmark()\ndescription: 'Converted from CRS Rule 942160: Detects blind sqli tests using sleep()\n or benchmark()'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i:sleep\\s*?\\(.*?\\)|benchmark\\s*?\\(.*?\\,.*?\\))\n- field: request.path\n operator: regex_match\n value: (?i:sleep\\s*?\\(.*?\\)|benchmark\\s*?\\(.*?\\,.*?\\))\n- field: request.query\n operator: regex_match\n value: (?i:sleep\\s*?\\(.*?\\)|benchmark\\s*?\\(.*?\\,.*?\\))\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- path\n- query"}
38
+ {"input": "CRS SQLi Rule 942170: Detects SQL benchmark and sleep injection attempts including conditional queries", "output": "id: safeline-942170\nname: Detects SQL benchmark and sleep injection attempts including conditional queries\ndescription: 'Converted from CRS Rule 942170: Detects SQL benchmark and sleep injection\n attempts including conditional queries'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)(?:select|;)[\\s\\x0b]+(?:benchmark|if|sleep)[\\s\\x0b]*?\\([\\s\\x0b]*?\\(?[\\s\\x0b]*?[0-9A-Z_a-z]+\n- field: request.query\n operator: regex_match\n value: (?i)(?:select|;)[\\s\\x0b]+(?:benchmark|if|sleep)[\\s\\x0b]*?\\([\\s\\x0b]*?\\(?[\\s\\x0b]*?[0-9A-Z_a-z]+\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"}
39
+ {"input": "CRS SQLi Rule 942190: Detects MSSQL code execution and information gathering attempts", "output": "id: safeline-942190\nname: Detects MSSQL code execution and information gathering attempts\ndescription: 'Converted from CRS Rule 942190: Detects MSSQL code execution and information\n gathering attempts'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)union.*select\n- field: request.query\n operator: regex_match\n value: (?i)union.*select\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"}
40
+ {"input": "CRS SQLi Rule 942220: Looking for integer overflow attacks, these are taken from skipfish, except 2.2.2250738585072011e-308 is the \\\"magic number\\\" crash", "output": "id: safeline-942220\nname: Looking for integer overflow attacks, these are taken from skipfish, except\n 2.2.2250738585072011e-308 is the \\\"magic number\\\" crash\ndescription: 'Converted from CRS Rule 942220: Looking for integer overflow attacks,\n these are taken from skipfish, except 2.2.2250738585072011e-308 is the \\\"magic number\\\"\n crash'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: ^(?i:-0000023456|4294967295|4294967296|2147483648|2147483647|0000012345|-2147483648|-2147483649|0000023456|2.2250738585072007e-308|2.2250738585072011e-308|1e309)$\n- field: request.query\n operator: regex_match\n value: ^(?i:-0000023456|4294967295|4294967296|2147483648|2147483647|0000012345|-2147483648|-2147483649|0000023456|2.2250738585072007e-308|2.2250738585072011e-308|1e309)$\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"}
41
+ {"input": "CRS SQLi Rule 942230: Detects conditional SQL injection attempts", "output": "id: safeline-942230\nname: Detects conditional SQL injection attempts\ndescription: 'Converted from CRS Rule 942230: Detects conditional SQL injection attempts'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)[\\s\\x0b\\(\\)]case[\\s\\x0b]+when.*?then|\\)[\\s\\x0b]*?like[\\s\\x0b]*?\\(|select.*?having[\\s\\x0b]*?[^\\s\\x0b]+[\\s\\x0b]*?[^\\s\\x0b0-9A-Z_a-z]|if[\\s\\x0b]?\\([0-9A-Z_a-z]+[\\s\\x0b]*?[<->~]\n- field: request.query\n operator: regex_match\n value: (?i)[\\s\\x0b\\(\\)]case[\\s\\x0b]+when.*?then|\\)[\\s\\x0b]*?like[\\s\\x0b]*?\\(|select.*?having[\\s\\x0b]*?[^\\s\\x0b]+[\\s\\x0b]*?[^\\s\\x0b0-9A-Z_a-z]|if[\\s\\x0b]?\\([0-9A-Z_a-z]+[\\s\\x0b]*?[<->~]\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"}
42
+ {"input": "CRS SQLi Rule 942240: Detects MySQL charset switch and MSSQL DoS attempts", "output": "id: safeline-942240\nname: Detects MySQL charset switch and MSSQL DoS attempts\ndescription: 'Converted from CRS Rule 942240: Detects MySQL charset switch and MSSQL\n DoS attempts'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)alter[\\s\\x0b]*?[0-9A-Z_a-z]+.*?char(?:acter)?[\\s\\x0b]+set[\\s\\x0b]+[0-9A-Z_a-z]+|[\\\"'`](?:;*?[\\s\\x0b]*?waitfor[\\s\\x0b]+(?:time|delay)[\\s\\x0b]+[\\\"'`]|;.*?:[\\s\\x0b]*?goto)\n- field: request.query\n operator: regex_match\n value: (?i)alter[\\s\\x0b]*?[0-9A-Z_a-z]+.*?char(?:acter)?[\\s\\x0b]+set[\\s\\x0b]+[0-9A-Z_a-z]+|[\\\"'`](?:;*?[\\s\\x0b]*?waitfor[\\s\\x0b]+(?:time|delay)[\\s\\x0b]+[\\\"'`]|;.*?:[\\s\\x0b]*?goto)\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"}
43
+ {"input": "CRS SQLi Rule 942250: Detects MATCH AGAINST, MERGE and EXECUTE IMMEDIATE injections", "output": "id: safeline-942250\nname: Detects MATCH AGAINST, MERGE and EXECUTE IMMEDIATE injections\ndescription: 'Converted from CRS Rule 942250: Detects MATCH AGAINST, MERGE and EXECUTE\n IMMEDIATE injections'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i:merge.*?using\\s*?\\(|execute\\s*?immediate\\s*?[\\\"'`]|match\\s*?[\\w(),+-]+\\s*?against\\s*?\\()\n- field: request.query\n operator: regex_match\n value: (?i:merge.*?using\\s*?\\(|execute\\s*?immediate\\s*?[\\\"'`]|match\\s*?[\\w(),+-]+\\s*?against\\s*?\\()\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"}
44
