Skip to main content

Firewall Rules

We enabled Firewall Rules for most of the OWASP CRS Ruleset. See https://coreruleset.org/ for details.

Rule GroupRule IDStatusDescription
General200004Possible Multipart Unmatched Boundary.
REQUEST‑911‑METHOD‑ENFORCEMENT911100Method is not allowed by policy
REQUEST‑913‑SCANNER‑DETECTION913100Found User-Agent associated with security scanner
REQUEST‑913‑SCANNER‑DETECTION913101Found User-Agent associated with scripting/generic HTTP client
REQUEST‑913‑SCANNER‑DETECTION913102Found User-Agent associated with web crawler/bot
REQUEST‑913‑SCANNER‑DETECTION913110Found request header associated with security scanner
REQUEST‑913‑SCANNER‑DETECTION913120Found request filename/argument associated with security scanner
REQUEST‑920‑PROTOCOL‑ENFORCEMENT920100Invalid HTTP Request Line
REQUEST‑920‑PROTOCOL‑ENFORCEMENT920120Attempted multipart/form-data bypass
REQUEST‑920‑PROTOCOL‑ENFORCEMENT920130Failed to parse request body.
REQUEST‑920‑PROTOCOL‑ENFORCEMENT920140Multipart request body failed strict validation: PE %{REQBODY_PROCESSOR_ERROR}, BQ %{MULTIPART_BOUNDARY_QUOTED}, BW %{MULTIPART_BOUNDARY_WHITESPACE}, DB %{MULTIPART_DATA_BEFORE}, DA %{MULTIPART_DATA_AFTER}, HF %{MULTIPART_HEADER_FOLDING}, LF %{MULTIPART_LF_LINE}, SM %{MULTIPART_SEMICOLON_MISSING}, IQ %{MULTIPART_INVALID_QUOTING}, IH %{MULTIPART_INVALID_HEADER_FOLDING}, FLE %{MULTIPART_FILE_LIMIT_EXCEEDED}
REQUEST‑920‑PROTOCOL‑ENFORCEMENT920160Content-Length HTTP header is not numeric.
REQUEST‑920‑PROTOCOL‑ENFORCEMENT920170GET or HEAD Request with Body Content.
REQUEST‑920‑PROTOCOL‑ENFORCEMENT920180POST request missing Content-Length Header.
REQUEST‑920‑PROTOCOL‑ENFORCEMENT920190Range: Invalid Last Byte Value.
REQUEST‑920‑PROTOCOL‑ENFORCEMENT920200Range: Too many fields (6 or more)
REQUEST‑920‑PROTOCOL‑ENFORCEMENT920201Range: Too many fields for pdf request (35 or more)
REQUEST‑920‑PROTOCOL‑ENFORCEMENT920202Range: Too many fields for pdf request (6 or more)
REQUEST‑920‑PROTOCOL‑ENFORCEMENT920210Multiple/Conflicting Connection Header Data Found.
REQUEST‑920‑PROTOCOL‑ENFORCEMENT920220URL Encoding Abuse Attack Attempt
REQUEST‑920‑PROTOCOL‑ENFORCEMENT920230Multiple URL Encoding Detected
REQUEST‑920‑PROTOCOL‑ENFORCEMENT920240URL Encoding Abuse Attack Attempt
REQUEST‑920‑PROTOCOL‑ENFORCEMENT920250UTF8 Encoding Abuse Attack Attempt
REQUEST‑920‑PROTOCOL‑ENFORCEMENT920260Unicode Full/Half Width Abuse Attack Attempt
REQUEST‑920‑PROTOCOL‑ENFORCEMENT920270Invalid character in request (null character)
REQUEST‑920‑PROTOCOL‑ENFORCEMENT920271Invalid character in request (non printable characters)
REQUEST‑920‑PROTOCOL‑ENFORCEMENT920272Invalid character in request (outside of printable chars below ascii 127)
