@abtnode/router-provider 1.16.46-beta-20250703-024219-4029ee97 → 1.16.46-beta-20250704-234926-09d872ad
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/lib/nginx/includes/security/crs4/rules/REQUEST-900-EXCLUSION-RULES-BEFORE-CRS.conf +1 -1
- package/lib/nginx/includes/security/crs4/rules/REQUEST-901-INITIALIZATION.conf +42 -40
- package/lib/nginx/includes/security/crs4/rules/REQUEST-905-COMMON-EXCEPTIONS.conf +4 -4
- package/lib/nginx/includes/security/crs4/rules/REQUEST-911-METHOD-ENFORCEMENT.conf +12 -11
- package/lib/nginx/includes/security/crs4/rules/REQUEST-913-SCANNER-DETECTION.conf +12 -11
- package/lib/nginx/includes/security/crs4/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf +127 -148
- package/lib/nginx/includes/security/crs4/rules/REQUEST-921-PROTOCOL-ATTACK.conf +80 -35
- package/lib/nginx/includes/security/crs4/rules/REQUEST-922-MULTIPART-ATTACK.conf +12 -6
- package/lib/nginx/includes/security/crs4/rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf +22 -17
- package/lib/nginx/includes/security/crs4/rules/REQUEST-931-APPLICATION-ATTACK-RFI.conf +20 -15
- package/lib/nginx/includes/security/crs4/rules/REQUEST-932-APPLICATION-ATTACK-RCE.conf +254 -86
- package/lib/nginx/includes/security/crs4/rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf +172 -65
- package/lib/nginx/includes/security/crs4/rules/REQUEST-934-APPLICATION-ATTACK-GENERIC.conf +65 -29
- package/lib/nginx/includes/security/crs4/rules/REQUEST-941-APPLICATION-ATTACK-XSS.conf +114 -78
- package/lib/nginx/includes/security/crs4/rules/REQUEST-942-APPLICATION-ATTACK-SQLI.conf +182 -120
- package/lib/nginx/includes/security/crs4/rules/REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION.conf +19 -16
- package/lib/nginx/includes/security/crs4/rules/REQUEST-944-APPLICATION-ATTACK-JAVA.conf +48 -34
- package/lib/nginx/includes/security/crs4/rules/REQUEST-949-BLOCKING-EVALUATION.conf +30 -30
- package/lib/nginx/includes/security/crs4/rules/RESPONSE-950-DATA-LEAKAGES.conf +20 -15
- package/lib/nginx/includes/security/crs4/rules/RESPONSE-951-DATA-LEAKAGES-SQL.conf +47 -29
- package/lib/nginx/includes/security/crs4/rules/RESPONSE-952-DATA-LEAKAGES-JAVA.conf +15 -36
- package/lib/nginx/includes/security/crs4/rules/RESPONSE-953-DATA-LEAKAGES-PHP.conf +20 -15
- package/lib/nginx/includes/security/crs4/rules/RESPONSE-954-DATA-LEAKAGES-IIS.conf +22 -17
- package/lib/nginx/includes/security/crs4/rules/RESPONSE-955-WEB-SHELLS.conf +92 -43
- package/lib/nginx/includes/security/crs4/rules/RESPONSE-959-BLOCKING-EVALUATION.conf +30 -30
- package/lib/nginx/includes/security/crs4/rules/RESPONSE-980-CORRELATION.conf +23 -23
- package/lib/nginx/includes/security/crs4/rules/java-classes.data +11 -0
- package/lib/nginx/includes/security/crs4/rules/lfi-os-files.data +227 -15
- package/lib/nginx/includes/security/crs4/rules/php-function-names-933150.data +0 -7
- package/lib/nginx/includes/security/crs4/rules/restricted-files.data +250 -29
- package/lib/nginx/includes/security/crs4/rules/restricted-upload.data +200 -26
- package/lib/nginx/includes/security/crs4/rules/unix-shell-builtins.data +20 -0
- package/lib/nginx/includes/security/crs4/rules/unix-shell.data +39 -18
- package/lib/nginx/includes/security/crs4/rules/web-shells-asp.data +23 -0
- package/package.json +9 -9
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
# ------------------------------------------------------------------------
|
|
2
|
-
# OWASP CRS ver.4.
|
|
2
|
+
# OWASP CRS ver.4.16.0
|
|
3
3
|
# Copyright (c) 2006-2020 Trustwave and contributors. All rights reserved.
|
|
4
|
-
# Copyright (c) 2021-
|
|
4
|
+
# Copyright (c) 2021-2025 CRS project. All rights reserved.
|
|
5
5
|
#
|
|
6
6
|
# The OWASP CRS is distributed under
|
|
7
7
|
# Apache Software License (ASL) version 2
|
|
@@ -28,7 +28,8 @@ SecRule TX:crs_skip_response_analysis "@eq 1" \
|
|
|
28
28
|
pass,\
|
|
29
29
|
nolog,\
|
|
30
30
|
tag:'OWASP_CRS',\
|
|
31
|
-
|
|
31
|
+
tag:'OWASP_CRS/DATA-LEAKAGES',\
|
|
32
|
+
ver:'OWASP_CRS/4.16.0',\
|
|
32
33
|
skipAfter:END-RESPONSE-959-BLOCKING-EVALUATION"
|
|
33
34
|
|
|
34
35
|
# Skip all rules if RESPONSE_BODY is compressed.
|
|
@@ -38,11 +39,12 @@ SecRule RESPONSE_HEADERS:Content-Encoding "@pm gzip compress deflate br zstd" \
|
|
|
38
39
|
pass,\
|
|
39
40
|
nolog,\
|
|
40
41
|
tag:'OWASP_CRS',\
|
|
41
|
-
|
|
42
|
+
tag:'OWASP_CRS/DATA-LEAKAGES',\
|
|
43
|
+
ver:'OWASP_CRS/4.16.0',\
|
|
42
44
|
skipAfter:END-RESPONSE-950-DATA-LEAKAGES"
|
|
43
45
|
|
|
44
|
-
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 1" "id:950011,phase:3,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.
