Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Logging to NGINX error_log but not audit #2237

Open
dto20 opened this issue Jan 13, 2020 · 10 comments
Open

Logging to NGINX error_log but not audit #2237

dto20 opened this issue Jan 13, 2020 · 10 comments
Assignees
Labels
3.x Related to ModSecurity version 3.x bug It is a confirmed bug Platform - Nginx pr available

Comments

@dto20
Copy link

dto20 commented Jan 13, 2020

Describe the bug

I'm testing a WAF setup with nginx, modsecurity and the OWASP ruleset. I am just running a simple XSS curl attack.

The attack is being blocked and a 403 is being returned. However, the attack isn't logged in the audit log, only the nginx error log. We need to send the logs to a SIEM and we need any blocks to be in the audit log.

Logs and dumps

Output of:

  1. DebugLogs (level 9)
  2. AuditLogs
  3. Error logs
  4. If there is a crash, the core dump file.

Notice: Be carefully to not leak any confidential information.

[157893220069.056272] [] [4] Initializing transaction [157893220069.056272] [] [4] Transaction context created. [157893220069.056272] [] [4] Starting phase CONNECTION. (SecRules 0) [157893220069.056272] [] [9] This phase consists of 28 rule(s). [157893220069.056272] [] [4] Starting phase URI. (SecRules 0 + 1/2) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Adding request argument (GET): name "q", value ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Starting phase REQUEST_HEADERS. (SecRules 1) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] This phase consists of 135 rule(s). [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 200000) Executing operator "Rx" with param "(?:application(?:/soap\+|/)|text/)xml" against REQUEST_HEADERS:Content-Type. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 200001) Executing operator "Rx" with param "application/json" against REQUEST_HEADERS:Content-Type. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 900990) Executing unconditional rule... [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:crs_setup_version with value: 330 [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 901001) Executing operator "Eq" with param "0" against TX:crs_setup_version. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:crs_setup_version) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 901100) Executing operator "Eq" with param "0" against TX:inbound_anomaly_score_threshold. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "0" (Variable: TX:inbound_anomaly_score_threshold) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:inbound_anomaly_score_threshold with value: 5 [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 901110) Executing operator "Eq" with param "0" against TX:outbound_anomaly_score_threshold. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "0" (Variable: TX:outbound_anomaly_score_threshold) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:outbound_anomaly_score_threshold with value: 4 [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 901120) Executing operator "Eq" with param "0" against TX:paranoia_level. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "0" (Variable: TX:paranoia_level) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:paranoia_level with value: 1 [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 901125) Executing operator "Eq" with param "0" against TX:executing_paranoia_level. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "0" (Variable: TX:executing_paranoia_level) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:executing_paranoia_level with value: 1 [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 901130) Executing operator "Eq" with param "0" against TX:sampling_percentage. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "0" (Variable: TX:sampling_percentage) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:sampling_percentage with value: 100 [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 901140) Executing operator "Eq" with param "0" against TX:critical_anomaly_score. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "0" (Variable: TX:critical_anomaly_score) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:critical_anomaly_score with value: 5 [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 901141) Executing operator "Eq" with param "0" against TX:error_anomaly_score. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "0" (Variable: TX:error_anomaly_score) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:error_anomaly_score with value: 4 [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 901142) Executing operator "Eq" with param "0" against TX:warning_anomaly_score. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "0" (Variable: TX:warning_anomaly_score) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:warning_anomaly_score with value: 3 [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 901143) Executing operator "Eq" with param "0" against TX:notice_anomaly_score. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "0" (Variable: TX:notice_anomaly_score) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:notice_anomaly_score with value: 2 [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 901150) Executing operator "Eq" with param "0" against TX:do_reput_block. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "0" (Variable: TX:do_reput_block) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:do_reput_block with value: 0 [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 901152) Executing operator "Eq" with param "0" against TX:reput_block_duration. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "0" (Variable: TX:reput_block_duration) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:reput_block_duration with value: 300 [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 901160) Executing operator "Eq" with param "0" against TX:allowed_methods. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "0" (Variable: TX:allowed_methods) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:allowed_methods with value: GET HEAD POST OPTIONS [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 901162) Executing operator "Eq" with param "0" against TX:allowed_request_content_type. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "0" (Variable: TX:allowed_request_content_type) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:allowed_request_content_type with value: application/x-www-form-urlencoded|multipart/form-data|text/xml|application/xml|application/soap+xml|application/x-amf|application/json|application/octet-stream|application/csp-report|application/xss-auditor-report|text/plain [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 901168) Executing operator "Eq" with param "0" against TX:allowed_request_content_type_charset. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "0" (Variable: TX:allowed_request_content_type_charset) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:allowed_request_content_type_charset with value: utf-8|iso-8859-1|iso-8859-15|windows-1252 [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 901163) Executing operator "Eq" with param "0" against TX:allowed_http_versions. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "0" (Variable: TX:allowed_http_versions) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:allowed_http_versions with value: HTTP/1.0 HTTP/1.1 HTTP/2 HTTP/2.0 [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 901164) Executing operator "Eq" with param "0" against TX:restricted_extensions. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "0" (Variable: TX:restricted_extensions) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:restricted_extensions with value: .asa/ .asax/ .ascx/ .axd/ .backup/ .bak/ .bat/ .cdx/ .cer/ .cfg/ .cmd/ .com/ .config/ .conf/ .cs/ .csproj/ .csr/ .dat/ .db/ .dbf/ .dll/ .dos/ .htr/ .htw/ .ida/ .idc/ .idq/ .inc/ .ini/ .key/ .licx/ .lnk/ .log/ .mdb/ .old/ .pass/ .pdb/ .pol/ .printer/ .pwd/ .rdb/ .resources/ .resx/ .sql/ .swp/ .sys/ .vb/ .vbs/ .vbproj/ .vsdisco/ .webinfo/ .xsd/ .xsx/ [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 901165) Executing operator "Eq" with param "0" against TX:restricted_headers. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "0" (Variable: TX:restricted_headers) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:restricted_headers with value: /proxy/ /lock-token/ /content-range/ /if/ [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 901166) Executing operator "Eq" with param "0" against TX:static_extensions. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "0" (Variable: TX:static_extensions) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:static_extensions with value: /.jpg/ /.jpeg/ /.png/ /.gif/ /.js/ /.css/ /.ico/ /.svg/ /.webp/ [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 901167) Executing operator "Eq" with param "0" against TX:enforce_bodyproc_urlencoded. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "0" (Variable: TX:enforce_bodyproc_urlencoded) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:enforce_bodyproc_urlencoded with value: 0 [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 901200) Executing unconditional rule... [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:anomaly_score with value: 0 [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:anomaly_score_pl1 with value: 0 [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:anomaly_score_pl2 with value: 0 [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:anomaly_score_pl3 with value: 0 [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:anomaly_score_pl4 with value: 0 [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:sql_injection_score with value: 0 [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:xss_score with value: 0 [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:rfi_score with value: 0 [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:lfi_score with value: 0 [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:rce_score with value: 0 [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:php_injection_score with value: 0 [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:http_violation_score with value: 0 [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:session_fixation_score with value: 0 [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:inbound_anomaly_score with value: 0 [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:outbound_anomaly_score with value: 0 [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:outbound_anomaly_score_pl1 with value: 0 [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:outbound_anomaly_score_pl2 with value: 0 [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:outbound_anomaly_score_pl3 with value: 0 [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:outbound_anomaly_score_pl4 with value: 0 [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:sql_error_match with value: 0 [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 901318) Executing operator "Rx" with param "^.*$" against REQUEST_HEADERS:User-Agent. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:sha1: "V��ٶ��RՕ��_ׂ)+$�" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:hexEncode: "56c1a7d9b6b7cf5217d595b3825fd782292b24cc" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "56c1a7d9b6b7cf5217d595b3825fd782292b24cc" (Variable: REQUEST_HEADERS:User-Agent) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:ua_hash with value: 56c1a7d9b6b7cf5217d595b3825fd782292b24cc [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 901321) Executing unconditional rule... [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:real_ip with value: 172.17.0.1 [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: initcol [157893220069.056272] [/?q="><script>alert(1)</script>] [5] Collection global' initialized with value: global
[157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: initcol