+ {"input": "CRS SQLi Rule 942270: Looking for basic sql injection. Common attack string for mysql, oracle and others", "output": "id: safeline-942270\nname: Looking for basic sql injection. Common attack string for mysql, oracle and\n others\ndescription: 'Converted from CRS Rule 942270: Looking for basic sql injection. Common\n attack string for mysql, oracle and others'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)union.*?select.*?from\n- field: request.query\n operator: regex_match\n value: (?i)union.*?select.*?from\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"}
45
+ {"input": "CRS SQLi Rule 942280: Detects Postgres pg_sleep injection, waitfor delay attacks and database shutdown attempts", "output": "id: safeline-942280\nname: Detects Postgres pg_sleep injection, waitfor delay attacks and database shutdown\n attempts\ndescription: 'Converted from CRS Rule 942280: Detects Postgres pg_sleep injection,\n waitfor delay attacks and database shutdown attempts'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)select[\\s\\x0b]*?pg_sleep|waitfor[\\s\\x0b]*?delay[\\s\\x0b]?[\\\"'`]+[\\s\\x0b]?[0-9]|;[\\s\\x0b]*?shutdown[\\s\\x0b]*?(?:[#;\\{]|/\\*|--)\n- field: request.header\n operator: regex_match\n value: (?i)select[\\s\\x0b]*?pg_sleep|waitfor[\\s\\x0b]*?delay[\\s\\x0b]?[\\\"'`]+[\\s\\x0b]?[0-9]|;[\\s\\x0b]*?shutdown[\\s\\x0b]*?(?:[#;\\{]|/\\*|--)\n- field: request.query\n operator: regex_match\n value: (?i)select[\\s\\x0b]*?pg_sleep|waitfor[\\s\\x0b]*?delay[\\s\\x0b]?[\\\"'`]+[\\s\\x0b]?[0-9]|;[\\s\\x0b]*?shutdown[\\s\\x0b]*?(?:[#;\\{]|/\\*|--)\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- header\n- query"}
46
+ {"input": "CRS SQLi Rule 942290: Finds basic MongoDB SQL injection attempts", "output": "id: safeline-942290\nname: Finds basic MongoDB SQL injection attempts\ndescription: 'Converted from CRS Rule 942290: Finds basic MongoDB SQL injection attempts'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)\\[?\\$(?:a(?:bs|c(?:cumulator|osh?)|dd(?:ToSet)?|ll(?:ElementsTrue)?|n(?:d|yElementTrue)|rray(?:ElemA|ToObjec)t|sinh?|tan[2h]?|vg)|b(?:etween|i(?:narySize|t(?:And|Not|(?:O|Xo)r)?)|ottomN?|sonSize|u\n- field: request.query\n operator: regex_match\n value: (?i)\\[?\\$(?:a(?:bs|c(?:cumulator|osh?)|dd(?:ToSet)?|ll(?:ElementsTrue)?|n(?:d|yElementTrue)|rray(?:ElemA|ToObjec)t|sinh?|tan[2h]?|vg)|b(?:etween|i(?:narySize|t(?:And|Not|(?:O|Xo)r)?)|ottomN?|sonSize|u\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"}
47
+ {"input": "CRS SQLi Rule 942320: Detects MySQL and PostgreSQL stored procedure/function injections", "output": "id: safeline-942320\nname: Detects MySQL and PostgreSQL stored procedure/function injections\ndescription: 'Converted from CRS Rule 942320: Detects MySQL and PostgreSQL stored\n procedure/function injections'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)create[\\s\\x0b]+(?:function|procedure)[\\s\\x0b]*?[0-9A-Z_a-z]+[\\s\\x0b]*?\\([\\s\\x0b]*?\\)[\\s\\x0b]*?-|d(?:eclare[^0-9A-Z_a-z]+[#@][\\s\\x0b]*?[0-9A-Z_a-z]+|iv[\\s\\x0b]*?\\([\\+\\-]*[\\s\\x0b\\.0-9]+,[\\+\\-]*[\\s\\x\n- field: request.query\n operator: regex_match\n value: (?i)create[\\s\\x0b]+(?:function|procedure)[\\s\\x0b]*?[0-9A-Z_a-z]+[\\s\\x0b]*?\\([\\s\\x0b]*?\\)[\\s\\x0b]*?-|d(?:eclare[^0-9A-Z_a-z]+[#@][\\s\\x0b]*?[0-9A-Z_a-z]+|iv[\\s\\x0b]*?\\([\\+\\-]*[\\s\\x0b\\.0-9]+,[\\+\\-]*[\\s\\x\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"}
48
+ {"input": "CRS SQLi Rule 942350: Detects MySQL UDF injection and other data/structure manipulation attempts", "output": "id: safeline-942350\nname: Detects MySQL UDF injection and other data/structure manipulation attempts\ndescription: 'Converted from CRS Rule 942350: Detects MySQL UDF injection and other\n data/structure manipulation attempts'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)create[\\s\\x0b]+function[\\s\\x0b].+[\\s\\x0b]returns|;[\\s\\x0b]*?(?:alter|(?:(?:cre|trunc|upd)at|renam)e|d(?:e(?:lete|sc)|rop)|(?:inser|selec)t|load)\\b[\\s\\x0b]*?[\\(\\[]?[0-9A-Z_a-z]{2,}\n- field: request.query\n operator: regex_match\n value: (?i)create[\\s\\x0b]+function[\\s\\x0b].+[\\s\\x0b]returns|;[\\s\\x0b]*?(?:alter|(?:(?:cre|trunc|upd)at|renam)e|d(?:e(?:lete|sc)|rop)|(?:inser|selec)t|load)\\b[\\s\\x0b]*?[\\(\\[]?[0-9A-Z_a-z]{2,}\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"}
49
+ {"input": "CRS SQLi Rule 942360: Detects concatenated basic SQL injection and SQLLFI attempts", "output": "id: safeline-942360\nname: Detects concatenated basic SQL injection and SQLLFI attempts\ndescription: 'Converted from CRS Rule 942360: Detects concatenated basic SQL injection\n and SQLLFI attempts'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)\\b(?:(?:alter|(?:(?:cre|trunc|upd)at|renam)e|de(?:lete|sc)|(?:inser|selec)t|load)[\\s\\x0b]+(?:char|group_concat|load_file)\\b[\\s\\x0b]*\\(?|end[\\s\\x0b]*?\\);)|[\\s\\x0b\\(]load_file[\\s\\x0b]*?\\(|[\\\"'`][\\s\\\n- field: request.query\n operator: regex_match\n value: (?i)\\b(?:(?:alter|(?:(?:cre|trunc|upd)at|renam)e|de(?:lete|sc)|(?:inser|selec)t|load)[\\s\\x0b]+(?:char|group_concat|load_file)\\b[\\s\\x0b]*\\(?|end[\\s\\x0b]*?\\);)|[\\s\\x0b\\(]load_file[\\s\\x0b]*?\\(|[\\\"'`][\\s\\\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"}
50