|
|
45
|
-
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 1" "id:950012,phase:4,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.
|
|
46
|
+
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 1" "id:950011,phase:3,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.16.0',skipAfter:END-RESPONSE-950-DATA-LEAKAGES"
|
|
47
|
+
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 1" "id:950012,phase:4,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.16.0',skipAfter:END-RESPONSE-950-DATA-LEAKAGES"
|
|
46
48
|
#
|
|
47
49
|
# -= Paranoia Level 1 (default) =- (apply only when tx.detection_paranoia_level is sufficiently high: 1 or higher)
|
|
48
50
|
#
|
|
@@ -64,9 +66,10 @@ SecRule RESPONSE_BODY "@rx (?:<(?:TITLE>Index of.*?<H|title>Index of.*?<h)1>Inde
|
|
|
64
66
|
tag:'attack-disclosure',\
|
|
65
67
|
tag:'paranoia-level/1',\
|
|
66
68
|
tag:'OWASP_CRS',\
|
|
69
|
+
tag:'OWASP_CRS/DATA-LEAKAGES',\
|
|
67
70
|
tag:'capec/1000/118/116/54/127',\
|
|
68
71
|
tag:'PCI/6.5.6',\
|
|
69
|
-
ver:'OWASP_CRS/4.
|
|
72
|
+
ver:'OWASP_CRS/4.16.0',\
|
|
70
73
|
severity:'ERROR',\
|
|
71
74
|
setvar:'tx.outbound_anomaly_score_pl1=+%{tx.error_anomaly_score}'"
|
|
72
75
|
|
|
@@ -96,15 +99,16 @@ SecRule RESPONSE_BODY "@rx ^#\!\s?/" \
|
|
|
96
99
|
tag:'attack-disclosure',\
|
|
97
100
|
tag:'paranoia-level/1',\
|
|
98
101
|
tag:'OWASP_CRS',\
|
|
102
|
+
tag:'OWASP_CRS/DATA-LEAKAGES',\
|
|
99
103
|
tag:'capec/1000/118/116',\
|
|
100
104
|
tag:'PCI/6.5.6',\
|
|
101
|
-
ver:'OWASP_CRS/4.
|
|
105
|
+
ver:'OWASP_CRS/4.16.0',\
|
|
102
106
|
severity:'ERROR',\
|
|
103
107
|
setvar:'tx.outbound_anomaly_score_pl1=+%{tx.error_anomaly_score}'"
|
|
104
108
|
|
|
105
109
|
|
|
106
|
-
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 2" "id:950013,phase:3,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.
|
|
107
|
-
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 2" "id:950014,phase:4,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.
|
|
110
|
+
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 2" "id:950013,phase:3,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.16.0',skipAfter:END-RESPONSE-950-DATA-LEAKAGES"
|
|
111
|
+
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 2" "id:950014,phase:4,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.16.0',skipAfter:END-RESPONSE-950-DATA-LEAKAGES"
|
|
108
112
|
#
|
|
109
113
|
# -= Paranoia Level 2 =- (apply only when tx.detection_paranoia_level is sufficiently high: 2 or higher)
|
|
110
114
|
#
|
|
@@ -126,24 +130,25 @@ SecRule RESPONSE_STATUS "@rx ^5\d{2}$" \
|
|
|
126
130
|
tag:'attack-disclosure',\
|
|
127
131
|
tag:'paranoia-level/2',\
|
|
128
132
|
tag:'OWASP_CRS',\
|
|
133
|
+
tag:'OWASP_CRS/DATA-LEAKAGES',\
|
|
129
134
|
tag:'capec/1000/152',\
|
|
130
135
|
tag:'PCI/6.5.6',\
|
|
131
|
-
ver:'OWASP_CRS/4.
|
|
136
|
+
ver:'OWASP_CRS/4.16.0',\
|
|
132
137
|
severity:'ERROR',\
|
|
133
138
|
setvar:'tx.outbound_anomaly_score_pl2=+%{tx.error_anomaly_score}'"
|
|
134
139
|
|
|
135
140
|
|
|
136
141
|
|
|
137
|
-
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 3" "id:950015,phase:3,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.
|
|
138
|
-
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 3" "id:950016,phase:4,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.
|
|
142
|
+
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 3" "id:950015,phase:3,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.16.0',skipAfter:END-RESPONSE-950-DATA-LEAKAGES"
|
|
143
|
+
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 3" "id:950016,phase:4,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.16.0',skipAfter:END-RESPONSE-950-DATA-LEAKAGES"
|
|
139
144
|
#
|
|
140
145
|
# -= Paranoia Level 3 =- (apply only when tx.detection_paranoia_level is sufficiently high: 3 or higher)
|
|
141
146
|
#
|
|
142
147
|
|
|
143
148
|
|
|
144
149
|
|
|
145
|
-
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 4" "id:950017,phase:3,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.
|
|
146
|
-
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 4" "id:950018,phase:4,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.
|
|
150
|
+
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 4" "id:950017,phase:3,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.16.0',skipAfter:END-RESPONSE-950-DATA-LEAKAGES"
|
|
151
|
+
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 4" "id:950018,phase:4,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.16.0',skipAfter:END-RESPONSE-950-DATA-LEAKAGES"
|
|
147
152
|
#
|
|
148
153
|
# -= Paranoia Level 4 =- (apply only when tx.detection_paranoia_level is sufficiently high: 4 or higher)
|
|
149
154
|
#
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
# ------------------------------------------------------------------------
|
|
2
|
-
# OWASP CRS ver.4.
|
|
2
|
+
# OWASP CRS ver.4.16.0
|
|
3
3
|
# Copyright (c) 2006-2020 Trustwave and contributors. All rights reserved.
|
|
4
|
-
# Copyright (c) 2021-
|
|
4
|
+
# Copyright (c) 2021-2025 CRS project. All rights reserved.
|
|
5
5
|
#
|
|
6
6
|
# The OWASP CRS is distributed under
|
|
7
7
|
# Apache Software License (ASL) version 2
|
|
@@ -19,11 +19,12 @@ SecRule RESPONSE_HEADERS:Content-Encoding "@pm gzip compress deflate br zstd" \
|
|
|
19
19
|
pass,\
|
|
20
20
|
nolog,\
|
|
21
21
|
tag:'OWASP_CRS',\
|
|
22
|
-
|
|
22
|
+
tag:'OWASP_CRS/DATA-LEAKAGES-SQL',\
|
|
23
|
+
ver:'OWASP_CRS/4.16.0',\
|
|
23
24
|
skipAfter:END-RESPONSE-951-DATA-LEAKAGES-SQL"
|
|
24
25
|
|
|
25
|
-
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 1" "id:951011,phase:3,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.