REQUEST‑920‑PROTOCOL‑ENFORCEMENT920273Invalid character in request (outside of very strict set)
REQUEST‑920‑PROTOCOL‑ENFORCEMENT920274Invalid character in request headers (outside of very strict set)
REQUEST‑920‑PROTOCOL‑ENFORCEMENT920280Request Missing a Host Header
REQUEST‑920‑PROTOCOL‑ENFORCEMENT920290Empty Host Header
REQUEST‑920‑PROTOCOL‑ENFORCEMENT920300Request Missing an Accept Header
REQUEST‑920‑PROTOCOL‑ENFORCEMENT920310Request Has an Empty Accept Header
REQUEST‑920‑PROTOCOL‑ENFORCEMENT920311Request Has an Empty Accept Header
REQUEST‑920‑PROTOCOL‑ENFORCEMENT920320Missing User Agent Header
REQUEST‑920‑PROTOCOL‑ENFORCEMENT920330Empty User Agent Header
REQUEST‑920‑PROTOCOL‑ENFORCEMENT920340Request Containing Content, but Missing Content-Type header
REQUEST‑920‑PROTOCOL‑ENFORCEMENT920350Host header is a numeric IP address
REQUEST‑920‑PROTOCOL‑ENFORCEMENT920420Request content type is not allowed by policy
REQUEST‑920‑PROTOCOL‑ENFORCEMENT920430HTTP protocol version is not allowed by policy
REQUEST‑920‑PROTOCOL‑ENFORCEMENT920440URL file extension is restricted by policy
REQUEST‑920‑PROTOCOL‑ENFORCEMENT920450HTTP header is restricted by policy (%{MATCHED_VAR})
REQUEST‑920‑PROTOCOL‑ENFORCEMENT920460Abnormal Escape Characters
REQUEST‑921‑PROTOCOL‑ATTACK921100HTTP Request Smuggling Attack.
REQUEST‑921‑PROTOCOL‑ATTACK921110HTTP Request Smuggling Attack
REQUEST‑921‑PROTOCOL‑ATTACK921120HTTP Response Splitting Attack
REQUEST‑921‑PROTOCOL‑ATTACK921130HTTP Response Splitting Attack
REQUEST‑921‑PROTOCOL‑ATTACK921140HTTP Header Injection Attack via headers
REQUEST‑921‑PROTOCOL‑ATTACK921150HTTP Header Injection Attack via payload (CR/LF detected)
REQUEST‑921‑PROTOCOL‑ATTACK921151HTTP Header Injection Attack via payload (CR/LF detected)
REQUEST‑921‑PROTOCOL‑ATTACK921160HTTP Header Injection Attack via payload (CR/LF and header-name detected)
REQUEST‑921‑PROTOCOL‑ATTACK921170HTTP Parameter Pollution
REQUEST‑921‑PROTOCOL‑ATTACK921180HTTP Parameter Pollution (%{TX.1})
REQUEST‑930‑APPLICATION‑ATTACK‑LFI930100Path Traversal Attack (/../)
REQUEST‑930‑APPLICATION‑ATTACK‑LFI930110Path Traversal Attack (/../)
REQUEST‑930‑APPLICATION‑ATTACK‑LFI930120OS File Access Attempt
REQUEST‑930‑APPLICATION‑ATTACK‑LFI930130Restricted File Access Attempt
REQUEST‑931‑APPLICATION‑ATTACK‑RFI931100Possible Remote File Inclusion (RFI) Attack: URL Parameter using IP Address
REQUEST‑931‑APPLICATION‑ATTACK‑RFI931110Possible Remote File Inclusion (RFI) Attack: Common RFI Vulnerable Parameter Name used w/URL Payload
REQUEST‑931‑APPLICATION‑ATTACK‑RFI931120Possible Remote File Inclusion (RFI) Attack: URL Payload Used w/Trailing Question Mark Character (?)