+ {"input": "CRS SQLi Rule 942500: MySQL in-line comment detected", "output": "id: safeline-942500\nname: MySQL in-line comment detected\ndescription: 'Converted from CRS Rule 942500: MySQL in-line comment detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)/\\*[\\s\\x0b]*?[!\\+](?:[\\s\\x0b\\(\\)\\-0-9=A-Z_a-z]+)?\\*/\n- field: request.query\n operator: regex_match\n value: (?i)/\\*[\\s\\x0b]*?[!\\+](?:[\\s\\x0b\\(\\)\\-0-9=A-Z_a-z]+)?\\*/\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"}
51
+ {"input": "CRS SQLi Rule 942540: SQL Authentication bypass (split query)", "output": "id: safeline-942540\nname: SQL Authentication bypass (split query)\ndescription: 'Converted from CRS Rule 942540: SQL Authentication bypass (split query)'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: ^(?:[^']*'|[^\\\"]*\\\"|[^`]*`)[\\s\\x0b]*;\n- field: request.query\n operator: regex_match\n value: ^(?:[^']*'|[^\\\"]*\\\"|[^`]*`)[\\s\\x0b]*;\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"}
52
+ {"input": "CRS SQLi Rule 942560: MySQL Scientific Notation payload detected", "output": "id: safeline-942560\nname: MySQL Scientific Notation payload detected\ndescription: 'Converted from CRS Rule 942560: MySQL Scientific Notation payload detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)1\\.e(?:[\\(\\),]|\\.[\\$0-9A-Z_a-z])\n- field: request.query\n operator: regex_match\n value: (?i)1\\.e(?:[\\(\\),]|\\.[\\$0-9A-Z_a-z])\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"}
53
+ {"input": "CRS SQLi Rule 942550: JSON-Based SQL Injection", "output": "id: safeline-942550\nname: JSON-Based SQL Injection\ndescription: 'Converted from CRS Rule 942550: JSON-Based SQL Injection'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)[\\\"'`][\\[\\{][^#\\]\\}]*[\\]\\}]+[\\\"'`]|(?:[\\-@]>?|<@|@[\\?@]|\\?(?:(?:)|&|\\|#>)|#(?:>>|-)|->>|[<>])[\\\"'`](?:[\\[\\{][^#\\]\\}]*[\\]\\}]+[\\\"'`]|\\$[\\.\\[])|\\bjson_extract\\b[^\\(]*\\([^\\)]*\\)\n- field: request.path\n operator: regex_match\n value: (?i)[\\\"'`][\\[\\{][^#\\]\\}]*[\\]\\}]+[\\\"'`]|(?:[\\-@]>?|<@|@[\\?@]|\\?(?:(?:)|&|\\|#>)|#(?:>>|-)|->>|[<>])[\\\"'`](?:[\\[\\{][^#\\]\\}]*[\\]\\}]+[\\\"'`]|\\$[\\.\\[])|\\bjson_extract\\b[^\\(]*\\([^\\)]*\\)\n- field: request.query\n operator: regex_match\n value: (?i)[\\\"'`][\\[\\{][^#\\]\\}]*[\\]\\}]+[\\\"'`]|(?:[\\-@]>?|<@|@[\\?@]|\\?(?:(?:)|&|\\|#>)|#(?:>>|-)|->>|[<>])[\\\"'`](?:[\\[\\{][^#\\]\\}]*[\\]\\}]+[\\\"'`]|\\$[\\.\\[])|\\bjson_extract\\b[^\\(]*\\([^\\)]*\\)\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- path\n- query"}
54
+ {"input": "CRS SQLi Rule 942120: SQL Injection Attack: SQL Operator Detected", "output": "id: safeline-942120\nname: 'SQL Injection Attack: SQL Operator Detected'\ndescription: 'Converted from CRS Rule 942120: SQL Injection Attack: SQL Operator Detected'\nrule_type: regex\nconditions:\n- field: request.path\n operator: regex_match\n value: (?i)[!=]=|&&|\\|\\||->|>[=>]|<(?:[<=]|>(?:[\\s\\x0b]+binary)?)|\\b(?:(?:xor|r(?:egexp|like)|i(?:snull|like)|notnull)\\b|collate(?:[^0-9A-Z_a-z]*?(?:U&)?[\\\"'`]|[^0-9A-Z_a-z]+(?:(?:binary|nocase|rtrim)\\b|[0-9\n- field: request.query\n operator: regex_match\n value: (?i)[!=]=|&&|\\|\\||->|>[=>]|<(?:[<=]|>(?:[\\s\\x0b]+binary)?)|\\b(?:(?:xor|r(?:egexp|like)|i(?:snull|like)|notnull)\\b|collate(?:[^0-9A-Z_a-z]*?(?:U&)?[\\\"'`]|[^0-9A-Z_a-z]+(?:(?:binary|nocase|rtrim)\\b|[0-9\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- path\n- query"}
55
+ {"input": "CRS SQLi Rule 942130: SQL Injection Attack: SQL Boolean-based attack detected", "output": "id: safeline-942130\nname: 'SQL Injection Attack: SQL Boolean-based attack detected'\ndescription: 'Converted from CRS Rule 942130: SQL Injection Attack: SQL Boolean-based\n attack detected'\nrule_type: regex\nconditions:\n- field: request.query\n operator: regex_match\n value: (?i)[\\s\\x0b\\\"'-\\)`]*?\\b([0-9A-Z_a-z]+)\\b[\\s\\x0b\\\"'-\\)`]*?(?:=|<=>|(?:sounds[\\s\\x0b]+)?like|glob|r(?:like|egexp))[\\s\\x0b\\\"'-\\)`]*?\\b([0-9A-Z_a-z]+)\\b\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- query"}
56
+ {"input": "CRS SQLi Rule 942131: SQL Injection Attack: SQL Boolean-based attack detected", "output": "id: safeline-942131\nname: 'SQL Injection Attack: SQL Boolean-based attack detected'\ndescription: 'Converted from CRS Rule 942131: SQL Injection Attack: SQL Boolean-based\n attack detected'\nrule_type: regex\nconditions:\n- field: request.query\n operator: regex_match\n value: (?i)[\\s\\x0b\\\"'-\\)`]*?\\b([0-9A-Z_a-z]+)\\b[\\s\\x0b\\\"'-\\)`]*?(?:![<->]|<[=>]?|>=?|\\^|is[\\s\\x0b]+not|not[\\s\\x0b]+(?:like|r(?:like|egexp)))[\\s\\x0b\\\"'-\\)`]*?\\b([0-9A-Z_a-z]+)\\b\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- query"}
57
+ {"input": "CRS SQLi Rule 942150: SQL Injection Attack: SQL function name detected", "output": "id: safeline-942150\nname: 'SQL Injection Attack: SQL function name detected'\ndescription: 'Converted from CRS Rule 942150: SQL Injection Attack: SQL function name\n detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)\\b(?:json(?:_[0-9A-Z_a-z]+)?|a(?:bs|(?:cos|sin)h?|tan[2h]?|vg)|c(?:eil(?:ing)?|h(?:a(?:nges|r(?:set)?)|r)|o(?:alesce|sh?|unt)|ast)|d(?:e(?:grees|fault)|a(?:te|y))|exp|f(?:loor(?:avg)?|ormat|ield)|\n- field: request.query\n operator: regex_match\n value: (?i)\\b(?:json(?:_[0-9A-Z_a-z]+)?|a(?:bs|(?:cos|sin)h?|tan[2h]?|vg)|c(?:eil(?:ing)?|h(?:a(?:nges|r(?:set)?)|r)|o(?:alesce|sh?|unt)|ast)|d(?:e(?:grees|fault)|a(?:te|y))|exp|f(?:loor(?:avg)?|ormat|ield)|\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"}