|
|
26
|
-
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 1" "id:951012,phase:4,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.
|
|
26
|
+
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 1" "id:951011,phase:3,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.16.0',skipAfter:END-RESPONSE-951-DATA-LEAKAGES-SQL"
|
|
27
|
+
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 1" "id:951012,phase:4,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.16.0',skipAfter:END-RESPONSE-951-DATA-LEAKAGES-SQL"
|
|
27
28
|
#
|
|
28
29
|
# -= Paranoia Level 1 (default) =- (apply only when tx.detection_paranoia_level is sufficiently high: 1 or higher)
|
|
29
30
|
#
|
|
@@ -45,8 +46,9 @@ SecRule RESPONSE_BODY "!@pmFromFile sql-errors.data" \
|
|
|
45
46
|
tag:'platform-multi',\
|
|
46
47
|
tag:'attack-disclosure',\
|
|
47
48
|
tag:'OWASP_CRS',\
|
|
49
|
+
tag:'OWASP_CRS/DATA-LEAKAGES-SQL',\
|
|
48
50
|
tag:'capec/1000/118/116/54',\
|
|
49
|
-
ver:'OWASP_CRS/4.
|
|
51
|
+
ver:'OWASP_CRS/4.16.0',\
|
|
50
52
|
skipAfter:END-SQL-ERROR-MATCH-PL1"
|
|
51
53
|
|
|
52
54
|
SecRule RESPONSE_BODY "@rx (?i:JET Database Engine|Access Database Engine|\[Microsoft\]\[ODBC Microsoft Access Driver\])" \
|
|
@@ -63,8 +65,9 @@ SecRule RESPONSE_BODY "@rx (?i:JET Database Engine|Access Database Engine|\[Micr
|
|
|
63
65
|
tag:'attack-disclosure',\
|
|
64
66
|
tag:'paranoia-level/1',\
|
|
65
67
|
tag:'OWASP_CRS',\
|
|
68
|
+
tag:'OWASP_CRS/DATA-LEAKAGES-SQL',\
|
|
66
69
|
tag:'capec/1000/118/116/54',\
|
|
67
|
-
ver:'OWASP_CRS/4.
|
|
70
|
+
ver:'OWASP_CRS/4.16.0',\
|
|
68
71
|
severity:'CRITICAL',\
|
|
69
72
|
setvar:'tx.outbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}',\
|
|
70
73
|
setvar:'tx.sql_injection_score=+%{tx.critical_anomaly_score}'"
|
|
@@ -88,8 +91,9 @@ SecRule RESPONSE_BODY "@rx (?i)\bORA-[0-9][0-9][0-9][0-9][0-9]:|java\.sql\.SQLEx
|
|
|
88
91
|
tag:'attack-disclosure',\
|
|
89
92
|
tag:'paranoia-level/1',\
|
|
90
93
|
tag:'OWASP_CRS',\
|
|
94
|
+
tag:'OWASP_CRS/DATA-LEAKAGES-SQL',\
|
|
91
95
|
tag:'capec/1000/118/116/54',\
|
|
92
|
-
ver:'OWASP_CRS/4.
|
|
96
|
+
ver:'OWASP_CRS/4.16.0',\
|
|
93
97
|
severity:'CRITICAL',\
|
|
94
98
|
setvar:'tx.outbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}',\
|
|
95
99
|
setvar:'tx.sql_injection_score=+%{tx.critical_anomaly_score}'"
|
|
@@ -108,8 +112,9 @@ SecRule RESPONSE_BODY "@rx (?i:DB2 SQL error:|\[IBM\]\[CLI Driver\]\[DB2/6000\]|
|
|
|
108
112
|
tag:'attack-disclosure',\
|
|
109
113
|
tag:'paranoia-level/1',\
|
|
110
114
|
tag:'OWASP_CRS',\
|
|
115
|
+
tag:'OWASP_CRS/DATA-LEAKAGES-SQL',\
|
|
111
116
|
tag:'capec/1000/118/116/54',\
|
|
112
|
-
ver:'OWASP_CRS/4.
|
|
117
|
+
ver:'OWASP_CRS/4.16.0',\
|
|
113
118
|
severity:'CRITICAL',\
|
|
114
119
|
setvar:'tx.outbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}',\
|
|
115
120
|
setvar:'tx.sql_injection_score=+%{tx.critical_anomaly_score}'"
|
|
@@ -128,8 +133,9 @@ SecRule RESPONSE_BODY "@rx (?i:\[DM_QUERY_E_SYNTAX\]|has occurred in the vicinit
|
|
|
128
133
|
tag:'attack-disclosure',\
|
|
129
134
|
tag:'paranoia-level/1',\
|
|
130
135
|
tag:'OWASP_CRS',\
|
|
136
|
+
tag:'OWASP_CRS/DATA-LEAKAGES-SQL',\
|
|
131
137
|
tag:'capec/1000/118/116/54',\
|
|
132
|
-
ver:'OWASP_CRS/4.