REQUEST‑931‑APPLICATION‑ATTACK‑RFI931130Possible Remote File Inclusion (RFI) Attack: Off-Domain Reference/Link
REQUEST‑932‑APPLICATION‑ATTACK‑RCE932100Remote Command Execution: Unix Command Injection
REQUEST‑932‑APPLICATION‑ATTACK‑RCE932105Remote Command Execution: Unix Command Injection
REQUEST‑932‑APPLICATION‑ATTACK‑RCE932110Remote Command Execution: Windows Command Injection
REQUEST‑932‑APPLICATION‑ATTACK‑RCE932115Remote Command Execution: Windows Command Injection
REQUEST‑932‑APPLICATION‑ATTACK‑RCE932120Remote Command Execution: Windows PowerShell Command Found
REQUEST‑932‑APPLICATION‑ATTACK‑RCE932130Remote Command Execution: Unix Shell Expression Found
REQUEST‑932‑APPLICATION‑ATTACK‑RCE932140Remote Command Execution: Windows FOR/IF Command Found
REQUEST‑932‑APPLICATION‑ATTACK‑RCE932150Remote Command Execution: Direct Unix Command Execution
REQUEST‑932‑APPLICATION‑ATTACK‑RCE932160Remote Command Execution: Unix Shell Code Found
REQUEST‑932‑APPLICATION‑ATTACK‑RCE932170Remote Command Execution: Shellshock (CVE-2014-6271)
REQUEST‑932‑APPLICATION‑ATTACK‑RCE932171Remote Command Execution: Shellshock (CVE-2014-6271)
REQUEST‑933‑APPLICATION‑ATTACK‑PHP933100PHP Injection Attack: Opening/Closing Tag Found
REQUEST‑933‑APPLICATION‑ATTACK‑PHP933110PHP Injection Attack: PHP Script File Upload Found
REQUEST‑933‑APPLICATION‑ATTACK‑PHP933111PHP Injection Attack: PHP Script File Upload Found
REQUEST‑933‑APPLICATION‑ATTACK‑PHP933120PHP Injection Attack: Configuration Directive Found
REQUEST‑933‑APPLICATION‑ATTACK‑PHP933130PHP Injection Attack: Variables Found
REQUEST‑933‑APPLICATION‑ATTACK‑PHP933131PHP Injection Attack: Variables Found
REQUEST‑933‑APPLICATION‑ATTACK‑PHP933140PHP Injection Attack: I/O Stream Found
REQUEST‑933‑APPLICATION‑ATTACK‑PHP933150PHP Injection Attack: High-Risk PHP Function Name Found
REQUEST‑933‑APPLICATION‑ATTACK‑PHP933151PHP Injection Attack: Medium-Risk PHP Function Name Found
REQUEST‑933‑APPLICATION‑ATTACK‑PHP933160PHP Injection Attack: High-Risk PHP Function Call Found
REQUEST‑933‑APPLICATION‑ATTACK‑PHP933161PHP Injection Attack: Low-Value PHP Function Call Found
REQUEST‑933‑APPLICATION‑ATTACK‑PHP933170PHP Injection Attack: Serialized Object Injection
REQUEST‑933‑APPLICATION‑ATTACK‑PHP933180PHP Injection Attack: Variable Function Call Found
REQUEST‑941‑APPLICATION‑ATTACK‑XSS941100XSS Attack Detected via libinjection
REQUEST‑941‑APPLICATION‑ATTACK‑XSS941110XSS Filter - Category 1: Script Tag Vector
REQUEST‑941‑APPLICATION‑ATTACK‑XSS941120XSS Filter - Category 2: Event Handler Vector
REQUEST‑941‑APPLICATION‑ATTACK‑XSS941130XSS Filter - Category 3: Attribute Vector
REQUEST‑941‑APPLICATION‑ATTACK‑XSS941140XSS Filter - Category 4: Javascript URI Vector
REQUEST‑941‑APPLICATION‑ATTACK‑XSS941150XSS Filter - Category 5: Disallowed HTML Attributes
REQUEST‑941‑APPLICATION‑ATTACK‑XSS941160NoScript XSS InjectionChecker: HTML Injection
REQUEST‑941‑APPLICATION‑ATTACK‑XSS941170NoScript XSS InjectionChecker: Attribute Injection
REQUEST‑941‑APPLICATION‑ATTACK‑XSS941180Node-Validator Blacklist Keywords
REQUEST‑941‑APPLICATION‑ATTACK‑XSS941190XSS Using style sheets
REQUEST‑941‑APPLICATION‑ATTACK‑XSS941200XSS using VML frames
REQUEST‑941‑APPLICATION‑ATTACK‑XSS941210XSS using obfuscated JavaScript
REQUEST‑941‑APPLICATION‑ATTACK‑XSS941220XSS using obfuscated VB Script
REQUEST‑941‑APPLICATION‑ATTACK‑XSS941230XSS using 'embed' tag
REQUEST‑941‑APPLICATION‑ATTACK‑XSS941240XSS using 'import' or 'implementation' attribute
REQUEST‑941‑APPLICATION‑ATTACK‑XSS941250IE XSS Filters - Attack Detected.