58
+ {"input": "CRS SQLi Rule 942180: Detects basic SQL authentication bypass attempts 1/3", "output": "id: safeline-942180\nname: Detects basic SQL authentication bypass attempts 1/3\ndescription: 'Converted from CRS Rule 942180: Detects basic SQL authentication bypass\n attempts 1/3'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)(?:/\\*)+[\\\"'`]+[\\s\\x0b]?(?:--|[#\\{]|/\\*)?|[\\\"'`](?:[\\s\\x0b]*(?:(?:x?or|and|div|like|between)[\\s\\x0b\\-0-9A-Z_a-z]+[\\(\\)\\+-\\-<->][\\s\\x0b]*[\\\"'0-9`]|[!=\\|](?:[\\s\\x0b!\\+\\-0-9=]+[^\\[]*[\\\"'\\(`].*|[\\s\\x0\n- field: request.query\n operator: regex_match\n value: (?i)(?:/\\*)+[\\\"'`]+[\\s\\x0b]?(?:--|[#\\{]|/\\*)?|[\\\"'`](?:[\\s\\x0b]*(?:(?:x?or|and|div|like|between)[\\s\\x0b\\-0-9A-Z_a-z]+[\\(\\)\\+-\\-<->][\\s\\x0b]*[\\\"'0-9`]|[!=\\|](?:[\\s\\x0b!\\+\\-0-9=]+[^\\[]*[\\\"'\\(`].*|[\\s\\x0\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"}
59
+ {"input": "CRS SQLi Rule 942200: Detects MySQL comment-/space-obfuscated injections and backtick termination", "output": "id: safeline-942200\nname: Detects MySQL comment-/space-obfuscated injections and backtick termination\ndescription: 'Converted from CRS Rule 942200: Detects MySQL comment-/space-obfuscated\n injections and backtick termination'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i),.*?[\\\"'\\)0-9`-f][\\\"'`](?:[\\\"'`].*?[\\\"'`]|(?:\\r?\\n)?\\z|[^\\\"'`]+)|[^0-9A-Z_a-z]select.+[^0-9A-Z_a-z]*?from|(?:alter|(?:(?:cre|trunc|upd)at|renam)e|d(?:e(?:lete|sc)|rop)|(?:inser|selec)t|load)[\\s\\x0\n- field: request.header\n operator: regex_match\n value: (?i),.*?[\\\"'\\)0-9`-f][\\\"'`](?:[\\\"'`].*?[\\\"'`]|(?:\\r?\\n)?\\z|[^\\\"'`]+)|[^0-9A-Z_a-z]select.+[^0-9A-Z_a-z]*?from|(?:alter|(?:(?:cre|trunc|upd)at|renam)e|d(?:e(?:lete|sc)|rop)|(?:inser|selec)t|load)[\\s\\x0\n- field: request.query\n operator: regex_match\n value: (?i),.*?[\\\"'\\)0-9`-f][\\\"'`](?:[\\\"'`].*?[\\\"'`]|(?:\\r?\\n)?\\z|[^\\\"'`]+)|[^0-9A-Z_a-z]select.+[^0-9A-Z_a-z]*?from|(?:alter|(?:(?:cre|trunc|upd)at|renam)e|d(?:e(?:lete|sc)|rop)|(?:inser|selec)t|load)[\\s\\x0\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- header\n- query"}
60
+ {"input": "CRS SQLi Rule 942210: Detects chained SQL injection attempts 1/2", "output": "id: safeline-942210\nname: Detects chained SQL injection attempts 1/2\ndescription: 'Converted from CRS Rule 942210: Detects chained SQL injection attempts\n 1/2'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)(?:&&|\\|\\||and|between|div|like|n(?:and|ot)|(?:xx?)?or)[\\s\\x0b\\(]+[0-9A-Z_a-z]+[\\s\\x0b\\)]*?[!\\+=]+[\\s\\x0b0-9]*?[\\\"'-\\)=`]|[0-9](?:[\\s\\x0b]*?(?:and|between|div|like|x?or)[\\s\\x0b]*?[0-9]+[\\s\\x0b]*?[\n- field: request.query\n operator: regex_match\n value: (?i)(?:&&|\\|\\||and|between|div|like|n(?:and|ot)|(?:xx?)?or)[\\s\\x0b\\(]+[0-9A-Z_a-z]+[\\s\\x0b\\)]*?[!\\+=]+[\\s\\x0b0-9]*?[\\\"'-\\)=`]|[0-9](?:[\\s\\x0b]*?(?:and|between|div|like|x?or)[\\s\\x0b]*?[0-9]+[\\s\\x0b]*?[\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"}
61
+ {"input": "CRS SQLi Rule 942260: Detects basic SQL authentication bypass attempts 2/3", "output": "id: safeline-942260\nname: Detects basic SQL authentication bypass attempts 2/3\ndescription: 'Converted from CRS Rule 942260: Detects basic SQL authentication bypass\n attempts 2/3'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)[\\\"'`][\\s\\x0b]*?(?:(?:and|n(?:and|ot)|(?:xx?)?or|div|like|between|\\|\\||&&)[\\s\\x0b]+[\\s\\x0b0-9A-Z_a-z]+=[\\s\\x0b]*?[0-9A-Z_a-z]+[\\s\\x0b]*?having[\\s\\x0b]+|like[^0-9A-Z_a-z]*?[\\\"'0-9`])|[0-9A-Z_a-z][\\\n- field: request.query\n operator: regex_match\n value: (?i)[\\\"'`][\\s\\x0b]*?(?:(?:and|n(?:and|ot)|(?:xx?)?or|div|like|between|\\|\\||&&)[\\s\\x0b]+[\\s\\x0b0-9A-Z_a-z]+=[\\s\\x0b]*?[0-9A-Z_a-z]+[\\s\\x0b]*?having[\\s\\x0b]+|like[^0-9A-Z_a-z]*?[\\\"'0-9`])|[0-9A-Z_a-z][\\\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"}
62
+ {"input": "CRS SQLi Rule 942300: Detects MySQL comments, conditions and ch(a)r injections", "output": "id: safeline-942300\nname: Detects MySQL comments, conditions and ch(a)r injections\ndescription: 'Converted from CRS Rule 942300: Detects MySQL comments, conditions and\n ch(a)r injections'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: '(?i)\\)[\\s\\x0b]*?when[\\s\\x0b]*?[0-9]+[\\s\\x0b]*?then|[\\\"''`][\\s\\x0b]*?(?:[#\\{]|--)|/\\*![\\s\\x0b]?[0-9]+|\\b(?:(?:binary|cha?r)[\\s\\x0b]*?\\([\\s\\x0b]*?[0-9]|(?:and|n(?:and|ot)|(?:xx?)?or|div|like|between|r(?:'\n- field: request.query\n operator: regex_match\n value: '(?i)\\)[\\s\\x0b]*?when[\\s\\x0b]*?[0-9]+[\\s\\x0b]*?then|[\\\"''`][\\s\\x0b]*?(?:[#\\{]|--)|/\\*![\\s\\x0b]?[0-9]+|\\b(?:(?:binary|cha?r)[\\s\\x0b]*?\\([\\s\\x0b]*?[0-9]|(?:and|n(?:and|ot)|(?:xx?)?or|div|like|between|r(?:'\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"}
63