|
|
138
|
+
ver:'OWASP_CRS/4.16.0',\
|
|
133
139
|
severity:'CRITICAL',\
|
|
134
140
|
setvar:'tx.outbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}',\
|
|
135
141
|
setvar:'tx.sql_injection_score=+%{tx.critical_anomaly_score}'"
|
|
@@ -148,8 +154,9 @@ SecRule RESPONSE_BODY "@rx (?i)Dynamic SQL Error" \
|
|
|
148
154
|
tag:'attack-disclosure',\
|
|
149
155
|
tag:'paranoia-level/1',\
|
|
150
156
|
tag:'OWASP_CRS',\
|
|
157
|
+
tag:'OWASP_CRS/DATA-LEAKAGES-SQL',\
|
|
151
158
|
tag:'capec/1000/118/116/54',\
|
|
152
|
-
ver:'OWASP_CRS/4.
|
|
159
|
+
ver:'OWASP_CRS/4.16.0',\
|
|
153
160
|
severity:'CRITICAL',\
|
|
154
161
|
setvar:'tx.outbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}',\
|
|
155
162
|
setvar:'tx.sql_injection_score=+%{tx.critical_anomaly_score}'"
|
|
@@ -168,8 +175,9 @@ SecRule RESPONSE_BODY "@rx (?i)Exception (?:condition )?\d+\. Transaction rollba
|
|
|
168
175
|
tag:'attack-disclosure',\
|
|
169
176
|
tag:'paranoia-level/1',\
|
|
170
177
|
tag:'OWASP_CRS',\
|
|
178
|
+
tag:'OWASP_CRS/DATA-LEAKAGES-SQL',\
|
|
171
179
|
tag:'capec/1000/118/116/54',\
|
|
172
|
-
ver:'OWASP_CRS/4.
|
|
180
|
+
ver:'OWASP_CRS/4.16.0',\
|
|
173
181
|
severity:'CRITICAL',\
|
|
174
182
|
setvar:'tx.outbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}',\
|
|
175
183
|
setvar:'tx.sql_injection_score=+%{tx.critical_anomaly_score}'"
|
|
@@ -188,8 +196,9 @@ SecRule RESPONSE_BODY "@rx (?i)org\.hsqldb\.jdbc" \
|
|
|
188
196
|
tag:'attack-disclosure',\
|
|
189
197
|
tag:'paranoia-level/1',\
|
|
190
198
|
tag:'OWASP_CRS',\
|
|
199
|
+
tag:'OWASP_CRS/DATA-LEAKAGES-SQL',\
|
|
191
200
|
tag:'capec/1000/118/116/54',\
|
|
192
|
-
ver:'OWASP_CRS/4.
|
|
201
|
+
ver:'OWASP_CRS/4.16.0',\
|
|
193
202
|
severity:'CRITICAL',\
|
|
194
203
|
setvar:'tx.outbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}',\
|
|
195
204
|
setvar:'tx.sql_injection_score=+%{tx.critical_anomaly_score}'"
|
|
@@ -208,8 +217,9 @@ SecRule RESPONSE_BODY "@rx (?i:An illegal character has been found in the statem
|
|
|
208
217
|
tag:'attack-disclosure',\
|
|
209
218
|
tag:'paranoia-level/1',\
|
|
210
219
|
tag:'OWASP_CRS',\
|
|
220
|
+
tag:'OWASP_CRS/DATA-LEAKAGES-SQL',\
|
|
211
221
|
tag:'capec/1000/118/116/54',\
|
|
212
|
-
ver:'OWASP_CRS/4.
|
|
222
|
+
ver:'OWASP_CRS/4.16.0',\
|
|
213
223
|
severity:'CRITICAL',\
|
|
214
224
|
setvar:'tx.outbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}',\
|
|
215
225
|
setvar:'tx.sql_injection_score=+%{tx.critical_anomaly_score}'"
|
|
@@ -228,8 +238,9 @@ SecRule RESPONSE_BODY "@rx (?i:Warning.*ingres_|Ingres SQLSTATE|Ingres\W.*Driver
|
|
|
228
238
|
tag:'attack-disclosure',\
|
|
229
239
|
tag:'paranoia-level/1',\
|
|
230
240
|
tag:'OWASP_CRS',\
|
|
241
|
+
tag:'OWASP_CRS/DATA-LEAKAGES-SQL',\
|
|
231
242
|
tag:'capec/1000/118/116/54',\
|
|
232
|
-
ver:'OWASP_CRS/4.
|
|
243
|
+
ver:'OWASP_CRS/4.16.0',\
|
|
233
244
|
severity:'CRITICAL',\
|
|
234
245
|
setvar:'tx.outbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}',\
|
|
235
246
|
setvar:'tx.sql_injection_score=+%{tx.critical_anomaly_score}'"
|
|
@@ -248,8 +259,9 @@ SecRule RESPONSE_BODY "@rx (?i:<b>Warning</b>: ibase_|Unexpected end of command
|
|
|
248
259
|
tag:'attack-disclosure',\
|
|
249
260
|
tag:'paranoia-level/1',\
|
|
250
261
|
tag:'OWASP_CRS',\
|
|
262
|
+
tag:'OWASP_CRS/DATA-LEAKAGES-SQL',\
|
|
251
263
|
tag:'capec/1000/118/116/54',\
|
|
252
|
-
ver:'OWASP_CRS/4.
|
|
264
|
+
ver:'OWASP_CRS/4.16.0',\
|
|
253
265
|
severity:'CRITICAL',\
|
|
254
266
|
setvar:'tx.outbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}',\
|
|
255
267
|
setvar:'tx.sql_injection_score=+%{tx.critical_anomaly_score}'"
|
|
@@ -268,13 +280,14 @@ SecRule RESPONSE_BODY "@rx (?i:SQL error.*POS[0-9]+.*|Warning.*maxdb.*)" \
|
|
|
268
280
|
tag:'attack-disclosure',\
|
|
269
281
|
tag:'paranoia-level/1',\
|
|
270
282
|
tag:'OWASP_CRS',\
|
|
283
|
+
tag:'OWASP_CRS/DATA-LEAKAGES-SQL',\
|
|
271
284
|
tag:'capec/1000/118/116/54',\
|
|
272
|
-
ver:'OWASP_CRS/4.