[157893220069.056272] [/?q="><script>alert(1)</script>] [5] Collection ip' initialized with value: 172.17.0.1_56c1a7d9b6b7cf5217d595b3825fd782292b24cc [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 901340) Executing operator "Rx" with param "(?:URLENCODED|MULTIPART|XML|JSON)" against REQBODY_PROCESSOR. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "" (Variable: REQBODY_PROCESSOR) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving msg: Enabling body inspection [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (non-disruptive) action: tag [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule tag: paranoia-level/1 [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: noauditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: ctl [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 901350) Executing operator "Eq" with param "1" against TX:enforce_bodyproc_urlencoded. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: "0" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "0" (Variable: TX:enforce_bodyproc_urlencoded) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 901400) Executing operator "Eq" with param "100" against TX:sampling_percentage. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "100" (Variable: TX:sampling_percentage) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: skipAfter [157893220069.056272] [/?q="><script>alert(1)</script>] [5] Setting skipAfter for: END-SAMPLING [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '901410' due to a SecMarker: END-SAMPLING [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '901420' due to a SecMarker: END-SAMPLING [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '901430' due to a SecMarker: END-SAMPLING [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '901440' due to a SecMarker: END-SAMPLING [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '901450' due to a SecMarker: END-SAMPLING [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '0' due to a SecMarker: END-SAMPLING [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: END-SAMPLING [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Out of a SecMarker after skip 6 rules. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 901500) Executing operator "Lt" with param "1" Was: "" against TX:executing_paranoia_level. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:executing_paranoia_level) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 905100) Executing operator "StrEq" with param "GET /" against REQUEST_LINE. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "GET /?q="><script>alert(1)</script> HTTP/1.1" (Variable: REQUEST_LINE) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 905110) Executing operator "IpMatch" with param "127.0.0.1,::1" against REMOTE_ADDR. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "172.17.0.1" (Variable: REMOTE_ADDR) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 910011) Executing operator "Lt" with param "1" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 910013) Executing operator "Lt" with param "2" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: skipAfter [157893220069.056272] [/?q="><script>alert(1)</script>] [5] Setting skipAfter for: END-REQUEST-910-IP-REPUTATION [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '910015' due to a SecMarker: END-REQUEST-910-IP-REPUTATION [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '910017' due to a SecMarker: END-REQUEST-910-IP-REPUTATION [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '0' due to a SecMarker: END-REQUEST-910-IP-REPUTATION [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: END-REQUEST-910-IP-REPUTATION [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Out of a SecMarker after skip 3 rules. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 911011) Executing operator "Lt" with param "1" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 911013) Executing operator "Lt" with param "2" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: skipAfter [157893220069.056272] [/?q="><script>alert(1)</script>] [5] Setting skipAfter for: END-REQUEST-911-METHOD-ENFORCEMENT [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '911015' due to a SecMarker: END-REQUEST-911-METHOD-ENFORCEMENT [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '911017' due to a SecMarker: END-REQUEST-911-METHOD-ENFORCEMENT [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '0' due to a SecMarker: END-REQUEST-911-METHOD-ENFORCEMENT [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: END-REQUEST-911-METHOD-ENFORCEMENT [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Out of a SecMarker after skip 3 rules. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 912100) Executing operator "Eq" with param "0" against TX:dos_burst_time_slice. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "0" (Variable: TX:dos_burst_time_slice) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Executing chained rule. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 0) Executing operator "Eq" with param "0" against TX:dos_counter_threshold. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "0" (Variable: TX:dos_counter_threshold) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Executing chained rule. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 0) Executing operator "Eq" with param "0" against TX:dos_block_timeout. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "0" (Variable: TX:dos_block_timeout) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: skipAfter [157893220069.056272] [/?q="><script>alert(1)</script>] [5] Setting skipAfter for: END-DOS-PROTECTION-CHECKS [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '912011' due to a SecMarker: END-DOS-PROTECTION-CHECKS [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '912120' due to a SecMarker: END-DOS-PROTECTION-CHECKS [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '912130' due to a SecMarker: END-DOS-PROTECTION-CHECKS [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '912013' due to a SecMarker: END-DOS-PROTECTION-CHECKS [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '912015' due to a SecMarker: END-DOS-PROTECTION-CHECKS [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '912017' due to a SecMarker: END-DOS-PROTECTION-CHECKS [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '0' due to a SecMarker: END-DOS-PROTECTION-CHECKS [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: END-REQUEST-912-DOS-PROTECTION [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '0' due to a SecMarker: END-DOS-PROTECTION-CHECKS [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: END-DOS-PROTECTION-CHECKS [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Out of a SecMarker after skip 8 rules. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 913011) Executing operator "Lt" with param "1" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 913013) Executing operator "Lt" with param "2" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: skipAfter [157893220069.056272] [/?q="><script>alert(1)</script>] [5] Setting skipAfter for: END-REQUEST-913-SCANNER-DETECTION [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '913015' due to a SecMarker: END-REQUEST-913-SCANNER-DETECTION [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '913017' due to a SecMarker: END-REQUEST-913-SCANNER-DETECTION [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '0' due to a SecMarker: END-REQUEST-913-SCANNER-DETECTION [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: END-REQUEST-913-SCANNER-DETECTION [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Out of a SecMarker after skip 3 rules. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 920011) Executing operator "Lt" with param "1" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 920160) Executing operator "Rx" with param "^\d+$" against REQUEST_HEADERS:Content-Length. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 920470) Executing operator "Rx" with param "^[\w/.+-]+(?:\s?;\s?(?:boundary|charset)\s?=\s?['\"\w.()+,/:=?-]+)?$" against REQUEST_HEADERS:Content-Type. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 920480) Executing operator "Rx" with param "charset\s*=\s*[\"']?([^;\"'\s]+)" against REQUEST_HEADERS:Content-Type. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 920430) Executing operator "Within" with param "HTTP/1.0 HTTP/1.1 HTTP/2 HTTP/2.0" Was: "" against REQUEST_PROTOCOL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "HTTP/1.1" (Variable: REQUEST_PROTOCOL) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 920013) Executing operator "Lt" with param "2" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: skipAfter [157893220069.056272] [/?q="><script>alert(1)</script>] [5] Setting skipAfter for: END-REQUEST-920-PROTOCOL-ENFORCEMENT [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '920015' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '920490' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '920017' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '0' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: END-REQUEST-920-PROTOCOL-ENFORCEMENT [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Out of a SecMarker after skip 4 rules. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 921011) Executing operator "Lt" with param "1" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 921160) Executing operator "Rx" with param "[\n\r]+(?:\s|location|refresh|(?:set-)?cookie|(?:x-)?(?:forwarded-(?:for|host|server)|host|via|remote-ip|remote-addr|originating-IP))\s*:" against ARGS_GET_NAMES|ARGS_GET. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:htmlEntityDecode: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:lowercase: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "q" (Variable: ARGS_GET_NAMES:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:htmlEntityDecode: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:lowercase: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: ""><script>alert(1)</script>" (Variable: ARGS_GET:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 921190) Executing operator "Rx" with param "[\n\r]" against REQUEST_FILENAME. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: "/" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "/" (Variable: REQUEST_FILENAME) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 921013) Executing operator "Lt" with param "2" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: skipAfter [157893220069.056272] [/?q="><script>alert(1)</script>] [5] Setting skipAfter for: END-REQUEST-921-PROTOCOL-ATTACK [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '921015' due to a SecMarker: END-REQUEST-921-PROTOCOL-ATTACK [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '921017' due to a SecMarker: END-REQUEST-921-PROTOCOL-ATTACK [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '0' due to a SecMarker: END-REQUEST-921-PROTOCOL-ATTACK [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: END-REQUEST-921-PROTOCOL-ATTACK [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Out of a SecMarker after skip 3 rules. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 930011) Executing operator "Lt" with param "1" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 930013) Executing operator "Lt" with param "2" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: skipAfter [157893220069.056272] [/?q="><script>alert(1)</script>] [5] Setting skipAfter for: END-REQUEST-930-APPLICATION-ATTACK-LFI [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '930015' due to a SecMarker: END-REQUEST-930-APPLICATION-ATTACK-LFI [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '930017' due to a SecMarker: END-REQUEST-930-APPLICATION-ATTACK-LFI [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '0' due to a SecMarker: END-REQUEST-930-APPLICATION-ATTACK-LFI [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: END-REQUEST-930-APPLICATION-ATTACK-LFI [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Out of a SecMarker after skip 3 rules. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 931011) Executing operator "Lt" with param "1" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 931013) Executing operator "Lt" with param "2" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: skipAfter [157893220069.056272] [/?q="><script>alert(1)</script>] [5] Setting skipAfter for: END-REQUEST-931-APPLICATION-ATTACK-RFI [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '931015' due to a SecMarker: END-REQUEST-931-APPLICATION-ATTACK-RFI [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '931017' due to a SecMarker: END-REQUEST-931-APPLICATION-ATTACK-RFI [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '0' due to a SecMarker: END-REQUEST-931-APPLICATION-ATTACK-RFI [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: END-REQUEST-931-APPLICATION-ATTACK-RFI [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Out of a SecMarker after skip 3 rules. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 932011) Executing operator "Lt" with param "1" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 932013) Executing operator "Lt" with param "2" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: skipAfter [157893220069.056272] [/?q="><script>alert(1)</script>] [5] Setting skipAfter for: END-REQUEST-932-APPLICATION-ATTACK-RCE [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '932015' due to a SecMarker: END-REQUEST-932-APPLICATION-ATTACK-RCE [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '932017' due to a SecMarker: END-REQUEST-932-APPLICATION-ATTACK-RCE [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '0' due to a SecMarker: END-REQUEST-932-APPLICATION-ATTACK-RCE [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: END-REQUEST-932-APPLICATION-ATTACK-RCE [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Out of a SecMarker after skip 3 rules. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 933011) Executing operator "Lt" with param "1" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 933013) Executing operator "Lt" with param "2" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: skipAfter [157893220069.056272] [/?q="><script>alert(1)</script>] [5] Setting skipAfter for: END-REQUEST-933-APPLICATION-ATTACK-PHP [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '933015' due to a SecMarker: END-REQUEST-933-APPLICATION-ATTACK-PHP [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '933017' due to a SecMarker: END-REQUEST-933-APPLICATION-ATTACK-PHP [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '0' due to a SecMarker: END-REQUEST-933-APPLICATION-ATTACK-PHP [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: END-REQUEST-933-APPLICATION-ATTACK-PHP [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Out of a SecMarker after skip 3 rules. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 941011) Executing operator "Lt" with param "1" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 941013) Executing operator "Lt" with param "2" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: skipAfter [157893220069.056272] [/?q="><script>alert(1)</script>] [5] Setting skipAfter for: END-REQUEST-941-APPLICATION-ATTACK-XSS [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '941015' due to a SecMarker: END-REQUEST-941-APPLICATION-ATTACK-XSS [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '941017' due to a SecMarker: END-REQUEST-941-APPLICATION-ATTACK-XSS [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '0' due to a SecMarker: END-REQUEST-941-APPLICATION-ATTACK-XSS [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: END-REQUEST-941-APPLICATION-ATTACK-XSS [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Out of a SecMarker after skip 3 rules. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 942011) Executing operator "Lt" with param "1" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 942013) Executing operator "Lt" with param "2" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: skipAfter [157893220069.056272] [/?q="><script>alert(1)</script>] [5] Setting skipAfter for: END-REQUEST-942-APPLICATION-ATTACK-SQLI [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '942015' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '942017' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '0' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: END-REQUEST-942-APPLICATION-ATTACK-SQLI [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Out of a SecMarker after skip 3 rules. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 943011) Executing operator "Lt" with param "1" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 943013) Executing operator "Lt" with param "2" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: skipAfter [157893220069.056272] [/?q="><script>alert(1)</script>] [5] Setting skipAfter for: END-REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '943015' due to a SecMarker: END-REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '943017' due to a SecMarker: END-REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '0' due to a SecMarker: END-REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: END-REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Out of a SecMarker after skip 3 rules. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 949011) Executing operator "Lt" with param "1" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 949013) Executing operator "Lt" with param "2" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: skipAfter [157893220069.056272] [/?q="><script>alert(1)</script>] [5] Setting skipAfter for: END-REQUEST-949-BLOCKING-EVALUATION [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '949015' due to a SecMarker: END-REQUEST-949-BLOCKING-EVALUATION [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '949017' due to a SecMarker: END-REQUEST-949-BLOCKING-EVALUATION [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '0' due to a SecMarker: END-REQUEST-949-BLOCKING-EVALUATION [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: END-REQUEST-949-BLOCKING-EVALUATION [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Out of a SecMarker after skip 3 rules. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 980011) Executing operator "Lt" with param "1" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 980013) Executing operator "Lt" with param "2" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: skipAfter [157893220069.056272] [/?q="><script>alert(1)</script>] [5] Setting skipAfter for: END-RESPONSE-980-CORRELATION [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '980015' due to a SecMarker: END-RESPONSE-980-CORRELATION [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '980017' due to a SecMarker: END-RESPONSE-980-CORRELATION [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '0' due to a SecMarker: END-RESPONSE-980-CORRELATION [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: END-RESPONSE-980-CORRELATION [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Out of a SecMarker after skip 3 rules. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Starting phase REQUEST_BODY. (SecRules 2) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] This phase consists of 285 rule(s). [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 200002) Executing operator "Eq" with param "0" against REQBODY_ERROR. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "0" (Variable: REQBODY_ERROR) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 200003) Executing operator "Eq" with param "0" against MULTIPART_STRICT_ERROR. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "" (Variable: MULTIPART_STRICT_ERROR) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 200004) Executing operator "Eq" with param "1" against MULTIPART_UNMATCHED_BOUNDARY. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "" (Variable: MULTIPART_UNMATCHED_BOUNDARY) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 200005) Executing operator "StrEq" with param "0" against TX:regex(^MSC_). [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 910012) Executing operator "Lt" with param "1" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 910000) Executing operator "Eq" with param "1" against TX:DO_REPUT_BLOCK. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "0" (Variable: TX:DO_REPUT_BLOCK) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 910100) Executing operator "Rx" with param "^$" against TX:HIGH_RISK_COUNTRY_CODES. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 910120) Executing operator "Eq" with param "1" against IP:PREVIOUS_RBL_CHECK. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 910130) Executing operator "Eq" with param "0" against TX:block_suspicious_ip. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "0" (Variable: TX:block_suspicious_ip) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Executing chained rule. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 0) Executing operator "Eq" with param "0" against TX:block_harvester_ip. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "0" (Variable: TX:block_harvester_ip) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Executing chained rule. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 0) Executing operator "Eq" with param "0" against TX:block_spammer_ip. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "0" (Variable: TX:block_spammer_ip) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Executing chained rule. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 0) Executing operator "Eq" with param "0" against TX:block_search_ip. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "0" (Variable: TX:block_search_ip) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (non-disruptive) action: tag [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule tag: paranoia-level/1 [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: skipAfter [157893220069.056272] [/?q="><script>alert(1)</script>] [5] Setting skipAfter for: END-RBL-CHECK [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '910140' due to a SecMarker: END-RBL-CHECK [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '910150' due to a SecMarker: END-RBL-CHECK [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '910160' due to a SecMarker: END-RBL-CHECK [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '910170' due to a SecMarker: END-RBL-CHECK [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '910180' due to a SecMarker: END-RBL-CHECK [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '910190' due to a SecMarker: END-RBL-CHECK [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '0' due to a SecMarker: END-RBL-CHECK [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: END-RBL-LOOKUP [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '0' due to a SecMarker: END-RBL-CHECK [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: END-RBL-CHECK [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Out of a SecMarker after skip 8 rules. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 910014) Executing operator "Lt" with param "2" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: skipAfter [157893220069.056272] [/?q="><script>alert(1)</script>] [5] Setting skipAfter for: END-REQUEST-910-IP-REPUTATION [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '910016' due to a SecMarker: END-REQUEST-910-IP-REPUTATION [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '910018' due to a SecMarker: END-REQUEST-910-IP-REPUTATION [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '0' due to a SecMarker: END-REQUEST-910-IP-REPUTATION [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: END-REQUEST-910-IP-REPUTATION [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Out of a SecMarker after skip 3 rules. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 911012) Executing operator "Lt" with param "1" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 911100) Executing operator "Within" with param "GET HEAD POST OPTIONS" Was: "" against REQUEST_METHOD. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "GET" (Variable: REQUEST_METHOD) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 911014) Executing operator "Lt" with param "2" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: skipAfter [157893220069.056272] [/?q="><script>alert(1)</script>] [5] Setting skipAfter for: END-REQUEST-911-METHOD-ENFORCEMENT [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '911016' due to a SecMarker: END-REQUEST-911-METHOD-ENFORCEMENT [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '911018' due to a SecMarker: END-REQUEST-911-METHOD-ENFORCEMENT [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '0' due to a SecMarker: END-REQUEST-911-METHOD-ENFORCEMENT [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: END-REQUEST-911-METHOD-ENFORCEMENT [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Out of a SecMarker after skip 3 rules. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 912012) Executing operator "Lt" with param "1" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 912014) Executing operator "Lt" with param "2" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: skipAfter [157893220069.056272] [/?q="><script>alert(1)</script>] [5] Setting skipAfter for: END-REQUEST-912-DOS-PROTECTION [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '912016' due to a SecMarker: END-REQUEST-912-DOS-PROTECTION [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '912018' due to a SecMarker: END-REQUEST-912-DOS-PROTECTION [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '0' due to a SecMarker: END-REQUEST-912-DOS-PROTECTION [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: END-REQUEST-912-DOS-PROTECTION [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Out of a SecMarker after skip 3 rules. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 913012) Executing operator "Lt" with param "1" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 913100) Executing operator "PmFromFile" with param "scanners-user-agents.data" against REQUEST_HEADERS:User-Agent. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:lowercase: "curl/7.54.0" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "curl/7.54.0" (Variable: REQUEST_HEADERS:User-Agent) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 913110) Executing operator "PmFromFile" with param "scanners-headers.data" against REQUEST_HEADERS_NAMES|REQUEST_HEADERS. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:lowercase: "host" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "host" (Variable: REQUEST_HEADERS_NAMES:Host) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:lowercase: "user-agent" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "user-agent" (Variable: REQUEST_HEADERS_NAMES:User-Agent) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:lowercase: "accept" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "accept" (Variable: REQUEST_HEADERS_NAMES:Accept) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:lowercase: "localhost:8080" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "localhost:8080" (Variable: REQUEST_HEADERS:Host) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:lowercase: "curl/7.54.0" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "curl/7.54.0" (Variable: REQUEST_HEADERS:User-Agent) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:lowercase: "*/*" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "*/*" (Variable: REQUEST_HEADERS:Accept) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 913120) Executing operator "PmFromFile" with param "scanners-urls.data" against REQUEST_FILENAME|ARGS. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:lowercase: "/" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "/" (Variable: REQUEST_FILENAME) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:lowercase: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: ""><script>alert(1)</script>" (Variable: ARGS:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 913014) Executing operator "Lt" with param "2" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: skipAfter [157893220069.056272] [/?q="><script>alert(1)</script>] [5] Setting skipAfter for: END-REQUEST-913-SCANNER-DETECTION [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '913101' due to a SecMarker: END-REQUEST-913-SCANNER-DETECTION [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '913102' due to a SecMarker: END-REQUEST-913-SCANNER-DETECTION [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '913016' due to a SecMarker: END-REQUEST-913-SCANNER-DETECTION [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '913018' due to a SecMarker: END-REQUEST-913-SCANNER-DETECTION [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '0' due to a SecMarker: END-REQUEST-913-SCANNER-DETECTION [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: END-REQUEST-913-SCANNER-DETECTION [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Out of a SecMarker after skip 5 rules. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 920012) Executing operator "Lt" with param "1" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 920100) Executing operator "Rx" with param "^(?i:(?:[a-z]{3,10}\s+(?:\w{3,7}?://[\w\-\./]*(?::\d+)?)?/[^?#]*(?:\?[^#\s]*)?(?:#[\S]*)?|connect (?:\d{1,3}\.){3}\d{1,3}\.?(?::\d+)?|options \*)\s+[\w\./]+|get /[^?#]*(?:\?[^#\s]*)?(?:#[\S]*)?)$" against REQUEST_LINE. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "GET /?q="><script>alert(1)</script> HTTP/1.1" (Variable: REQUEST_LINE) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 920120) Executing operator "Rx" with param "(?<!&(?:[aAoOuUyY]uml)|&(?:[aAeEiIoOuU]circ)|&(?:[eEiIoOuUyY]acute)|&(?:[aAeEiIoOuU]grave)|&(?:[cC]cedil)|&(?:[aAnNoO]tilde)|&(?:amp)|&(?:apos));|['\"=]" against FILES_NAMES|FILES. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 920170) Executing operator "Rx" with param "^(?:GET|HEAD)$" against REQUEST_METHOD. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "GET" (Variable: REQUEST_METHOD) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] This rule severity is: 2 current transaction is: 255 [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving msg: GET or HEAD Request with Body Content. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Executing chained rule. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 0) Executing operator "Rx" with param "^0?$" against REQUEST_HEADERS:Content-Length. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 920171) Executing operator "Rx" with param "^(?:GET|HEAD)$" against REQUEST_METHOD. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "GET" (Variable: REQUEST_METHOD) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] This rule severity is: 2 current transaction is: 2 [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving msg: GET or HEAD Request with Transfer-Encoding. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Executing chained rule. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 0) Executing operator "Eq" with param "0" against REQUEST_HEADERS:Transfer-Encoding. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "0" (Variable: REQUEST_HEADERS:Transfer-Encoding) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 920180) Executing operator "Rx" with param "^POST$" against REQUEST_METHOD. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "GET" (Variable: REQUEST_METHOD) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 920190) Executing operator "Rx" with param "(\d+)-(\d+)\," against REQUEST_HEADERS:Range|REQUEST_HEADERS:Request-Range. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 920210) Executing operator "Rx" with param "\b(?:keep-alive|close),\s?(?:keep-alive|close)\b" against REQUEST_HEADERS:Connection. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 920220) Executing operator "Rx" with param "\x25" against REQUEST_URI. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "/?q="><script>alert(1)</script>" (Variable: REQUEST_URI) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 920240) Executing operator "Rx" with param "^(?i)application/x-www-form-urlencoded" against REQUEST_HEADERS:Content-Type. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 920250) Executing operator "Eq" with param "1" against TX:CRS_VALIDATE_UTF8_ENCODING. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 920260) Executing operator "Rx" with param "\%u[fF]{2}[0-9a-fA-F]{2}" against REQUEST_URI|REQUEST_BODY. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "/?q="><script>alert(1)</script>" (Variable: REQUEST_URI) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "" (Variable: REQUEST_BODY) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 920270) Executing operator "ValidateByteRange" with param "1-255" against REQUEST_URI|REQUEST_HEADERS|ARGS|ARGS_NAMES. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: "/?q="><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "/?q="><script>alert(1)</script>" (Variable: REQUEST_URI) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: "localhost:8080" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "localhost:8080" (Variable: REQUEST_HEADERS:Host) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: "curl/7.54.0" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "curl/7.54.0" (Variable: REQUEST_HEADERS:User-Agent) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: "*/*" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "*/*" (Variable: REQUEST_HEADERS:Accept) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: ""><script>alert(1)</script>" (Variable: ARGS:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "q" (Variable: ARGS_NAMES:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 920280) Executing operator "Eq" with param "0" against REQUEST_HEADERS:Host. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: REQUEST_HEADERS:Host) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 920290) Executing operator "Rx" with param "^$" against REQUEST_HEADERS:Host. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "localhost:8080" (Variable: REQUEST_HEADERS:Host) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 920310) Executing operator "Rx" with param "^$" against REQUEST_HEADERS:Accept. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "*/*" (Variable: REQUEST_HEADERS:Accept) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 920311) Executing operator "Rx" with param "^$" against REQUEST_HEADERS:Accept. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "*/*" (Variable: REQUEST_HEADERS:Accept) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 920330) Executing operator "Rx" with param "^$" against REQUEST_HEADERS:User-Agent. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "curl/7.54.0" (Variable: REQUEST_HEADERS:User-Agent) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 920340) Executing operator "Rx" with param "^0$" against REQUEST_HEADERS:Content-Length. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 920350) Executing operator "Rx" with param "^[\d.:]+$" against REQUEST_HEADERS:Host. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "localhost:8080" (Variable: REQUEST_HEADERS:Host) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 920380) Executing operator "Eq" with param "1" against TX:MAX_NUM_ARGS. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "0" (Variable: TX:MAX_NUM_ARGS) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 920360) Executing operator "Eq" with param "1" against TX:ARG_NAME_LENGTH. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "0" (Variable: TX:ARG_NAME_LENGTH) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 920370) Executing operator "Eq" with param "1" against TX:ARG_LENGTH. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "0" (Variable: TX:ARG_LENGTH) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 920390) Executing operator "Eq" with param "1" against TX:TOTAL_ARG_LENGTH. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "0" (Variable: TX:TOTAL_ARG_LENGTH) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 920400) Executing operator "Eq" with param "1" against TX:MAX_FILE_SIZE. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "0" (Variable: TX:MAX_FILE_SIZE) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 920410) Executing operator "Eq" with param "1" against TX:COMBINED_FILE_SIZES. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "0" (Variable: TX:COMBINED_FILE_SIZES) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 920420) Executing operator "Rx" with param "^[^;\s]+" against REQUEST_HEADERS:Content-Type. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 920440) Executing operator "Rx" with param "\.([^.]+)$" against REQUEST_BASENAME. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "" (Variable: REQUEST_BASENAME) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 920500) Executing operator "Rx" with param "\.[^.~]+~(?:/.*|)$" against REQUEST_FILENAME. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: "/" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "/" (Variable: REQUEST_FILENAME) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 920450) Executing operator "Rx" with param "^.*$" against REQUEST_HEADERS_NAMES. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:lowercase: "host" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "host" (Variable: REQUEST_HEADERS_NAMES:Host) [157893220069.056272] [/?q="><script>alert(1)</script>] [7] Added regex subexpression TX.0: host [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:header_name_host with value: /host/ [157893220069.056272] [/?q="><script>alert(1)</script>] [9] This rule severity is: 2 current transaction is: 2 [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving msg: HTTP header is restricted by policy (host) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:lowercase: "user-agent" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "user-agent" (Variable: REQUEST_HEADERS_NAMES:User-Agent) [157893220069.056272] [/?q="><script>alert(1)</script>] [7] Added regex subexpression TX.0: user-agent [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:header_name_user-agent with value: /user-agent/ [157893220069.056272] [/?q="><script>alert(1)</script>] [9] This rule severity is: 2 current transaction is: 2 [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving msg: HTTP header is restricted by policy (user-agent) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:lowercase: "accept" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "accept" (Variable: REQUEST_HEADERS_NAMES:Accept) [157893220069.056272] [/?q="><script>alert(1)</script>] [7] Added regex subexpression TX.0: accept [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:header_name_accept with value: /accept/ [157893220069.056272] [/?q="><script>alert(1)</script>] [9] This rule severity is: 2 current transaction is: 2 [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving msg: HTTP header is restricted by policy (accept) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Executing chained rule. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 0) Executing operator "Within" with param "/proxy/ /lock-token/ /content-range/ /if/" Was: "" against TX:regex(^HEADER_NAME_). [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 920014) Executing operator "Lt" with param "2" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: skipAfter [157893220069.056272] [/?q="><script>alert(1)</script>] [5] Setting skipAfter for: END-REQUEST-920-PROTOCOL-ENFORCEMENT [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '920200' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '920201' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '920230' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '920300' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '920271' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '920320' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '920121' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '920341' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '920016' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '920272' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '920018' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '920202' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '920273' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '920274' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '920275' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '920460' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '0' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: END-REQUEST-920-PROTOCOL-ENFORCEMENT [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Out of a SecMarker after skip 17 rules. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 921012) Executing operator "Lt" with param "1" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 921110) Executing operator "Rx" with param "[\n\r]+(?:get|post|head|options|connect|put|delete|trace|track|patch|propfind|propatch|mkcol|copy|move|lock|unlock)\s+[^\s]+(?:\s+http|[\r\n])" against ARGS_NAMES|ARGS|XML:/*. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:htmlEntityDecode: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:lowercase: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "q" (Variable: ARGS_NAMES:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:htmlEntityDecode: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:lowercase: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: ""><script>alert(1)</script>" (Variable: ARGS:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 921120) Executing operator "Rx" with param "[\r\n]\W*?(?:content-(?:type|length)|set-cookie|location):" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:lowercase: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "q" (Variable: ARGS_NAMES:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:lowercase: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: ""><script>alert(1)</script>" (Variable: ARGS:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 921130) Executing operator "Rx" with param "(?:\bhttp\/(?:0\.9|1\.[01])|<(?:html|meta)\b)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:htmlEntityDecode: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:lowercase: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "q" (Variable: ARGS_NAMES:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:htmlEntityDecode: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:lowercase: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: ""><script>alert(1)</script>" (Variable: ARGS:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 921140) Executing operator "Rx" with param "[\n\r]" against REQUEST_HEADERS_NAMES|REQUEST_HEADERS. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:htmlEntityDecode: "Host" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "Host" (Variable: REQUEST_HEADERS_NAMES:Host) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:htmlEntityDecode: "User-Agent" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "User-Agent" (Variable: REQUEST_HEADERS_NAMES:User-Agent) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:htmlEntityDecode: "Accept" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "Accept" (Variable: REQUEST_HEADERS_NAMES:Accept) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:htmlEntityDecode: "localhost:8080" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "localhost:8080" (Variable: REQUEST_HEADERS:Host) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:htmlEntityDecode: "curl/7.54.0" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "curl/7.54.0" (Variable: REQUEST_HEADERS:User-Agent) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:htmlEntityDecode: "*/*" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "*/*" (Variable: REQUEST_HEADERS:Accept) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 921150) Executing operator "Rx" with param "[\n\r]" against ARGS_NAMES. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:htmlEntityDecode: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "q" (Variable: ARGS_NAMES:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 921014) Executing operator "Lt" with param "2" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: skipAfter [157893220069.056272] [/?q="><script>alert(1)</script>] [5] Setting skipAfter for: END-REQUEST-921-PROTOCOL-ATTACK [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '921151' due to a SecMarker: END-REQUEST-921-PROTOCOL-ATTACK [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '921016' due to a SecMarker: END-REQUEST-921-PROTOCOL-ATTACK [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '921170' due to a SecMarker: END-REQUEST-921-PROTOCOL-ATTACK [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '921180' due to a SecMarker: END-REQUEST-921-PROTOCOL-ATTACK [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '921018' due to a SecMarker: END-REQUEST-921-PROTOCOL-ATTACK [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '0' due to a SecMarker: END-REQUEST-921-PROTOCOL-ATTACK [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: END-REQUEST-921-PROTOCOL-ATTACK [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Out of a SecMarker after skip 6 rules. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 930012) Executing operator "Lt" with param "1" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 930100) Executing operator "Rx" with param "(?i)(?:\x5c|(?:%(?:c(?:0%(?:[2aq]f|5c|9v)|1%(?:[19p]c|8s|af))|2(?:5(?:c(?:0%25af|1%259c)|2f|5c)|%46|f)|(?:(?:f(?:8%8)?0%8|e)0%80%a|bg%q)f|%3(?:2(?:%(?:%6|4)6|F)|5%%63)|u(?:221[56]|002f|EFC8|F025)|1u|5c)|0x(?:2f|5c)|\/))(?:%(?:(?:f(?:(?:c%80|8)%8)?0%8|e)0%80%ae|2(?:(?:5(?:c0%25a|2))?e|%45)|u(?:(?:002|ff0)e|2024)|%32(?:%(?:%6|4)5|E)|c0(?:%[256aef]e|\.))|\.(?:%0[01]|\?)?|\?\.?|0x2e){2}(?:\x5c|(?:%(?:c(?:0%(?:[2aq]f|5c|9v)|1%(?:[19p]c|8s|af))|2(?:5(?:c(?:0%25af|1%259c)|2f|5c)|%46|f)|(?:(?:f(?:8%8)?0%8|e)0%80%a|bg%q)f|%3(?:2(?:%(?:%6|4)6|F)|5%%63)|u(?:221[56]|002f|EFC8|F025)|1u|5c)|0x(?:2f|5c)|\/))" against REQUEST_URI_RAW|REQUEST_BODY|REQUEST_HEADERS|XML:/*. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "/?q="><script>alert(1)</script>" (Variable: REQUEST_URI_RAW) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "" (Variable: REQUEST_BODY) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "localhost:8080" (Variable: REQUEST_HEADERS:Host) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "curl/7.54.0" (Variable: REQUEST_HEADERS:User-Agent) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "*/*" (Variable: REQUEST_HEADERS:Accept) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 930110) Executing operator "Rx" with param "(?:^|[\\/])\.\.(?:[\\/]|$)" against REQUEST_URI|REQUEST_BODY|REQUEST_HEADERS|XML:/*. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:utf8toUnicode: "/?q="><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: "/?q="><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:removeNulls: "/?q="><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (1) t:cmdLine: "/?q=><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] multiMatch is enabled. 2 values to be tested. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "/?q="><script>alert(1)</script>" (Variable: REQUEST_URI) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "/?q=><script>alert(1)</script>" (Variable: REQUEST_URI) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:utf8toUnicode: "" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: "" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:removeNulls: "" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:cmdLine: "" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] multiMatch is enabled. 1 values to be tested. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "" (Variable: REQUEST_BODY) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:utf8toUnicode: "localhost:8080" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: "localhost:8080" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:removeNulls: "localhost:8080" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:cmdLine: "localhost:8080" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] multiMatch is enabled. 1 values to be tested. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "localhost:8080" (Variable: REQUEST_HEADERS:Host) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:utf8toUnicode: "curl/7.54.0" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: "curl/7.54.0" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:removeNulls: "curl/7.54.0" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:cmdLine: "curl/7.54.0" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] multiMatch is enabled. 1 values to be tested. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "curl/7.54.0" (Variable: REQUEST_HEADERS:User-Agent) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:utf8toUnicode: "*/*" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: "*/*" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:removeNulls: "*/*" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:cmdLine: "*/*" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] multiMatch is enabled. 1 values to be tested. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "*/*" (Variable: REQUEST_HEADERS:Accept) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 930120) Executing operator "PmFromFile" with param "lfi-os-files.data" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:utf8toUnicode: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:normalizePathWin: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:lowercase: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "q" (Variable: ARGS_NAMES:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:utf8toUnicode: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:normalizePathWin: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:lowercase: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: ""><script>alert(1)</script>" (Variable: ARGS:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 930130) Executing operator "PmFromFile" with param "restricted-files.data" against REQUEST_FILENAME. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:utf8toUnicode: "/" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: "/" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:normalizePathWin: "/" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:lowercase: "/" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "/" (Variable: REQUEST_FILENAME) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 930014) Executing operator "Lt" with param "2" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: skipAfter [157893220069.056272] [/?q="><script>alert(1)</script>] [5] Setting skipAfter for: END-REQUEST-930-APPLICATION-ATTACK-LFI [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '930016' due to a SecMarker: END-REQUEST-930-APPLICATION-ATTACK-LFI [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '930018' due to a SecMarker: END-REQUEST-930-APPLICATION-ATTACK-LFI [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '0' due to a SecMarker: END-REQUEST-930-APPLICATION-ATTACK-LFI [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: END-REQUEST-930-APPLICATION-ATTACK-LFI [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Out of a SecMarker after skip 3 rules. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 931012) Executing operator "Lt" with param "1" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 931100) Executing operator "Rx" with param "^(?i:file|ftps?|https?):\/\/(?:\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})" against ARGS. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: ""><script>alert(1)</script>" (Variable: ARGS:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 931110) Executing operator "Rx" with param "(?i)(?:\binclude\s*\([^)]*|mosConfig_absolute_path|_CONF\[path\]|_SERVER\[DOCUMENT_ROOT\]|GALLERY_BASEDIR|path\[docroot\]|appserv_root|config\[root_dir\])=(?:file|ftps?|https?):\/\/" against QUERY_STRING|REQUEST_BODY. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: "q="><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "q="><script>alert(1)</script>" (Variable: QUERY_STRING) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: "" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "" (Variable: REQUEST_BODY) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 931120) Executing operator "Rx" with param "^(?i:file|ftps?|https?).*?\?+$" against ARGS. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: ""><script>alert(1)</script>" (Variable: ARGS:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 931014) Executing operator "Lt" with param "2" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: skipAfter [157893220069.056272] [/?q="><script>alert(1)</script>] [5] Setting skipAfter for: END-REQUEST-931-APPLICATION-ATTACK-RFI [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '931130' due to a SecMarker: END-REQUEST-931-APPLICATION-ATTACK-RFI [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '931016' due to a SecMarker: END-REQUEST-931-APPLICATION-ATTACK-RFI [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '931018' due to a SecMarker: END-REQUEST-931-APPLICATION-ATTACK-RFI [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '0' due to a SecMarker: END-REQUEST-931-APPLICATION-ATTACK-RFI [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: END-REQUEST-931-APPLICATION-ATTACK-RFI [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Out of a SecMarker after skip 4 rules. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 932012) Executing operator "Lt" with param "1" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 932100) Executing operator "Rx" with param "(?:;|\{|\||\|\||&|&&|\n|\r|\$\(|\$\(\(||${|<(|>(|(\s*))\s*(?:{|\s*(\s*|\w+=(?:[^\s]|$.|$.|<.|>.|'.'|".")\s+|!\s|$)\s(?:'|")(?:[?*[]()-|+\w'"./\\]+/)?[\\'"](?:l[\\'"](?:w[\\'"]p[\\'"]-[\\'"](?:d[\\'"]*(?:o[\\'"]*w[\\'"]*n[\\'"]*l[\\'"]*o[\\'"]*a[\\'"]*d|u[\\'"]*m[\\'"]*p)|r[\\'"]*e[\\'"]*q[\\'"]*u[\\'"]*e[\\'"]*s[\\'"]*t|m[\\'"]*i[\\'"]*r[\\'"]*r[\\'"]o[\\'"]r)|s(?:[\\'"](?:b[\\'"]_[\\'"]*r[\\'"]*e[\\'"]*l[\\'"]*e[\\'"]*a[\\'"]*s[\\'"]*e|c[\\'"]*p[\\'"]*u|m[\\'"]*o[\\'"]*d|p[\\'"]*c[\\'"]*i|u[\\'"]*s[\\'"]*b|-[\\'"]*F|h[\\'"]w|o[\\'"]f))?|z[\\'"](?:(?:[ef][\\'"])?g[\\'"]*r[\\'"]*e[\\'"]p|c[\\'"](?:a[\\'"]*t|m[\\'"]p)|m[\\'"](?:o[\\'"]*r[\\'"]*e|a)|d[\\'"]*i[\\'"]*f[\\'"]*f|l[\\'"]*e[\\'"]*s[\\'"]*s)|e[\\'"]*s[\\'"]s[\\'"](?:(?:f[\\'"]*i[\\'"]*l|p[\\'"]*i[\\'"]*p)[\\'"]*e|e[\\'"]*c[\\'"]*h[\\'"]o|(?:\s|<|>).)|a[\\'"]*s[\\'"]t[\\'"](?:l[\\'"]*o[\\'"]*g(?:[\\'"]*i[\\'"]*n)?|c[\\'"]o[\\'"]m[\\'"]m|(?:\s|<|>).)|o[\\'"](?:c[\\'"]a[\\'"](?:t[\\'"]e|l)[\\'"](?:\s|<|>).|g[\\'"]*n[\\'"]*a[\\'"]*m[\\'"]e)|d[\\'"](?:c[\\'"]*o[\\'"]*n[\\'"]*f[\\'"]i[\\'"]g|d[\\'"](?:\s|<|>).)|f[\\'"]*t[\\'"]*p(?:[\\'"]g[\\'"]e[\\'"]t)?|(?:[np]|y[\\'"]n[\\'"]x)[\\'"](?:\s|<|>).)|b[\\'"](?:z[\\'"](?:(?:[ef][\\'"])?g[\\'"]*r[\\'"]*e[\\'"]*p|d[\\'"]*i[\\'"]*f[\\'"]*f|l[\\'"]*e[\\'"]*s[\\'"]*s|m[\\'"]*o[\\'"]*r[\\'"]*e|c[\\'"]*a[\\'"]*t|i[\\'"]*p[\\'"]*2)|s[\\'"]d[\\'"](?:c[\\'"]*a[\\'"]*t|i[\\'"]*f[\\'"]*f|t[\\'"]*a[\\'"]r)|a[\\'"](?:t[\\'"]c[\\'"]h[\\'"](?:\s|<|>).|s[\\'"]*h)|r[\\'"]*e[\\'"]*a[\\'"]*k[\\'"]*s[\\'"]*w|u[\\'"]*i[\\'"]*l[\\'"]t[\\'"]i[\\'"]n)|c[\\'"](?:o[\\'"](?:m[\\'"](?:p[\\'"]*r[\\'"]*e[\\'"]*s[\\'"]*s|m[\\'"]*a[\\'"]n[\\'"]d)[\\'"](?:\s|<|>).|p[\\'"]*r[\\'"]*o[\\'"]c)|h[\\'"](?:d[\\'"]i[\\'"]r[\\'"](?:\s|<|>).|f[\\'"]*l[\\'"]*a[\\'"]*g[\\'"]*s|a[\\'"]*t[\\'"]*t[\\'"]*r|m[\\'"]*o[\\'"]*d)|r[\\'"]*o[\\'"]*n[\\'"]*t[\\'"]*a[\\'"]b|(?:[cp]|a[\\'"]t)[\\'"](?:\s|<|>).|u[\\'"]*r[\\'"]l|s[\\'"]h)|f[\\'"](?:i(?:[\\'"](?:l[\\'"]e[\\'"](?:t[\\'"]*e[\\'"]s[\\'"]t|(?:\s|<|>).)|n[\\'"]d[\\'"](?:\s|<|>).))?|t[\\'"]p[\\'"](?:s[\\'"]*t[\\'"]*a[\\'"]*t[\\'"]*s|w[\\'"]*h[\\'"]o|(?:\s|<|>).)|u[\\'"]*n[\\'"]*c[\\'"]*t[\\'"]*i[\\'"]*o[\\'"]*n|(?:e[\\'"]*t[\\'"]c[\\'"]h|c)[\\'"](?:\s|<|>).|o[\\'"]*r[\\'"]*e[\\'"]*a[\\'"]*c[\\'"]*h|g[\\'"]r[\\'"]e[\\'"]p)|e[\\'"](?:n[\\'"](?:v(?:[\\'"]-[\\'"]*u[\\'"]*p[\\'"]*d[\\'"]*a[\\'"]*t[\\'"]e)?|d[\\'"](?:i[\\'"]f|s[\\'"]w))|x[\\'"](?:p[\\'"](?:a[\\'"]*n[\\'"]*d|o[\\'"]*r[\\'"]t|r)|e[\\'"]c[\\'"](?:\s|<|>).)|c[\\'"]h[\\'"]o[\\'"](?:\s|<|>).|g[\\'"]*r[\\'"]*e[\\'"]*p|s[\\'"]*a[\\'"]*c|v[\\'"]a[\\'"]l)|h[\\'"](?:t[\\'"](?:d[\\'"]*i[\\'"]*g[\\'"]*e[\\'"]*s[\\'"]*t|p[\\'"]*a[\\'"]*s[\\'"]*s[\\'"]*w[\\'"]*d)|o[\\'"]*s[\\'"]t[\\'"](?:n[\\'"]*a[\\'"]*m[\\'"]*e|i[\\'"]*d)|(?:e[\\'"]*a[\\'"]d|u[\\'"]p)[\\'"](?:\s|<|>).|i[\\'"]*s[\\'"]*t[\\'"]o[\\'"]r[\\'"]y)|i[\\'"](?:p[\\'"](?:(?:6[\\'"])?t[\\'"]*a[\\'"]*b[\\'"]*l[\\'"]*e[\\'"]*s|c[\\'"]*o[\\'"]*n[\\'"]*f[\\'"]i[\\'"]g)|r[\\'"]b(?:[\\'"](?:1(?:[\\'"][89])?|2[\\'"][012]))?|f[\\'"]*c[\\'"]*o[\\'"]*n[\\'"]f[\\'"]i[\\'"]g|d[\\'"](?:\s|<|>).)|g[\\'"](?:(?:e[\\'"]*t[\\'"]*f[\\'"]*a[\\'"]*c[\\'"]*l|r[\\'"]*e[\\'"]p|c[\\'"]c|i[\\'"]t)[\\'"](?:\s|<|>).|z[\\'"](?:c[\\'"]*a[\\'"]*t|i[\\'"]*p)|u[\\'"]*n[\\'"]*z[\\'"]*i[\\'"]*p|d[\\'"]b)|a[\\'"](?:(?:l[\\'"]*i[\\'"]*a[\\'"]s|w[\\'"]k)[\\'"](?:\s|<|>).|d[\\'"]*d[\\'"]*u[\\'"]*s[\\'"]*e[\\'"]*r|p[\\'"]t[\\'"]-[\\'"]g[\\'"]e[\\'"]t|r[\\'"](?:c[\\'"]h[\\'"](?:\s|<|>).|p))|d[\\'"](?:h[\\'"]*c[\\'"]*l[\\'"]*i[\\'"]*e[\\'"]*n[\\'"]*t|(?:i[\\'"]f[\\'"]f|u)[\\'"](?:\s|<|>).|(?:m[\\'"]*e[\\'"]*s|p[\\'"]*k)[\\'"]g|o[\\'"](?:a[\\'"]*s|n[\\'"]*e)|a[\\'"]*s[\\'"]h)|m[\\'"](?:(?:k[\\'"]*d[\\'"]*i[\\'"]r|o[\\'"]r[\\'"]e)[\\'"](?:\s|<|>).|a[\\'"]i[\\'"]l[\\'"](?:x[\\'"](?:\s|<|>).|q)|l[\\'"]*o[\\'"]*c[\\'"]*a[\\'"]t[\\'"]e)|j[\\'"](?:(?:a[\\'"]v[\\'"]a|o[\\'"]b[\\'"]s)[\\'"](?:\s|<|>).|e[\\'"]x[\\'"]e[\\'"]c)|k[\\'"]i[\\'"]l[\\'"]l[\\'"](?:a[\\'"]l[\\'"]l|(?:\s|<|>).)|(?:G[\\'"]E[\\'"]T[\\'"](?:\s|<|>)|.\s).|7[\\'"]z(?:[\\'"][ar])?)\b" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/.