+ {"input": "CRS SQLi Rule 942310: Detects chained SQL injection attempts 2/2", "output": "id: safeline-942310\nname: Detects chained SQL injection attempts 2/2\ndescription: 'Converted from CRS Rule 942310: Detects chained SQL injection attempts\n 2/2'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)(?:\\([\\s\\x0b]*?select[\\s\\x0b]*?[0-9A-Z_a-z]+|coalesce|order[\\s\\x0b]+by[\\s\\x0b]+if[0-9A-Z_a-z]*?)[\\s\\x0b]*?\\(|\\*/from|\\+[\\s\\x0b]*?[0-9]+[\\s\\x0b]*?\\+[\\s\\x0b]*?@|[0-9A-Z_a-z][\\\"'`][\\s\\x0b]*?(?:(?:[\\+\n- field: request.query\n operator: regex_match\n value: (?i)(?:\\([\\s\\x0b]*?select[\\s\\x0b]*?[0-9A-Z_a-z]+|coalesce|order[\\s\\x0b]+by[\\s\\x0b]+if[0-9A-Z_a-z]*?)[\\s\\x0b]*?\\(|\\*/from|\\+[\\s\\x0b]*?[0-9]+[\\s\\x0b]*?\\+[\\s\\x0b]*?@|[0-9A-Z_a-z][\\\"'`][\\s\\x0b]*?(?:(?:[\\+\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"}
64
+ {"input": "CRS SQLi Rule 942330: Detects classic SQL injection probings 1/3", "output": "id: safeline-942330\nname: Detects classic SQL injection probings 1/3\ndescription: 'Converted from CRS Rule 942330: Detects classic SQL injection probings\n 1/3'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)[\\\"'`][\\s\\x0b]*?\\b(?:x?or|div|like|between|and)\\b[\\s\\x0b]*?[\\\"'`]?[0-9]|\\x5cx(?:2[37]|3d)|^(?:.?[\\\"'`]$|[\\\"'\\x5c`]*?(?:[\\\"'0-9`]+|[^\\\"'`]+[\\\"'`])[\\s\\x0b]*?\\b(?:and|n(?:and|ot)|(?:xx?)?or|div|like|\n- field: request.query\n operator: regex_match\n value: (?i)[\\\"'`][\\s\\x0b]*?\\b(?:x?or|div|like|between|and)\\b[\\s\\x0b]*?[\\\"'`]?[0-9]|\\x5cx(?:2[37]|3d)|^(?:.?[\\\"'`]$|[\\\"'\\x5c`]*?(?:[\\\"'0-9`]+|[^\\\"'`]+[\\\"'`])[\\s\\x0b]*?\\b(?:and|n(?:and|ot)|(?:xx?)?or|div|like|\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"}
65
+ {"input": "CRS SQLi Rule 942340: Detects basic SQL authentication bypass attempts 3/3", "output": "id: safeline-942340\nname: Detects basic SQL authentication bypass attempts 3/3\ndescription: 'Converted from CRS Rule 942340: Detects basic SQL authentication bypass\n attempts 3/3'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)in[\\s\\x0b]*?\\(+[\\s\\x0b]*?select|(?:(?:and|n(?:and|ot)|(?:xx?)?or|div|like|between)[\\s\\x0b]+|(?:\\|\\||&&)[\\s\\x0b]*?)[\\s\\x0b\\+0-9A-Z_a-z]+(?:regexp[\\s\\x0b]*?\\(|sounds[\\s\\x0b]+like[\\s\\x0b]*?[\\\"'`]|[0-\n- field: request.query\n operator: regex_match\n value: (?i)in[\\s\\x0b]*?\\(+[\\s\\x0b]*?select|(?:(?:and|n(?:and|ot)|(?:xx?)?or|div|like|between)[\\s\\x0b]+|(?:\\|\\||&&)[\\s\\x0b]*?)[\\s\\x0b\\+0-9A-Z_a-z]+(?:regexp[\\s\\x0b]*?\\(|sounds[\\s\\x0b]+like[\\s\\x0b]*?[\\\"'`]|[0-\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"}
66
+ {"input": "CRS SQLi Rule 942361: Detects basic SQL injection based on keyword alter or union", "output": "id: safeline-942361\nname: Detects basic SQL injection based on keyword alter or union\ndescription: 'Converted from CRS Rule 942361: Detects basic SQL injection based on\n keyword alter or union'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i:^[\\W\\d]+\\s*?(?:alter|union)\\b)\n- field: request.query\n operator: regex_match\n value: (?i:^[\\W\\d]+\\s*?(?:alter|union)\\b)\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"}
67
+ {"input": "CRS SQLi Rule 942362: Detects concatenated basic SQL injection and SQLLFI attempts", "output": "id: safeline-942362\nname: Detects concatenated basic SQL injection and SQLLFI attempts\ndescription: 'Converted from CRS Rule 942362: Detects concatenated basic SQL injection\n and SQLLFI attempts'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)(?:alter|(?:(?:cre|trunc|upd)at|renam)e|de(?:lete|sc)|(?:inser|selec)t|load)[\\s\\x0b]+(?:char|group_concat|load_file)[\\s\\x0b]?\\(?|end[\\s\\x0b]*?\\);|[\\s\\x0b\\(]load_file[\\s\\x0b]*?\\(|[\\\"'`][\\s\\x0b]+reg\n- field: request.query\n operator: regex_match\n value: (?i)(?:alter|(?:(?:cre|trunc|upd)at|renam)e|de(?:lete|sc)|(?:inser|selec)t|load)[\\s\\x0b]+(?:char|group_concat|load_file)[\\s\\x0b]?\\(?|end[\\s\\x0b]*?\\);|[\\s\\x0b\\(]load_file[\\s\\x0b]*?\\(|[\\\"'`][\\s\\x0b]+reg\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"}
68
+ {"input": "CRS SQLi Rule 942370: Detects classic SQL injection probings 2/3", "output": "id: safeline-942370\nname: Detects classic SQL injection probings 2/3\ndescription: 'Converted from CRS Rule 942370: Detects classic SQL injection probings\n 2/3'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)[\\\"'`](?:[\\s\\x0b]*?(?:(?:\\*.+(?:x?or|div|like|between|(?:an|i)d)[^0-9A-Z_a-z]*?[\\\"'`]|(?:x?or|div|like|between|and)[\\s\\x0b][^0-9]+[\\-0-9A-Z_a-z]+[^0-9]*)[0-9]|[^\\s\\x0b0-9\\?A-Z_a-z]+[\\s\\x0b]*?[^\\s\\\n- field: request.header\n operator: regex_match\n value: (?i)[\\\"'`](?:[\\s\\x0b]*?(?:(?:\\*.+(?:x?or|div|like|between|(?:an|i)d)[^0-9A-Z_a-z]*?[\\\"'`]|(?:x?or|div|like|between|and)[\\s\\x0b][^0-9]+[\\-0-9A-Z_a-z]+[^0-9]*)[0-9]|[^\\s\\x0b0-9\\?A-Z_a-z]+[\\s\\x0b]*?[^\\s\\\n- field: request.query\n operator: regex_match\n value: (?i)[\\\"'`](?:[\\s\\x0b]*?(?:(?:\\*.+(?:x?or|div|like|between|(?:an|i)d)[^0-9A-Z_a-z]*?[\\\"'`]|(?:x?or|div|like|between|and)[\\s\\x0b][^0-9]+[\\-0-9A-Z_a-z]+[^0-9]*)[0-9]|[^\\s\\x0b0-9\\?A-Z_a-z]+[\\s\\x0b]*?[^\\s\\\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- header\n- query"}
69