|
|
285
|
+
ver:'OWASP_CRS/4.16.0',\
|
|
273
286
|
severity:'CRITICAL',\
|
|
274
287
|
setvar:'tx.outbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}',\
|
|
275
288
|
setvar:'tx.sql_injection_score=+%{tx.critical_anomaly_score}'"
|
|
276
289
|
|
|
277
|
-
SecRule RESPONSE_BODY "@rx (?i)(?:System\.Data\.OleDb\.OleDbException|\[Microsoft\]\[ODBC SQL Server Driver\]|\[Macromedia\]\[SQLServer JDBC Driver\]|\[SqlException|System\.Data\.SqlClient\.SqlException|Unclosed quotation mark after the character string|'80040e14'|mssql_query\(\)|Microsoft OLE DB Provider for ODBC Drivers|Microsoft OLE DB Provider for SQL Server|Incorrect syntax near|Sintaxis incorrecta cerca de|Syntax error in string in query expression|Procedure or function
|
|
290
|
+
SecRule RESPONSE_BODY "@rx (?i)(?:System\.Data\.OleDb\.OleDbException|\[Microsoft\]\[ODBC SQL Server Driver\]|\[Macromedia\]\[SQLServer JDBC Driver\]|\[SqlException|System\.Data\.SqlClient\.SqlException|Unclosed quotation mark after the character string|'80040e14'|mssql_query\(\)|Microsoft OLE DB Provider for ODBC Drivers|Microsoft OLE DB Provider for SQL Server|Incorrect syntax near|Sintaxis incorrecta cerca de|Syntax error in string in query expression|Procedure or function '.{1,128}' expects parameter|Unclosed quotation mark before the character string|Syntax error .* in query expression|Data type mismatch in criteria expression\.|ADODB\.Field \(0x800A0BCD\)|the used select statements have different number of columns|OLE DB.*SQL Server|Warning.*mssql_.*|Driver.*SQL[ _-]*Server|Exception.*\WSystem\.Data\.SqlClient\.|Conversion failed when converting the varchar value .*? to data type int\.)" \
|
|
278
291
|
"id:951220,\
|
|
279
292
|
phase:4,\
|
|
280
293
|
block,\
|
|
@@ -288,8 +301,9 @@ SecRule RESPONSE_BODY "@rx (?i)(?:System\.Data\.OleDb\.OleDbException|\[Microsof
|
|
|
288
301
|
tag:'attack-disclosure',\
|
|
289
302
|
tag:'paranoia-level/1',\
|
|
290
303
|
tag:'OWASP_CRS',\
|
|
304
|
+
tag:'OWASP_CRS/DATA-LEAKAGES-SQL',\
|
|
291
305
|
tag:'capec/1000/118/116/54',\
|
|
292
|
-
ver:'OWASP_CRS/4.
|
|
306
|
+
ver:'OWASP_CRS/4.16.0',\
|
|
293
307
|
severity:'CRITICAL',\
|
|
294
308
|
setvar:'tx.outbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}',\
|
|
295
309
|
setvar:'tx.sql_injection_score=+%{tx.critical_anomaly_score}'"
|
|
@@ -313,8 +327,9 @@ SecRule RESPONSE_BODY "@rx (?i)(?:supplied argument is not a valid |SQL syntax.*
|
|
|
313
327
|
tag:'attack-disclosure',\
|
|
314
328
|
tag:'paranoia-level/1',\
|
|
315
329
|
tag:'OWASP_CRS',\
|
|
330
|
+
tag:'OWASP_CRS/DATA-LEAKAGES-SQL',\
|
|
316
331
|
tag:'capec/1000/118/116/54',\
|
|
317
|
-
ver:'OWASP_CRS/4.
|
|
332
|
+
ver:'OWASP_CRS/4.16.0',\
|
|
318
333
|
severity:'CRITICAL',\
|
|
319
334
|
setvar:'tx.outbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}',\
|
|
320
335
|
setvar:'tx.sql_injection_score=+%{tx.critical_anomaly_score}'"
|
|
@@ -338,8 +353,9 @@ SecRule RESPONSE_BODY "@rx (?i)P(?:ostgreSQL(?: query failed:|.{1,20}ERROR)|G::[
|
|
|
338
353
|
tag:'attack-disclosure',\
|
|
339
354
|
tag:'paranoia-level/1',\
|
|
340
355
|
tag:'OWASP_CRS',\
|
|
356
|
+
tag:'OWASP_CRS/DATA-LEAKAGES-SQL',\
|
|
341
357
|
tag:'capec/1000/118/116/54',\
|
|
342
|
-
ver:'OWASP_CRS/4.
|
|
358
|
+
ver:'OWASP_CRS/4.16.0',\
|
|
343
359
|
severity:'CRITICAL',\
|
|
344
360
|
setvar:'tx.outbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}',\
|
|
345
361
|
setvar:'tx.sql_injection_score=+%{tx.critical_anomaly_score}'"
|
|
@@ -358,8 +374,9 @@ SecRule RESPONSE_BODY "@rx (?i)(?:Warning.*sqlite_.*|Warning.*SQLite3::|SQLite/J
|
|
|
358
374
|
tag:'attack-disclosure',\
|
|
359
375
|
tag:'paranoia-level/1',\
|
|
360
376
|
tag:'OWASP_CRS',\
|
|
377
|
+
tag:'OWASP_CRS/DATA-LEAKAGES-SQL',\
|
|
361
378
|
tag:'capec/1000/118/116/54',\
|
|
362
|
-
ver:'OWASP_CRS/4.
|
|
379
|
+
ver:'OWASP_CRS/4.16.0',\
|
|
363
380
|
severity:'CRITICAL',\
|
|
364
381
|
setvar:'tx.outbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}',\
|
|
365
382
|
setvar:'tx.sql_injection_score=+%{tx.critical_anomaly_score}'"
|
|
@@ -378,8 +395,9 @@ SecRule RESPONSE_BODY "@rx (?i)(?:Sybase message:|Warning.{2,20}sybase|Sybase.*S
|
|
|
378
395
|
tag:'attack-disclosure',\
|
|
379
396
|
tag:'paranoia-level/1',\
|
|
380
397
|
tag:'OWASP_CRS',\
|
|
398
|
+
tag:'OWASP_CRS/DATA-LEAKAGES-SQL',\
|
|
381
399
|
tag:'capec/1000/118/116/54',\
|
|
382
|
-
ver:'OWASP_CRS/4.