[157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "q" (Variable: ARGS_NAMES:q)
[157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: ""><script>alert(1)</script>" (Variable: ARGS:q)
[157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0.
[157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned.
[157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 932105) Executing operator "Rx" with param "(?:;|{||||||&|&&|\n|\r|$(|$((||\${|<\(|>\(|\(\s*\))\s*(?:{|\s*\(\s*|\w+=(?:[^\s]*|\$.*|\$.*|<.*|>.*|\'.*\'|\".*\")\s+|!\s*|\$)*\s*(?:'|\")*(?:[\?\*\[\]\(\)\-\|+\w'\"\./\\\\]+/)?[\\\\'\"]*(?:s[\\\\'\"]*(?:e[\\\\'\"]*(?:t[\\\\'\"]*(?:(?:f[\\\\'\"]*a[\\\\'\"]*c[\\\\'\"]*l[\\\\'\"]*)?(?:\s|<|>).*|e[\\\\'\"]*n[\\\\'\"]*v|s[\\\\'\"]*i[\\\\'\"]*d)|n[\\\\'\"]*d[\\\\'\"]*m[\\\\'\"]*a[\\\\'\"]*i[\\\\'\"]*l|d[\\\\'\"]*(?:\s|<|>).*)|h[\\\\'\"]*(?:\.[\\\\'\"]*d[\\\\'\"]*i[\\\\'\"]*s[\\\\'\"]*t[\\\\'\"]*r[\\\\'\"]*i[\\\\'\"]*b|u[\\\\'\"]*t[\\\\'\"]*d[\\\\'\"]*o[\\\\'\"]*w[\\\\'\"]*n|(?:\s|<|>).*)|o[\\\\'\"]*(?:(?:u[\\\\'\"]*r[\\\\'\"]*c[\\\\'\"]*e|r[\\\\'\"]*t)[\\\\'\"]*(?:\s|<|>).*|c[\\\\'\"]*a[\\\\'\"]*t)|c[\\\\'\"]*(?:h[\\\\'\"]*e[\\\\'\"]*d|p[\\\\'\"]*(?:\s|<|>).*)|t[\\\\'\"]*r[\\\\'\"]*i[\\\\'\"]*n[\\\\'\"]*g[\\\\'\"]*s|(?:l[\\\\'\"]*e[\\\\'\"]*e|f[\\\\'\"]*t)[\\\\'\"]*p|y[\\\\'\"]*s[\\\\'\"]*c[\\\\'\"]*t[\\\\'\"]*l|u[\\\\'\"]*(?:(?:\s|<|>).*|d[\\\\'\"]*o)|d[\\\\'\"]*i[\\\\'\"]*f[\\\\'\"]*f|s[\\\\'\"]*h|v[\\\\'\"]*n)|p[\\\\'\"]*(?:k[\\\\'\"]*(?:g(?:(?:[\\\\'\"]*_)?[\\\\'\"]*i[\\\\'\"]*n[\\\\'\"]*f[\\\\'\"]*o)?|e[\\\\'\"]*x[\\\\'\"]*e[\\\\'\"]*c|i[\\\\'\"]*l[\\\\'\"]*l)|t[\\\\'\"]*a[\\\\'\"]*r(?:[\\\\'\"]*(?:d[\\\\'\"]*i[\\\\'\"]*f[\\\\'\"]*f|g[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*p))?|a[\\\\'\"]*(?:t[\\\\'\"]*c[\\\\'\"]*h[\\\\'\"]*(?:\s|<|>).*|s[\\\\'\"]*s[\\\\'\"]*w[\\\\'\"]*d)|r[\\\\'\"]*i[\\\\'\"]*n[\\\\'\"]*t[\\\\'\"]*(?:e[\\\\'\"]*n[\\\\'\"]*v|f[\\\\'\"]*(?:\s|<|>).*)|y[\\\\'\"]*t[\\\\'\"]*h[\\\\'\"]*o[\\\\'\"]*n(?:[\\\\'\"]*(?:3(?:[\\\\'\"]*m)?|2))?|e[\\\\'\"]*r[\\\\'\"]*(?:l(?:[\\\\'\"]*(?:s[\\\\'\"]*h|5))?|m[\\\\'\"]*s)|(?:g[\\\\'\"]*r[\\\\'\"]*e|f[\\\\'\"]*t)[\\\\'\"]*p|(?:u[\\\\'\"]*s[\\\\'\"]*h|o[\\\\'\"]*p)[\\\\'\"]*d|h[\\\\'\"]*p(?:[\\\\'\"]*[57])?|i[\\\\'\"]*n[\\\\'\"]*g|s[\\\\'\"]*(?:\s|<|>).*)|n[\\\\'\"]*(?:c[\\\\'\"]*(?:\.[\\\\'\"]*(?:t[\\\\'\"]*r[\\\\'\"]*a[\\\\'\"]*d[\\\\'\"]*i[\\\\'\"]*t[\\\\'\"]*i[\\\\'\"]*o[\\\\'\"]*n[\\\\'\"]*a[\\\\'\"]*l|o[\\\\'\"]*p[\\\\'\"]*e[\\\\'\"]*n[\\\\'\"]*b[\\\\'\"]*s[\\\\'\"]*d)|(?:\s|<|>).*|a[\\\\'\"]*t)|e[\\\\'\"]*t[\\\\'\"]*(?:k[\\\\'\"]*i[\\\\'\"]*t[\\\\'\"]*-[\\\\'\"]*f[\\\\'\"]*t[\\\\'\"]*p|(?:s[\\\\'\"]*t|c)[\\\\'\"]*a[\\\\'\"]*t|(?:\s|<|>).*)|s[\\\\'\"]*(?:l[\\\\'\"]*o[\\\\'\"]*o[\\\\'\"]*k[\\\\'\"]*u[\\\\'\"]*p|t[\\\\'\"]*a[\\\\'\"]*t)|(?:a[\\\\'\"]*n[\\\\'\"]*o|i[\\\\'\"]*c[\\\\'\"]*e)[\\\\'\"]*(?:\s|<|>).*|(?:o[\\\\'\"]*h[\\\\'\"]*u|m[\\\\'\"]*a)[\\\\'\"]*p|p[\\\\'\"]*i[\\\\'\"]*n[\\\\'\"]*g)|r[\\\\'\"]*(?:e[\\\\'\"]*(?:(?:p[\\\\'\"]*(?:l[\\\\'\"]*a[\\\\'\"]*c[\\\\'\"]*e|e[\\\\'\"]*a[\\\\'\"]*t)|n[\\\\'\"]*a[\\\\'\"]*m[\\\\'\"]*e)[\\\\'\"]*(?:\s|<|>).*|a[\\\\'\"]*l[\\\\'\"]*p[\\\\'\"]*a[\\\\'\"]*t[\\\\'\"]*h)|m[\\\\'\"]*(?:(?:d[\\\\'\"]*i[\\\\'\"]*r[\\\\'\"]*)?(?:\s|<|>).*|u[\\\\'\"]*s[\\\\'\"]*e[\\\\'\"]*r)|u[\\\\'\"]*b[\\\\'\"]*y(?:[\\\\'\"]*(?:1(?:[\\\\'\"]*[89])?|2[\\\\'\"]*[012]))?|(?:a[\\\\'\"]*r|c[\\\\'\"]*p|p[\\\\'\"]*m)[\\\\'\"]*(?:\s|<|>).*|n[\\\\'\"]*a[\\\\'\"]*n[\\\\'\"]*o|o[\\\\'\"]*u[\\\\'\"]*t[\\\\'\"]*e|s[\\\\'\"]*y[\\\\'\"]*n[\\\\'\"]*c)|t[\\\\'\"]*(?:c[\\\\'\"]*(?:p[\\\\'\"]*(?:t[\\\\'\"]*r[\\\\'\"]*a[\\\\'\"]*c[\\\\'\"]*e[\\\\'\"]*r[\\\\'\"]*o[\\\\'\"]*u[\\\\'\"]*t[\\\\'\"]*e|i[\\\\'\"]*n[\\\\'\"]*g)|s[\\\\'\"]*h)|r[\\\\'\"]*a[\\\\'\"]*c[\\\\'\"]*e[\\\\'\"]*r[\\\\'\"]*o[\\\\'\"]*u[\\\\'\"]*t[\\\\'\"]*e(?:[\\\\'\"]*6)?|e[\\\\'\"]*(?:l[\\\\'\"]*n[\\\\'\"]*e[\\\\'\"]*t|e[\\\\'\"]*(?:\s|<|>).*)|i[\\\\'\"]*m[\\\\'\"]*e[\\\\'\"]*(?:o[\\\\'\"]*u[\\\\'\"]*t|(?:\s|<|>).*)|a[\\\\'\"]*(?:i[\\\\'\"]*l(?:[\\\\'\"]*f)?|r[\\\\'\"]*(?:\s|<|>).*)|o[\\\\'\"]*(?:u[\\\\'\"]*c[\\\\'\"]*h[\\\\'\"]*(?:\s|<|>).*|p))|u[\\\\'\"]*(?:n[\\\\'\"]*(?:l[\\\\'\"]*(?:i[\\\\'\"]*n[\\\\'\"]*k[\\\\'\"]*(?:\s|<|>).*|z[\\\\'\"]*m[\\\\'\"]*a)|c[\\\\'\"]*o[\\\\'\"]*m[\\\\'\"]*p[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*s|a[\\\\'\"]*m[\\\\'\"]*e|r[\\\\'\"]*a[\\\\'\"]*r|s[\\\\'\"]*e[\\\\'\"]*t|z[\\\\'\"]*i[\\\\'\"]*p|x[\\\\'\"]*z)|s[\\\\'\"]*e[\\\\'\"]*r[\\\\'\"]*(?:(?:a[\\\\'\"]*d|m[\\\\'\"]*o)[\\\\'\"]*d|d[\\\\'\"]*e[\\\\'\"]*l)|l[\\\\'\"]*i[\\\\'\"]*m[\\\\'\"]*i[\\\\'\"]*t[\\\\'\"]*(?:\s|<|>).*)|m[\\\\'\"]*(?:y[\\\\'\"]*s[\\\\'\"]*q[\\\\'\"]*l(?:[\\\\'\"]*(?:d[\\\\'\"]*u[\\\\'\"]*m[\\\\'\"]*p(?:[\\\\'\"]*s[\\\\'\"]*l[\\\\'\"]*o[\\\\'\"]*w)?|h[\\\\'\"]*o[\\\\'\"]*t[\\\\'\"]*c[\\\\'\"]*o[\\\\'\"]*p[\\\\'\"]*y|a[\\\\'\"]*d[\\\\'\"]*m[\\\\'\"]*i[\\\\'\"]*n|s[\\\\'\"]*h[\\\\'\"]*o[\\\\'\"]*w))?|(?:(?:o[\\\\'\"]*u[\\\\'\"]*n|u[\\\\'\"]*t)[\\\\'\"]*t|v)[\\\\'\"]*(?:\s|<|>).*)|x[\\\\'\"]*(?:z[\\\\'\"]*(?:(?:[ef][\\\\'\"]*)?g[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*p|d[\\\\'\"]*(?:i[\\\\'\"]*f[\\\\'\"]*f|e[\\\\'\"]*c)|c[\\\\'\"]*(?:a[\\\\'\"]*t|m[\\\\'\"]*p)|l[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*s|m[\\\\'\"]*o[\\\\'\"]*r[\\\\'\"]*e|(?:\s|<|>).*)|a[\\\\'\"]*r[\\\\'\"]*g[\\\\'\"]*s|t[\\\\'\"]*e[\\\\'\"]*r[\\\\'\"]*m|x[\\\\'\"]*d[\\\\'\"]*(?:\s|<|>).*)|z[\\\\'\"]*(?:(?:[ef][\\\\'\"]*)?g[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*p|c[\\\\'\"]*(?:a[\\\\'\"]*t|m[\\\\'\"]*p)|d[\\\\'\"]*i[\\\\'\"]*f[\\\\'\"]*f|i[\\\\'\"]*p[\\\\'\"]*(?:\s|<|>).*|l[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*s|m[\\\\'\"]*o[\\\\'\"]*r[\\\\'\"]*e|r[\\\\'\"]*u[\\\\'\"]*n|s[\\\\'\"]*h)|o[\\\\'\"]*(?:p[\\\\'\"]*e[\\\\'\"]*n[\\\\'\"]*s[\\\\'\"]*s[\\\\'\"]*l|n[\\\\'\"]*i[\\\\'\"]*n[\\\\'\"]*t[\\\\'\"]*r)|w[\\\\'\"]*(?:h[\\\\'\"]*o[\\\\'\"]*(?:a[\\\\'\"]*m[\\\\'\"]*i|(?:\s|<|>).*)|g[\\\\'\"]*e[\\\\'\"]*t|3[\\\\'\"]*m)|v[\\\\'\"]*i[\\\\'\"]*(?:m[\\\\'\"]*(?:\s|<|>).*|g[\\\\'\"]*r|p[\\\\'\"]*w)|y[\\\\'\"]*u[\\\\'\"]*m)\b" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "q" (Variable: ARGS_NAMES:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: ""><script>alert(1)</script>" (Variable: ARGS:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 932110) Executing operator "Rx" with param "(?i)(?:;|\{|\||\|\||&|&&|\n|\r|)\s
[(,@'"\s]
(?:[\w'"./]+/|[\\'"^]
\w[\\'"^]
:.