+ {"input": "CRS SQLi Rule 942380: SQL Injection Attack", "output": "id: safeline-942380\nname: SQL Injection Attack\ndescription: 'Converted from CRS Rule 942380: SQL Injection Attack'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)\\b(?:having\\b(?:[\\s\\x0b]+(?:[0-9]{1,10}|'[^=]{1,10}')[\\s\\x0b]*?[<->]|\n ?(?:[0-9]{1,10} ?[<->]+|[\\\"'][^=]{1,10}[ \\\"'<-\\?\\[]+))|ex(?:ecute(?:\\(|[\\s\\x0b]{1,5}[\\$\\.0-9A-Z_a-z]{1,5}[\\s\\x0b]{0,3})|ists[\\\n- field: request.query\n operator: regex_match\n value: (?i)\\b(?:having\\b(?:[\\s\\x0b]+(?:[0-9]{1,10}|'[^=]{1,10}')[\\s\\x0b]*?[<->]|\n ?(?:[0-9]{1,10} ?[<->]+|[\\\"'][^=]{1,10}[ \\\"'<-\\?\\[]+))|ex(?:ecute(?:\\(|[\\s\\x0b]{1,5}[\\$\\.0-9A-Z_a-z]{1,5}[\\s\\x0b]{0,3})|ists[\\\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"}
70
+ {"input": "CRS SQLi Rule 942390: SQL Injection Attack", "output": "id: safeline-942390\nname: SQL Injection Attack\ndescription: 'Converted from CRS Rule 942390: SQL Injection Attack'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)\\b(?:or\\b(?:[\\s\\x0b]?(?:[0-9]{1,10}|[\\\"'][^=]{1,10}[\\\"'])[\\s\\x0b]?[<->]+|[\\s\\x0b]+(?:[0-9]{1,10}|'[^=]{1,10}')(?:[\\s\\x0b]*?[<->])?)|xor\\b[\\s\\x0b]+(?:[0-9]{1,10}|'[^=]{1,10}')(?:[\\s\\x0b]*?[<->])?)|\n- field: request.query\n operator: regex_match\n value: (?i)\\b(?:or\\b(?:[\\s\\x0b]?(?:[0-9]{1,10}|[\\\"'][^=]{1,10}[\\\"'])[\\s\\x0b]?[<->]+|[\\s\\x0b]+(?:[0-9]{1,10}|'[^=]{1,10}')(?:[\\s\\x0b]*?[<->])?)|xor\\b[\\s\\x0b]+(?:[0-9]{1,10}|'[^=]{1,10}')(?:[\\s\\x0b]*?[<->])?)|\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"}
71
+ {"input": "CRS SQLi Rule 942400: SQL Injection Attack", "output": "id: safeline-942400\nname: SQL Injection Attack\ndescription: 'Converted from CRS Rule 942400: SQL Injection Attack'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)\\band\\b(?:[\\s\\x0b]+(?:[0-9]{1,10}[\\s\\x0b]*?[<->]|'[^=]{1,10}')| ?(?:[0-9]{1,10}|[\\\"'][^=]{1,10}[\\\"'])\n ?[<->]+)\n- field: request.query\n operator: regex_match\n value: (?i)\\band\\b(?:[\\s\\x0b]+(?:[0-9]{1,10}[\\s\\x0b]*?[<->]|'[^=]{1,10}')| ?(?:[0-9]{1,10}|[\\\"'][^=]{1,10}[\\\"'])\n ?[<->]+)\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"}
72
+ {"input": "CRS SQLi Rule 942410: SQL Injection Attack", "output": "id: safeline-942410\nname: SQL Injection Attack\ndescription: 'Converted from CRS Rule 942410: SQL Injection Attack'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)\\b(?:a(?:(?:b|co)s|dd(?:dat|tim)e|es_(?:de|en)crypt|s(?:in|cii(?:str)?)|tan2?|vg)|b(?:enchmark|i(?:n(?:_to_num)?|t_(?:and|count|length|x?or)))|c(?:ast|h(?:ar(?:(?:acter)?_length|set)?|r)|iel(?:ing\n- field: request.query\n operator: regex_match\n value: (?i)\\b(?:a(?:(?:b|co)s|dd(?:dat|tim)e|es_(?:de|en)crypt|s(?:in|cii(?:str)?)|tan2?|vg)|b(?:enchmark|i(?:n(?:_to_num)?|t_(?:and|count|length|x?or)))|c(?:ast|h(?:ar(?:(?:acter)?_length|set)?|r)|iel(?:ing\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"}
73
+ {"input": "CRS SQLi Rule 942470: SQL Injection Attack", "output": "id: safeline-942470\nname: SQL Injection Attack\ndescription: 'Converted from CRS Rule 942470: SQL Injection Attack'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)autonomous_transaction|(?:current_use|n?varcha|tbcreato)r|db(?:a_users|ms_java)|open(?:owa_util|query|rowset)|s(?:p_(?:(?:addextendedpro|sqlexe)c|execute(?:sql)?|help|is_srvrolemember|makewebtask|\n- field: request.query\n operator: regex_match\n value: (?i)autonomous_transaction|(?:current_use|n?varcha|tbcreato)r|db(?:a_users|ms_java)|open(?:owa_util|query|rowset)|s(?:p_(?:(?:addextendedpro|sqlexe)c|execute(?:sql)?|help|is_srvrolemember|makewebtask|\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"}
74
+ {"input": "CRS SQLi Rule 942480: SQL Injection Attack", "output": "id: safeline-942480\nname: SQL Injection Attack\ndescription: 'Converted from CRS Rule 942480: SQL Injection Attack'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)\\b(?:(?:d(?:bms_[0-9A-Z_a-z]+\\.|elete\\b[^0-9A-Z_a-z]*?\\bfrom)|(?:group\\b.*?\\bby\\b.{1,100}?\\bhav|overlay\\b[^0-9A-Z_a-z]*?\\(.*?\\b[^0-9A-Z_a-z]*?plac)ing|in(?:ner\\b[^0-9A-Z_a-z]*?\\bjoin|sert\\b[^0-9A-\n- field: request.header\n operator: regex_match\n value: (?i)\\b(?:(?:d(?:bms_[0-9A-Z_a-z]+\\.|elete\\b[^0-9A-Z_a-z]*?\\bfrom)|(?:group\\b.*?\\bby\\b.{1,100}?\\bhav|overlay\\b[^0-9A-Z_a-z]*?\\(.*?\\b[^0-9A-Z_a-z]*?plac)ing|in(?:ner\\b[^0-9A-Z_a-z]*?\\bjoin|sert\\b[^0-9A-\n- field: request.query\n operator: regex_match\n value: (?i)\\b(?:(?:d(?:bms_[0-9A-Z_a-z]+\\.|elete\\b[^0-9A-Z_a-z]*?\\bfrom)|(?:group\\b.*?\\bby\\b.{1,100}?\\bhav|overlay\\b[^0-9A-Z_a-z]*?\\(.*?\\b[^0-9A-Z_a-z]*?plac)ing|in(?:ner\\b[^0-9A-Z_a-z]*?\\bjoin|sert\\b[^0-9A-\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- header\n- query"}
75
+ {"input": "CRS SQLi Rule 942430: Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (12)", "output": "id: safeline-942430\nname: 'Restricted SQL Character Anomaly Detection (args): # of special characters\n exceeded (12)'\ndescription: 'Converted from CRS Rule 942430: Restricted SQL Character Anomaly Detection\n (args): # of special characters exceeded (12)'\nrule_type: regex\nconditions:\n- field: request.query\n operator: regex_match\n value: ((?:[~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'´’‘`<>][^~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'´’‘`<>]*?){12})\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- query"}
76