|
|
400
|
+
ver:'OWASP_CRS/4.16.0',\
|
|
383
401
|
severity:'CRITICAL',\
|
|
384
402
|
setvar:'tx.outbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}',\
|
|
385
403
|
setvar:'tx.sql_injection_score=+%{tx.critical_anomaly_score}'"
|
|
@@ -387,24 +405,24 @@ SecRule RESPONSE_BODY "@rx (?i)(?:Sybase message:|Warning.{2,20}sybase|Sybase.*S
|
|
|
387
405
|
SecMarker "END-SQL-ERROR-MATCH-PL1"
|
|
388
406
|
|
|
389
407
|
|
|
390
|
-
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 2" "id:951013,phase:3,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.
|
|
391
|
-
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 2" "id:951014,phase:4,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.
|
|
408
|
+
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 2" "id:951013,phase:3,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.16.0',skipAfter:END-RESPONSE-951-DATA-LEAKAGES-SQL"
|
|
409
|
+
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 2" "id:951014,phase:4,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.16.0',skipAfter:END-RESPONSE-951-DATA-LEAKAGES-SQL"
|
|
392
410
|
#
|
|
393
411
|
# -= Paranoia Level 2 =- (apply only when tx.detection_paranoia_level is sufficiently high: 2 or higher)
|
|
394
412
|
#
|
|
395
413
|
|
|
396
414
|
|
|
397
415
|
|
|
398
|
-
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 3" "id:951015,phase:3,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.
|
|
399
|
-
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 3" "id:951016,phase:4,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.
|
|
416
|
+
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 3" "id:951015,phase:3,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.16.0',skipAfter:END-RESPONSE-951-DATA-LEAKAGES-SQL"
|
|
417
|
+
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 3" "id:951016,phase:4,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.16.0',skipAfter:END-RESPONSE-951-DATA-LEAKAGES-SQL"
|
|
400
418
|
#
|
|
401
419
|
# -= Paranoia Level 3 =- (apply only when tx.detection_paranoia_level is sufficiently high: 3 or higher)
|
|
402
420
|
#
|
|
403
421
|
|
|
404
422
|
|
|
405
423
|
|
|
406
|
-
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 4" "id:951017,phase:3,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.
|
|
407
|
-
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 4" "id:951018,phase:4,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.
|
|
424
|
+
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 4" "id:951017,phase:3,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.16.0',skipAfter:END-RESPONSE-951-DATA-LEAKAGES-SQL"
|
|
425
|
+
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 4" "id:951018,phase:4,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.16.0',skipAfter:END-RESPONSE-951-DATA-LEAKAGES-SQL"
|
|
408
426
|
#
|
|
409
427
|
# -= Paranoia Level 4 =- (apply only when tx.detection_paranoia_level is sufficiently high: 4 or higher)
|
|
410
428
|
#
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
# ------------------------------------------------------------------------
|
|
2
|
-
# OWASP CRS ver.4.
|
|
2
|
+
# OWASP CRS ver.4.16.0
|
|
3
3
|
# Copyright (c) 2006-2020 Trustwave and contributors. All rights reserved.
|
|
4
|
-
# Copyright (c) 2021-
|
|
4
|
+
# Copyright (c) 2021-2025 CRS project. All rights reserved.
|
|
5
5
|
#
|
|
6
6
|
# The OWASP CRS is distributed under
|
|
7
7
|
# Apache Software License (ASL) version 2
|
|
@@ -19,44 +19,22 @@ SecRule RESPONSE_HEADERS:Content-Encoding "@pm gzip compress deflate br zstd" \
|
|
|
19
19
|
pass,\
|
|
20
20
|
nolog,\
|
|
21
21
|
tag:'OWASP_CRS',\
|
|
22
|
-
|
|
22
|
+
tag:'OWASP_CRS/DATA-LEAKAGES-JAVA',\
|
|
23
|
+
ver:'OWASP_CRS/4.16.0',\
|
|
23
24
|
skipAfter:END-RESPONSE-952-DATA-LEAKAGES-JAVA"
|
|
24
25
|
|
|
25
|
-
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 1" "id:952011,phase:3,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.
|
|
26
|
-
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 1" "id:952012,phase:4,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.