\\|[^\.\w '\"/\\\\]]
\\)?["^]
(?:m["^]
(?:y["^]*s["^]*q["^]l(?:["^](?:d["^]*u["^]*m["^]*p(?:["^]*s["^]*l["^]*o["^]*w)?|h["^]*o["^]*t["^]*c["^]*o["^]*p["^]*y|a["^]*d["^]*m["^]*i["^]*n|s["^]*h["^]o["^]w))?|s["^](?:i["^](?:n["^]*f["^]*o["^]*3["^]*2|e["^]*x["^]*e["^]*c)|c["^]*o["^]*n["^]*f["^]i["^]g|g["^](?:[\s,;]|.|/|<|>).|t["^]*s["^]c)|o["^](?:u["^]n["^]t["^](?:(?:[\s,;]|.|/|<|>).|v["^]*o["^]*l)|v["^]*e["^]*u["^]*s["^]e["^]r|[dr]["^]e["^](?:[\s,;]|.|/|<|>).)|k["^](?:d["^]i["^]r["^](?:[\s,;]|.|/|<|>).|l["^]*i["^]*n["^]k)|d["^](?:s["^]*c["^]*h["^]*e["^]d|(?:[\s,;]|.|/|<|>).)|a["^]*p["^]*i["^]*s["^]*e["^]*n["^]*d|b["^]*s["^]*a["^]*c["^]*l["^]*i|e["^]*a["^]*s["^]*u["^]*r["^]*e|m["^]*s["^]y["^]s)|d["^](?:i["^](?:s["^]k["^](?:(?:m["^]*g["^]*m|p["^]*a["^]*r)["^]*t|s["^]*h["^]*a["^]d["^]o["^]w)|r["^](?:(?:[\s,;]|.|/|<|>).|u["^]s["^]e)|f["^]f["^](?:[\s,;]|.|/|<|>).)|e["^](?:l["^](?:p["^]*r["^]*o["^]*f|t["^]*r["^]e["^]e|(?:[\s,;]|.|/|<|>).)|v["^](?:m["^]*g["^]*m["^]*t|c["^]*o["^]*n)|(?:f["^]*r["^]*a|b["^]u)["^]g)|s["^](?:a["^](?:c["^]*l["^]*s|d["^]*d)|q["^]*u["^]*e["^]*r["^]*y|m["^]o["^](?:v["^]*e|d)|g["^]*e["^]*t|r["^]*m)|(?:r["^]*i["^]*v["^]*e["^]*r["^]*q["^]*u["^]*e["^]*r|o["^]*s["^]*k["^]*e)["^]*y|(?:c["^]*o["^]*m["^]*c["^]*n["^]*f|x["^]*d["^]*i["^]*a)["^]*g|a["^]t["^]e["^](?:[\s,;]|.|/|<|>).|n["^]*s["^]s["^]t["^]a["^]t)|c["^](?:o["^](?:m["^](?:p["^](?:(?:a["^]c["^]t["^])?(?:[\s,;]|.|/|<|>).|m["^]*g["^]*m["^]*t)|e["^]*x["^]p)|n["^](?:2["^]*p|v["^]*e)["^]*r["^]*t|p["^]y)|l["^](?:e["^]a["^](?:n["^]*m["^]*g["^]*r|r["^]*m["^]*e["^]*m)|u["^]*s["^]*t["^]e["^]r)|h["^](?:k["^](?:n["^]*t["^]*f["^]*s|d["^]s["^]k)|d["^]i["^]r["^](?:[\s,;]|.|/|<|>).)|s["^](?:c["^](?:r["^]*i["^]*p["^]*t|c["^]*m["^]*d)|v["^]*d["^]*e)|e["^]*r["^]t["^](?:u["^]*t["^]*i["^]*l|r["^]e["^]q)|a["^](?:l["^]l["^](?:[\s,;]|.|/|<|>).|c["^]*l["^]*s)|m["^]*d(?:["^]*k["^]*e["^]*y)?|i["^]*p["^]*h["^]*e["^]*r|u["^]*r["^]l)|f["^](?:o["^]r["^](?:m["^]a["^]t["^](?:[\s,;]|.|/|<|>).|f["^]*i["^]*l["^]*e["^]*s|e["^]*a["^]*c["^]*h)|i["^]n["^]d["^](?:(?:[\s,;]|.|/|<|>).|s["^]*t["^]r)|s["^](?:m["^]*g["^]*m["^]*t|u["^]t["^]i["^]l)|t["^](?:p["^](?:[\s,;]|.|/|<|>).|y["^]*p["^]*e)|r["^]*e["^]*e["^]*d["^]*i["^]s["^]k|c["^](?:[\s,;]|.|/|<|>).|g["^]*r["^]e["^]p)|n["^](?:e["^]t["^](?:s["^](?:t["^]*a["^]*t|v["^]c|h)|(?:[\s,;]|.|/|<|>).|c["^]*a["^]*t|d["^]*o["^]m)|t["^](?:b["^]*a["^]*c["^]*k["^]*u["^]*p|r["^]*i["^]*g["^]*h["^]*t["^]*s)|(?:s["^]*l["^]*o["^]*o["^]*k["^]*u|m["^]a)["^]p|c["^](?:(?:[\s,;]|.|/|<|>).|a["^]*t)|b["^]*t["^]*s["^]*t["^]*a["^]t)|e["^](?:x["^]p["^](?:a["^]n["^]d["^](?:[\s,;]|.|/|<|>).|l["^]*o["^]*r["^]*e["^]*r)|v["^]*e["^]*n["^]t["^](?:c["^]*r["^]*e["^]*a["^]*t["^]*e|v["^]*w["^]*r)|n["^]*d["^]*l["^]*o["^]*c["^]*a["^]*l|g["^]*r["^]*e["^]*p|r["^]*a["^]*s["^]*e|c["^]*h["^]o)|g["^](?:a["^]*t["^]*h["^]*e["^]*r["^]*n["^]*e["^]*t["^]*w["^]*o["^]*r["^]*k["^]*i["^]*n["^]*f["^]o|p["^](?:(?:r["^]*e["^]*s["^]*u["^]*l|e["^]*d["^]*i)["^]*t|u["^]*p["^]*d["^]*a["^]*t["^]e)|i["^]t["^](?:[\s,;]|.|/|<|>).|e["^]*t["^]m["^]a["^]c)|i["^](?:r["^]b(?:["^](?:1(?:["^][89])?|2["^][012]))?|f["^]*m["^]*e["^]*m["^]*b["^]*e["^]*r|p["^]*c["^]*o["^]*n["^]*f["^]*i["^]*g|n["^]*e["^]*t["^]*c["^]*p["^]*l|c["^]*a["^]*c["^]l["^]s)|a["^](?:d["^](?:d["^]*u["^]*s["^]*e["^]*r["^]*s|m["^]*o["^]*d["^]*c["^]*m["^]d)|r["^]p["^](?:[\s,;]|.|/|<|>).|t["^]*t["^]*r["^]*i["^]*b|s["^]*s["^]*o["^]*c|z["^]*m["^]*a["^]n)|l["^](?:o["^]g["^](?:e["^]*v["^]*e["^]*n["^]*t|t["^]*i["^]*m["^]*e|m["^]*a["^]*n|o["^]*f["^]*f)|a["^]*b["^]e["^]l["^](?:[\s,;]|.|/|<|>).|u["^]*s["^]*r["^]*m["^]*g["^]r)|b["^](?:(?:c["^]d["^](?:b["^]*o["^]*o|e["^]*d["^]*i)|r["^]*o["^]*w["^]*s["^]*t["^]*a)["^]*t|i["^]*t["^]*s["^]*a["^]*d["^]*m["^]*i["^]*n|o["^]*o["^]*t["^]*c["^]*f["^]g)|h["^](?:o["^]*s["^]*t["^]*n["^]*a["^]*m["^]*e|d["^]*w["^]*w["^]*i["^]z)|j["^]a["^]v["^]a["^](?:[\s,;]|.|/|<|>).|7["^]z(?:["^][ar])?)(?:.["^]\w+)?\b" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/.
[157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "q" (Variable: ARGS_NAMES:q)
[157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: ""><script>alert(1)</script>" (Variable: ARGS:q)
[157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0.