+ {"input": "CRS SQLi Rule 942440: SQL Comment Sequence Detected", "output": "id: safeline-942440\nname: SQL Comment Sequence Detected\ndescription: 'Converted from CRS Rule 942440: SQL Comment Sequence Detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: /\\*!?|\\*/|[';]--|--(?:[\\s\\x0b]|[^\\-]*?-)|[^&\\-]#.*?[\\s\\x0b]|;?\\x00\n- field: request.query\n operator: regex_match\n value: /\\*!?|\\*/|[';]--|--(?:[\\s\\x0b]|[^\\-]*?-)|[^&\\-]#.*?[\\s\\x0b]|;?\\x00\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"}
77
+ {"input": "CRS SQLi Rule 942450: SQL Hex Encoding Identified", "output": "id: safeline-942450\nname: SQL Hex Encoding Identified\ndescription: 'Converted from CRS Rule 942450: SQL Hex Encoding Identified'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i:\\b0x[a-f\\d]{3,})\n- field: request.query\n operator: regex_match\n value: (?i:\\b0x[a-f\\d]{3,})\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"}
78
+ {"input": "CRS SQLi Rule 942510: SQLi bypass attempt by ticks or backticks detected", "output": "id: safeline-942510\nname: SQLi bypass attempt by ticks or backticks detected\ndescription: 'Converted from CRS Rule 942510: SQLi bypass attempt by ticks or backticks\n detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?:`(?:(?:[\\w\\s=_\\-+{}()<@]){2,29}|(?:[A-Za-z0-9+/]{4})+(?:[A-Za-z0-9+/]{2}==|[A-Za-z0-9+/]{3}=)?)`)\n- field: request.query\n operator: regex_match\n value: (?:`(?:(?:[\\w\\s=_\\-+{}()<@]){2,29}|(?:[A-Za-z0-9+/]{4})+(?:[A-Za-z0-9+/]{2}==|[A-Za-z0-9+/]{3}=)?)`)\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"}
79
+ {"input": "CRS SQLi Rule 942520: Detects basic SQL authentication bypass attempts 4.0/4", "output": "id: safeline-942520\nname: Detects basic SQL authentication bypass attempts 4.0/4\ndescription: 'Converted from CRS Rule 942520: Detects basic SQL authentication bypass\n attempts 4.0/4'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)[\\\"'`][\\s\\x0b]*?(?:(?:is[\\s\\x0b]+not|not[\\s\\x0b]+(?:like|glob|(?:betwee|i)n|null|regexp|match)|mod|div|sounds[\\s\\x0b]+like)\\b|[%&\\*\\+\\-/<->\\^\\|]{1,3})\n- field: request.query\n operator: regex_match\n value: (?i)[\\\"'`][\\s\\x0b]*?(?:(?:is[\\s\\x0b]+not|not[\\s\\x0b]+(?:like|glob|(?:betwee|i)n|null|regexp|match)|mod|div|sounds[\\s\\x0b]+like)\\b|[%&\\*\\+\\-/<->\\^\\|]{1,3})\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"}
80
+ {"input": "CRS SQLi Rule 942521: Detects basic SQL authentication bypass attempts 4.1/4", "output": "id: safeline-942521\nname: Detects basic SQL authentication bypass attempts 4.1/4\ndescription: 'Converted from CRS Rule 942521: Detects basic SQL authentication bypass\n attempts 4.1/4'\nrule_type: regex\nconditions:\n- field: request.header\n operator: regex_match\n value: (?i)^(?:[^']*?(?:'[^']*?'[^']*?)*?'|[^\\\"]*?(?:\\\"[^\\\"]*?\\\"[^\\\"]*?)*?\\\"|[^`]*?(?:`[^`]*?`[^`]*?)*?`)[\\s\\x0b]*([0-9A-Z_a-z]+)\\b\n- field: request.query\n operator: regex_match\n value: (?i)^(?:[^']*?(?:'[^']*?'[^']*?)*?'|[^\\\"]*?(?:\\\"[^\\\"]*?\\\"[^\\\"]*?)*?\\\"|[^`]*?(?:`[^`]*?`[^`]*?)*?`)[\\s\\x0b]*([0-9A-Z_a-z]+)\\b\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- header\n- query"}
81
+ {"input": "CRS SQLi Rule 942522: Detects basic SQL authentication bypass attempts 4.1/4", "output": "id: safeline-942522\nname: Detects basic SQL authentication bypass attempts 4.1/4\ndescription: 'Converted from CRS Rule 942522: Detects basic SQL authentication bypass\n attempts 4.1/4'\nrule_type: regex\nconditions:\n- field: request.query\n operator: regex_match\n value: ^.*?\\x5c['\\\"`](?:.*?['\\\"`])?\\s*(?:and|or)\\b\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- query"}
82
+ {"input": "CRS SQLi Rule 942101: SQL Injection Attack Detected via libinjection", "output": "id: safeline-942101\nname: SQL Injection Attack Detected via libinjection\ndescription: 'Converted from CRS Rule 942101: SQL Injection Attack Detected via libinjection'\nrule_type: semantic\nconditions:\n- field: request.path\n operator: semantic_match\n semantic_type: sqli\n threshold: 0.8\naction: block\nseverity: critical\ntags:\n- sqli\n- injection\n- database\nsemantic_type: sqli\ntargets:\n- path"}
83
+ {"input": "CRS SQLi Rule 942152: SQL Injection Attack: SQL function name detected", "output": "id: safeline-942152\nname: 'SQL Injection Attack: SQL function name detected'\ndescription: 'Converted from CRS Rule 942152: SQL Injection Attack: SQL function name\n detected'\nrule_type: regex\nconditions:\n- field: request.header\n operator: regex_match\n value: (?i)\\b(?:a(?:dd(?:dat|tim)e|es_(?:de|en)crypt|s(?:cii(?:str)?|in)|tan2?)|b(?:enchmark|i(?:n_to_num|t_(?:and|count|length|x?or)))|c(?:har(?:acter)?_length|eil(?:ing)?|o(?:alesce|ercibility|llation|(?:m\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- header"}
84
+ {"input": "CRS SQLi Rule 942321: Detects MySQL and PostgreSQL stored procedure/function injections", "output": "id: safeline-942321\nname: Detects MySQL and PostgreSQL stored procedure/function injections\ndescription: 'Converted from CRS Rule 942321: Detects MySQL and PostgreSQL stored\n procedure/function injections'\nrule_type: regex\nconditions:\n- field: request.header\n operator: regex_match\n value: (?i)create[\\s\\x0b]+(?:function|procedure)[\\s\\x0b]*?[0-9A-Z_a-z]+[\\s\\x0b]*?\\([\\s\\x0b]*?\\)[\\s\\x0b]*?-|d(?:eclare[^0-9A-Z_a-z]+[#@][\\s\\x0b]*?[0-9A-Z_a-z]+|iv[\\s\\x0b]*?\\([\\+\\-]*[\\s\\x0b\\.0-9]+,[\\+\\-]*[\\s\\x\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- header"}