|
|
26
|
+
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 1" "id:952011,phase:3,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.16.0',skipAfter:END-RESPONSE-952-DATA-LEAKAGES-JAVA"
|
|
27
|
+
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 1" "id:952012,phase:4,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.16.0',skipAfter:END-RESPONSE-952-DATA-LEAKAGES-JAVA"
|
|
27
28
|
#
|
|
28
29
|
# -= Paranoia Level 1 (default) =- (apply only when tx.detection_paranoia_level is sufficiently high: 1 or higher)
|
|
29
30
|
#
|
|
30
31
|
|
|
31
|
-
#
|
|
32
|
-
# -=[ Java Source Code Leakages ]=-
|
|
33
|
-
#
|
|
34
|
-
SecRule RESPONSE_BODY "@pmFromFile java-code-leakages.data" \
|
|
35
|
-
"id:952100,\
|
|
36
|
-
phase:4,\
|
|
37
|
-
block,\
|
|
38
|
-
capture,\
|
|
39
|
-
t:none,\
|
|
40
|
-
msg:'Java Source Code Leakage',\
|
|
41
|
-
logdata:'Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}',\
|
|
42
|
-
tag:'application-multi',\
|
|
43
|
-
tag:'language-java',\
|
|
44
|
-
tag:'platform-multi',\
|
|
45
|
-
tag:'attack-disclosure',\
|
|
46
|
-
tag:'paranoia-level/1',\
|
|
47
|
-
tag:'OWASP_CRS',\
|
|
48
|
-
tag:'capec/1000/118/116',\
|
|
49
|
-
tag:'PCI/6.5.6',\
|
|
50
|
-
ver:'OWASP_CRS/4.9.0',\
|
|
51
|
-
severity:'ERROR',\
|
|
52
|
-
setvar:'tx.outbound_anomaly_score_pl1=+%{tx.error_anomaly_score}'"
|
|
53
|
-
|
|
54
32
|
#
|
|
55
33
|
# -=[ Java Errors ]=-
|
|
56
34
|
#
|
|
57
35
|
# Ref: https://github.com/andresriancho/w3af/blob/master/w3af/plugins/grep/error_pages.py
|
|
58
36
|
#
|
|
59
|
-
SecRule RESPONSE_BODY "@
|
|
37
|
+
SecRule RESPONSE_BODY "@rx (?i)java[\.a-z]+E(?:xception|rror)|(?:org|com)\.[\.a-z]+Exception|Exception in thread \"[^\"]*\"|at[\s\x0b]+(?:ja(?:vax?|karta)|org|com)" \
|
|
60
38
|
"id:952110,\
|
|
61
39
|
phase:4,\
|
|
62
40
|
block,\
|
|
@@ -70,32 +48,33 @@ SecRule RESPONSE_BODY "@pmFromFile java-errors.data" \
|
|
|
70
48
|
tag:'attack-disclosure',\
|
|
71
49
|
tag:'paranoia-level/1',\
|
|
72
50
|
tag:'OWASP_CRS',\
|
|
51
|
+
tag:'OWASP_CRS/DATA-LEAKAGES-JAVA',\
|
|
73
52
|
tag:'capec/1000/118/116',\
|
|
74
53
|
tag:'PCI/6.5.6',\
|
|
75
|
-
ver:'OWASP_CRS/4.
|
|
54
|
+
ver:'OWASP_CRS/4.16.0',\
|
|
76
55
|
severity:'ERROR',\
|
|
77
56
|
setvar:'tx.outbound_anomaly_score_pl1=+%{tx.error_anomaly_score}'"
|
|
78
57
|
|
|
79
58
|
|
|
80
59
|
|
|
81
|
-
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 2" "id:952013,phase:3,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.
|
|
82
|
-
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 2" "id:952014,phase:4,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.
|
|
60
|
+
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 2" "id:952013,phase:3,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.16.0',skipAfter:END-RESPONSE-952-DATA-LEAKAGES-JAVA"
|
|
61
|
+
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 2" "id:952014,phase:4,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.16.0',skipAfter:END-RESPONSE-952-DATA-LEAKAGES-JAVA"
|
|
83
62
|
#
|
|
84
63
|
# -= Paranoia Level 2 =- (apply only when tx.detection_paranoia_level is sufficiently high: 2 or higher)
|
|
85
64
|
#
|
|
86
65
|
|
|
87
66
|
|
|
88
67
|
|
|
89
|
-
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 3" "id:952015,phase:3,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.
|
|
90
|
-
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 3" "id:952016,phase:4,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.
|
|
68
|
+
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 3" "id:952015,phase:3,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.16.0',skipAfter:END-RESPONSE-952-DATA-LEAKAGES-JAVA"
|
|
69
|
+
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 3" "id:952016,phase:4,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.16.0',skipAfter:END-RESPONSE-952-DATA-LEAKAGES-JAVA"
|
|
91
70
|
#
|
|
92
71
|
# -= Paranoia Level 3 =- (apply only when tx.detection_paranoia_level is sufficiently high: 3 or higher)
|
|
93
72
|
#
|
|
94
73
|
|
|
95
74
|
|
|
96
75
|
|
|
97
|
-
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 4" "id:952017,phase:3,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.
|
|
98
|
-
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 4" "id:952018,phase:4,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.
|
|
76
|
+
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 4" "id:952017,phase:3,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.16.0',skipAfter:END-RESPONSE-952-DATA-LEAKAGES-JAVA"
|
|
77
|
+
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 4" "id:952018,phase:4,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.16.0',skipAfter:END-RESPONSE-952-DATA-LEAKAGES-JAVA"
|
|
99
78
|
#
|
|
100
79
|
# -= Paranoia Level 4 =- (apply only when tx.detection_paranoia_level is sufficiently high: 4 or higher)
|
|
101
80
|
#
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
# ------------------------------------------------------------------------
|
|
2
|
-
# OWASP CRS ver.4.
|
|
2
|
+
# OWASP CRS ver.4.16.0
|
|
3
3
|
# Copyright (c) 2006-2020 Trustwave and contributors. All rights reserved.
|
|
4
|
-
# Copyright (c) 2021-
|
|
4
|
+
# Copyright (c) 2021-2025 CRS project. All rights reserved.
|
|
5
5
|
#
|
|
6
6
|
# The OWASP CRS is distributed under
|
|
7
7
|
# Apache Software License (ASL) version 2
|
|
@@ -19,11 +19,12 @@ SecRule RESPONSE_HEADERS:Content-Encoding "@pm gzip compress deflate br zstd" \
|
|
|
19
19
|
pass,\
|
|
20
20
|
nolog,\
|
|
21
21
|
tag:'OWASP_CRS',\
|
|
22
|
-
|
|
22
|
+
tag:'OWASP_CRS/DATA-LEAKAGES-PHP',\
|
|
23
|
+
ver:'OWASP_CRS/4.16.0',\
|
|
23
24
|
skipAfter:END-RESPONSE-953-DATA-LEAKAGES-PHP"
|
|
24
25
|
|
|
25
|
-
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 1" "id:953011,phase:3,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.
|
|
26
|
-
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 1" "id:953012,phase:4,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.