REQUEST‑941‑APPLICATION‑ATTACK‑XSS941260XSS using 'meta' tag
REQUEST‑941‑APPLICATION‑ATTACK‑XSS941270XSS using 'link' href
REQUEST‑941‑APPLICATION‑ATTACK‑XSS941280XSS using 'base' tag
REQUEST‑941‑APPLICATION‑ATTACK‑XSS941290XSS using 'applet' tag
REQUEST‑941‑APPLICATION‑ATTACK‑XSS941300XSS using 'object' tag
REQUEST‑941‑APPLICATION‑ATTACK‑XSS941310US-ASCII Malformed Encoding XSS Filter - Attack Detected.
REQUEST‑941‑APPLICATION‑ATTACK‑XSS941320Possible XSS Attack Detected - HTML Tag Handler
REQUEST‑941‑APPLICATION‑ATTACK‑XSS941330IE XSS Filters - Attack Detected.
REQUEST‑941‑APPLICATION‑ATTACK‑XSS941340IE XSS Filters - Attack Detected.
REQUEST‑941‑APPLICATION‑ATTACK‑XSS941350UTF-7 Encoding IE XSS - Attack Detected.
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942100SQL Injection Attack Detected via libinjection
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942110SQL Injection Attack: Common Injection Testing Detected
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942120SQL Injection Attack: SQL Operator Detected
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942130SQL Injection Attack: SQL Tautology Detected.
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942140SQL Injection Attack: Common DB Names Detected
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942150SQL Injection Attack
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942160Detects blind sqli tests using sleep() or benchmark().
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942170Detects SQL benchmark and sleep injection attempts including conditional queries
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942180Detects basic SQL authentication bypass attempts 1/3
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942190Detects MSSQL code execution and information gathering attempts
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942200Detects MySQL comment-/space-obfuscated injections and backtick termination
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942210Detects chained SQL injection attempts 1/2
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942220Looking for intiger overflow attacks, these are taken from skipfish, except 3.0.00738585072007e-308 is the "magic number" crash
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942230Detects conditional SQL injection attempts
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942240Detects MySQL charset switch and MSSQL DoS attempts
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942250Detects MATCH AGAINST, MERGE and EXECUTE IMMEDIATE injections
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942251Detects HAVING injections
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942260Detects basic SQL authentication bypass attempts 2/3
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942270Looking for basic sql injection. Common attack string for mysql, oracle and others.
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942280Detects Postgres pg_sleep injection, waitfor delay attacks and database shutdown attempts
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942290Finds basic MongoDB SQL injection attempts
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942300Detects MySQL comments, conditions and ch(a)r injections
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942310Detects chained SQL injection attempts 2/2
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942320Detects MySQL and PostgreSQL stored procedure/function injections
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942330Detects classic SQL injection probings 1/2
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942340Detects basic SQL authentication bypass attempts 3/3
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942350Detects MySQL UDF injection and other data/structure manipulation attempts
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942360Detects concatenated basic SQL injection and SQLLFI attempts
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942370Detects classic SQL injection probings 2/2
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942380SQL Injection Attack
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942390SQL Injection Attack
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942400SQL Injection Attack
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942410SQL Injection Attack
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942420Restricted SQL Character Anomaly Detection (cookies): # of special characters exceeded (8)
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942421Restricted SQL Character Anomaly Detection (cookies): # of special characters exceeded (3)
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942430Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (12)
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942431Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (6)
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942432Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (2)
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942440SQL Comment Sequence Detected.
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942450SQL Hex Encoding Identified
REQUEST‑942‑APPLICATION‑ATTACK‑SQLI942460Meta-Character Anomaly Detection Alert - Repetitive Non-Word Characters
REQUEST‑943‑APPLICATION‑ATTACK‑SESSION‑FIXATION943100Possible Session Fixation Attack: Setting Cookie Values in HTML
REQUEST‑943‑APPLICATION‑ATTACK‑SESSION‑FIXATION943110Possible Session Fixation Attack: SessionID Parameter Name with Off-Domain Referer
REQUEST‑943‑APPLICATION‑ATTACK‑SESSION‑FIXATION943120Possible Session Fixation Attack: SessionID Parameter Name with No Referer
Known‑CVEs800100Rule to help detect and mitigate log4j vulnerability - CVE-2021-44228
Known‑CVEs800110Spring4Shell Interaction Attempt
Known‑CVEs800111Attempted Spring Cloud routing-expression injection - CVE-2022-22963
Known‑CVEs800112Attempted Spring Framework unsafe class object exploitation - CVE-2022-22965
Known‑CVEs800113Attempted Spring Cloud Gateway Actuator injection - CVE-2022-22947