85
+ {"input": "CRS SQLi Rule 942251: Detects HAVING injections", "output": "id: safeline-942251\nname: Detects HAVING injections\ndescription: 'Converted from CRS Rule 942251: Detects HAVING injections'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?i)\\W+\\d*?\\s*?\\bhaving\\b\\s*?[^\\s\\-]\n- field: request.query\n operator: regex_match\n value: (?i)\\W+\\d*?\\s*?\\bhaving\\b\\s*?[^\\s\\-]\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"}
86
+ {"input": "CRS SQLi Rule 942490: Detects classic SQL injection probings 3/3", "output": "id: safeline-942490\nname: Detects classic SQL injection probings 3/3\ndescription: 'Converted from CRS Rule 942490: Detects classic SQL injection probings\n 3/3'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: '[\\\"''`][\\s\\d]*?[^\\w\\s]\\W*?\\d\\W*?.*?[\\\"''`\\d]'\n- field: request.query\n operator: regex_match\n value: '[\\\"''`][\\s\\d]*?[^\\w\\s]\\W*?\\d\\W*?.*?[\\\"''`\\d]'\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"}
87
+ {"input": "CRS SQLi Rule 942420: Restricted SQL Character Anomaly Detection (cookies): # of special characters exceeded (8)", "output": "id: safeline-942420\nname: 'Restricted SQL Character Anomaly Detection (cookies): # of special characters\n exceeded (8)'\ndescription: 'Converted from CRS Rule 942420: Restricted SQL Character Anomaly Detection\n (cookies): # of special characters exceeded (8)'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: ((?:[~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'´’‘`<>][^~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'´’‘`<>]*?){8})\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie"}
88
+ {"input": "CRS SQLi Rule 942431: Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (6)", "output": "id: safeline-942431\nname: 'Restricted SQL Character Anomaly Detection (args): # of special characters\n exceeded (6)'\ndescription: 'Converted from CRS Rule 942431: Restricted SQL Character Anomaly Detection\n (args): # of special characters exceeded (6)'\nrule_type: regex\nconditions:\n- field: request.query\n operator: regex_match\n value: ((?:[~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'´’‘`<>][^~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'´’‘`<>]*?){6})\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- query"}
89
+ {"input": "CRS SQLi Rule 942460: Meta-Character Anomaly Detection Alert - Repetitive Non-Word Characters", "output": "id: safeline-942460\nname: Meta-Character Anomaly Detection Alert - Repetitive Non-Word Characters\ndescription: 'Converted from CRS Rule 942460: Meta-Character Anomaly Detection Alert\n - Repetitive Non-Word Characters'\nrule_type: regex\nconditions:\n- field: request.query\n operator: regex_match\n value: \\W{4}\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- query"}
90
+ {"input": "CRS SQLi Rule 942511: SQLi bypass attempt by ticks detected", "output": "id: safeline-942511\nname: SQLi bypass attempt by ticks detected\ndescription: 'Converted from CRS Rule 942511: SQLi bypass attempt by ticks detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: (?:'(?:(?:[\\w\\s=_\\-+{}()<@]){2,29}|(?:[A-Za-z0-9+/]{4})+(?:[A-Za-z0-9+/]{2}==|[A-Za-z0-9+/]{3}=)?)')\n- field: request.query\n operator: regex_match\n value: (?:'(?:(?:[\\w\\s=_\\-+{}()<@]){2,29}|(?:[A-Za-z0-9+/]{4})+(?:[A-Za-z0-9+/]{2}==|[A-Za-z0-9+/]{3}=)?)')\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"}
91
+ {"input": "CRS SQLi Rule 942530: SQLi query termination detected", "output": "id: safeline-942530\nname: SQLi query termination detected\ndescription: 'Converted from CRS Rule 942530: SQLi query termination detected'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: ''';'\n- field: request.query\n operator: regex_match\n value: ''';'\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie\n- query"}
92
+ {"input": "CRS SQLi Rule 942421: Restricted SQL Character Anomaly Detection (cookies): # of special characters exceeded (3)", "output": "id: safeline-942421\nname: 'Restricted SQL Character Anomaly Detection (cookies): # of special characters\n exceeded (3)'\ndescription: 'Converted from CRS Rule 942421: Restricted SQL Character Anomaly Detection\n (cookies): # of special characters exceeded (3)'\nrule_type: regex\nconditions:\n- field: request.cookie\n operator: regex_match\n value: ((?:[~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'´’‘`<>][^~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'´’‘`<>]*?){3})\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- cookie"}
93
+ {"input": "CRS SQLi Rule 942432: Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (2)", "output": "id: safeline-942432\nname: 'Restricted SQL Character Anomaly Detection (args): # of special characters\n exceeded (2)'\ndescription: 'Converted from CRS Rule 942432: Restricted SQL Character Anomaly Detection\n (args): # of special characters exceeded (2)'\nrule_type: regex\nconditions:\n- field: request.query\n operator: regex_match\n value: ((?:[~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'´’‘`<>][^~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'´’‘`<>]*?){2})\naction: block\nseverity: medium\ntags:\n- sqli\n- injection\n- database\ntargets:\n- query"}