|
|
26
|
+
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 1" "id:953011,phase:3,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.16.0',skipAfter:END-RESPONSE-953-DATA-LEAKAGES-PHP"
|
|
27
|
+
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 1" "id:953012,phase:4,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.16.0',skipAfter:END-RESPONSE-953-DATA-LEAKAGES-PHP"
|
|
27
28
|
#
|
|
28
29
|
# -= Paranoia Level 1 (default) =- (apply only when tx.detection_paranoia_level is sufficiently high: 1 or higher)
|
|
29
30
|
#
|
|
@@ -45,9 +46,10 @@ SecRule RESPONSE_BODY "@pmFromFile php-errors.data" \
|
|
|
45
46
|
tag:'attack-disclosure',\
|
|
46
47
|
tag:'paranoia-level/1',\
|
|
47
48
|
tag:'OWASP_CRS',\
|
|
49
|
+
tag:'OWASP_CRS/DATA-LEAKAGES-PHP',\
|
|
48
50
|
tag:'capec/1000/118/116',\
|
|
49
51
|
tag:'PCI/6.5.6',\
|
|
50
|
-
ver:'OWASP_CRS/4.
|
|
52
|
+
ver:'OWASP_CRS/4.16.0',\
|
|
51
53
|
severity:'ERROR',\
|
|
52
54
|
setvar:'tx.outbound_anomaly_score_pl1=+%{tx.error_anomaly_score}'"
|
|
53
55
|
|
|
@@ -70,9 +72,10 @@ SecRule RESPONSE_BODY "@rx (?:\b(?:f(?:tp_(?:nb_)?f?(?:ge|pu)t|get(?:s?s|c)|scan
|
|
|
70
72
|
tag:'attack-disclosure',\
|
|
71
73
|
tag:'paranoia-level/1',\
|
|
72
74
|
tag:'OWASP_CRS',\
|
|
75
|
+
tag:'OWASP_CRS/DATA-LEAKAGES-PHP',\
|
|
73
76
|
tag:'capec/1000/118/116',\
|
|
74
77
|
tag:'PCI/6.5.6',\
|
|
75
|
-
ver:'OWASP_CRS/4.
|
|
78
|
+
ver:'OWASP_CRS/4.16.0',\
|
|
76
79
|
severity:'ERROR',\
|
|
77
80
|
setvar:'tx.outbound_anomaly_score_pl1=+%{tx.error_anomaly_score}'"
|
|
78
81
|
|
|
@@ -96,15 +99,16 @@ SecRule RESPONSE_BODY "@rx (?i)<\?(?:=|php)?\s+" \
|
|
|
96
99
|
tag:'attack-disclosure',\
|
|
97
100
|
tag:'paranoia-level/1',\
|
|
98
101
|
tag:'OWASP_CRS',\
|
|
102
|
+
tag:'OWASP_CRS/DATA-LEAKAGES-PHP',\
|
|
99
103
|
tag:'capec/1000/118/116',\
|
|
100
104
|
tag:'PCI/6.5.6',\
|
|
101
|
-
ver:'OWASP_CRS/4.
|
|
105
|
+
ver:'OWASP_CRS/4.16.0',\
|
|
102
106
|
severity:'ERROR',\
|
|
103
107
|
setvar:'tx.outbound_anomaly_score_pl1=+%{tx.error_anomaly_score}'"
|
|
104
108
|
|
|
105
109
|
|
|
106
|
-
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 2" "id:953013,phase:3,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.
|
|
107
|
-
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 2" "id:953014,phase:4,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.
|
|
110
|
+
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 2" "id:953013,phase:3,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.16.0',skipAfter:END-RESPONSE-953-DATA-LEAKAGES-PHP"
|
|
111
|
+
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 2" "id:953014,phase:4,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.16.0',skipAfter:END-RESPONSE-953-DATA-LEAKAGES-PHP"
|
|
108
112
|
#
|
|
109
113
|
# -= Paranoia Level 2 =- (apply only when tx.detection_paranoia_level is sufficiently high: 2 or higher)
|
|
110
114
|
#
|
|
@@ -129,23 +133,24 @@ SecRule RESPONSE_BODY "@pmFromFile php-errors-pl2.data" \
|
|
|
129
133
|
tag:'attack-disclosure',\
|
|
130
134
|
tag:'paranoia-level/2',\
|
|
131
135
|
tag:'OWASP_CRS',\
|
|
136
|
+
tag:'OWASP_CRS/DATA-LEAKAGES-PHP',\
|
|
132
137
|
tag:'capec/1000/118/116',\
|
|
133
138
|
tag:'PCI/6.5.6',\
|
|
134
|
-
ver:'OWASP_CRS/4.
|
|
139
|
+
ver:'OWASP_CRS/4.16.0',\
|
|
135
140
|
severity:'ERROR',\
|
|
136
141
|
setvar:'tx.outbound_anomaly_score_pl2=+%{tx.error_anomaly_score}'"
|
|
137
142
|
|
|
138
143
|
|
|
139
|
-
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 3" "id:953015,phase:3,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.
|
|
140
|
-
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 3" "id:953016,phase:4,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.
|
|
144
|
+
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 3" "id:953015,phase:3,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.16.0',skipAfter:END-RESPONSE-953-DATA-LEAKAGES-PHP"
|
|
145
|
+
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 3" "id:953016,phase:4,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.16.0',skipAfter:END-RESPONSE-953-DATA-LEAKAGES-PHP"
|
|
141
146
|
#
|
|
142
147
|
# -= Paranoia Level 3 =- (apply only when tx.detection_paranoia_level is sufficiently high: 3 or higher)
|
|
143
148
|
#
|
|
144
149
|
|
|
145
150
|
|
|
146
151
|
|
|
147
|
-
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 4" "id:953017,phase:3,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.
|
|
148
|
-
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 4" "id:953018,phase:4,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.
|
|
152
|
+
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 4" "id:953017,phase:3,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.16.0',skipAfter:END-RESPONSE-953-DATA-LEAKAGES-PHP"
|
|
153
|
+
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 4" "id:953018,phase:4,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.16.0',skipAfter:END-RESPONSE-953-DATA-LEAKAGES-PHP"
|
|
149
154
|
#
|
|
150
155
|
# -= Paranoia Level 4 =- (apply only when tx.detection_paranoia_level is sufficiently high: 4 or higher)
|
|
151
156
|
#
|