[157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned.
[157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 932115) Executing operator "Rx" with param "(?i)(?:;|{||||||&|&&|\n|\r|)\s*[\(,@\'\"\s]*(?:[\w'\"\./]+/|[\\\\'\"\^]*\w[\\\\'\"\^]*:.*\\\\|[\^\.\w '\"/\\\\]*\\\\)?[\"\^]*(?:s[\"\^]*(?:y[\"\^]*s[\"\^]*(?:t[\"\^]*e[\"\^]*m[\"\^]*(?:p[\"\^]*r[\"\^]*o[\"\^]*p[\"\^]*e[\"\^]*r[\"\^]*t[\"\^]*i[\"\^]*e[\"\^]*s[\"\^]*(?:d[\"\^]*a[\"\^]*t[\"\^]*a[\"\^]*e[\"\^]*x[\"\^]*e[\"\^]*c[\"\^]*u[\"\^]*t[\"\^]*i[\"\^]*o[\"\^]*n[\"\^]*p[\"\^]*r[\"\^]*e[\"\^]*v[\"\^]*e[\"\^]*n[\"\^]*t[\"\^]*i[\"\^]*o[\"\^]*n|(?:p[\"\^]*e[\"\^]*r[\"\^]*f[\"\^]*o[\"\^]*r[\"\^]*m[\"\^]*a[\"\^]*n[\"\^]*c|h[\"\^]*a[\"\^]*r[\"\^]*d[\"\^]*w[\"\^]*a[\"\^]*r)[\"\^]*e|a[\"\^]*d[\"\^]*v[\"\^]*a[\"\^]*n[\"\^]*c[\"\^]*e[\"\^]*d)|i[\"\^]*n[\"\^]*f[\"\^]*o)|k[\"\^]*e[\"\^]*y|d[\"\^]*m)|h[\"\^]*(?:o[\"\^]*(?:w[\"\^]*(?:g[\"\^]*r[\"\^]*p|m[\"\^]*b[\"\^]*r)[\"\^]*s|r[\"\^]*t[\"\^]*c[\"\^]*u[\"\^]*t)|e[\"\^]*l[\"\^]*l[\"\^]*r[\"\^]*u[\"\^]*n[\"\^]*a[\"\^]*s|u[\"\^]*t[\"\^]*d[\"\^]*o[\"\^]*w[\"\^]*n|r[\"\^]*p[\"\^]*u[\"\^]*b[\"\^]*w|a[\"\^]*r[\"\^]*e|i[\"\^]*f[\"\^]*t)|e[\"\^]*(?:t[\"\^]*(?:(?:x[\"\^]*)?(?:[\s,;]|\.|/|<|>).*|l[\"\^]*o[\"\^]*c[\"\^]*a[\"\^]*l)|c[\"\^]*p[\"\^]*o[\"\^]*l|l[\"\^]*e[\"\^]*c[\"\^]*t)|c[\"\^]*(?:h[\"\^]*t[\"\^]*a[\"\^]*s[\"\^]*k[\"\^]*s|l[\"\^]*i[\"\^]*s[\"\^]*t)|u[\"\^]*b[\"\^]*(?:i[\"\^]*n[\"\^]*a[\"\^]*c[\"\^]*l|s[\"\^]*t)|t[\"\^]*a[\"\^]*r[\"\^]*t[\"\^]*(?:[\s,;]|\.|/|<|>).*|i[\"\^]*g[\"\^]*v[\"\^]*e[\"\^]*r[\"\^]*i[\"\^]*f|l[\"\^]*(?:e[\"\^]*e[\"\^]*p|m[\"\^]*g[\"\^]*r)|o[\"\^]*r[\"\^]*t|f[\"\^]*c|v[\"\^]*n)|p[\"\^]*(?:s[\"\^]*(?:s[\"\^]*(?:h[\"\^]*u[\"\^]*t[\"\^]*d[\"\^]*o[\"\^]*w[\"\^]*n|e[\"\^]*r[\"\^]*v[\"\^]*i[\"\^]*c[\"\^]*e|u[\"\^]*s[\"\^]*p[\"\^]*e[\"\^]*n[\"\^]*d)|l[\"\^]*(?:o[\"\^]*g[\"\^]*(?:g[\"\^]*e[\"\^]*d[\"\^]*o[\"\^]*n|l[\"\^]*i[\"\^]*s[\"\^]*t)|i[\"\^]*s[\"\^]*t)|p[\"\^]*(?:a[\"\^]*s[\"\^]*s[\"\^]*w[\"\^]*d|i[\"\^]*n[\"\^]*g)|g[\"\^]*e[\"\^]*t[\"\^]*s[\"\^]*i[\"\^]*d|e[\"\^]*x[\"\^]*e[\"\^]*c|f[\"\^]*i[\"\^]*l[\"\^]*e|i[\"\^]*n[\"\^]*f[\"\^]*o|k[\"\^]*i[\"\^]*l[\"\^]*l)|o[\"\^]*(?:w[\"\^]*e[\"\^]*r[\"\^]*(?:s[\"\^]*h[\"\^]*e[\"\^]*l[\"\^]*l(?:[\"\^]*_[\"\^]*i[\"\^]*s[\"\^]*e)?|c[\"\^]*f[\"\^]*g)|r[\"\^]*t[\"\^]*q[\"\^]*r[\"\^]*y|p[\"\^]*d)|r[\"\^]*(?:i[\"\^]*n[\"\^]*t[\"\^]*(?:(?:[\s,;]|\.|/|<|>).*|b[\"\^]*r[\"\^]*m)|n[\"\^]*(?:c[\"\^]*n[\"\^]*f[\"\^]*g|m[\"\^]*n[\"\^]*g[\"\^]*r)|o[\"\^]*m[\"\^]*p[\"\^]*t)|a[\"\^]*t[\"\^]*h[\"\^]*(?:p[\"\^]*i[\"\^]*n[\"\^]*g|(?:[\s,;]|\.|/|<|>).*)|e[\"\^]*r[\"\^]*(?:l(?:[\"\^]*(?:s[\"\^]*h|5))?|f[\"\^]*m[\"\^]*o[\"\^]*n)|y[\"\^]*t[\"\^]*h[\"\^]*o[\"\^]*n(?:[\"\^]*(?:3(?:[\"\^]*m)?|2))?|k[\"\^]*g[\"\^]*m[\"\^]*g[\"\^]*r|h[\"\^]*p(?:[\"\^]*[57])?|u[\"\^]*s[\"\^]*h[\"\^]*d|i[\"\^]*n[\"\^]*g)|r[\"\^]*(?:e[\"\^]*(?:(?:p[\"\^]*l[\"\^]*a[\"\^]*c[\"\^]*e|n(?:[\"\^]*a[\"\^]*m[\"\^]*e)?|s[\"\^]*e[\"\^]*t)[\"\^]*(?:[\s,;]|\.|/|<|>).*|g[\"\^]*(?:s[\"\^]*v[\"\^]*r[\"\^]*3[\"\^]*2|e[\"\^]*d[\"\^]*i[\"\^]*t|(?:[\s,;]|\.|/|<|>).*|i[\"\^]*n[\"\^]*i)|c[\"\^]*(?:d[\"\^]*i[\"\^]*s[\"\^]*c|o[\"\^]*v[\"\^]*e[\"\^]*r)|k[\"\^]*e[\"\^]*y[\"\^]*w[\"\^]*i[\"\^]*z)|u[\"\^]*(?:n[\"\^]*(?:d[\"\^]*l[\"\^]*l[\"\^]*3[\"\^]*2|a[\"\^]*s)|b[\"\^]*y[\"\^]*(?:1(?:[\"\^]*[89])?|2[\"\^]*[012]))|a[\"\^]*(?:s[\"\^]*(?:p[\"\^]*h[\"\^]*o[\"\^]*n[\"\^]*e|d[\"\^]*i[\"\^]*a[\"\^]*l)|r[\"\^]*(?:[\s,;]|\.|/|<|>).*)|m[\"\^]*(?:(?:d[\"\^]*i[\"\^]*r[\"\^]*)?(?:[\s,;]|\.|/|<|>).*|t[\"\^]*s[\"\^]*h[\"\^]*a[\"\^]*r[\"\^]*e)|o[\"\^]*(?:u[\"\^]*t[\"\^]*e[\"\^]*(?:[\s,;]|\.|/|<|>).*|b[\"\^]*o[\"\^]*c[\"\^]*o[\"\^]*p[\"\^]*y)|s[\"\^]*(?:t[\"\^]*r[\"\^]*u[\"\^]*i|y[\"\^]*n[\"\^]*c)|d[\"\^]*(?:[\s,;]|\.|/|<|>).*)|t[\"\^]*(?:a[\"\^]*(?:s[\"\^]*k[\"\^]*(?:k[\"\^]*i[\"\^]*l[\"\^]*l|l[\"\^]*i[\"\^]*s[\"\^]*t|s[\"\^]*c[\"\^]*h[\"\^]*d|m[\"\^]*g[\"\^]*r)|k[\"\^]*e[\"\^]*o[\"\^]*w[\"\^]*n)|(?:i[\"\^]*m[\"\^]*e[\"\^]*o[\"\^]*u|p[\"\^]*m[\"\^]*i[\"\^]*n[\"\^]*i|e[\"\^]*l[\"\^]*n[\"\^]*e|l[\"\^]*i[\"\^]*s)[\"\^]*t|s[\"\^]*(?:d[\"\^]*i[\"\^]*s[\"\^]*c[\"\^]*o|s[\"\^]*h[\"\^]*u[\"\^]*t[\"\^]*d)[\"\^]*n|y[\"\^]*p[\"\^]*e[\"\^]*(?:p[\"\^]*e[\"\^]*r[\"\^]*f|(?:[\s,;]|\.|/|<|>).*)|r[\"\^]*(?:a[\"\^]*c[\"\^]*e[\"\^]*r[\"\^]*t|e[\"\^]*e))|w[\"\^]*(?:i[\"\^]*n[\"\^]*(?:d[\"\^]*i[\"\^]*f[\"\^]*f|m[\"\^]*s[\"\^]*d[\"\^]*p|v[\"\^]*a[\"\^]*r|r[\"\^]*[ms])|u[\"\^]*(?:a[\"\^]*(?:u[\"\^]*c[\"\^]*l[\"\^]*t|p[\"\^]*p)|s[\"\^]*a)|s[\"\^]*c[\"\^]*(?:r[\"\^]*i[\"\^]*p[\"\^]*t|u[\"\^]*i)|e[\"\^]*v[\"\^]*t[\"\^]*u[\"\^]*t[\"\^]*i[\"\^]*l|m[\"\^]*i[\"\^]*(?:m[\"\^]*g[\"\^]*m[\"\^]*t|c)|a[\"\^]*i[\"\^]*t[\"\^]*f[\"\^]*o[\"\^]*r|h[\"\^]*o[\"\^]*a[\"\^]*m[\"\^]*i|g[\"\^]*e[\"\^]*t)|u[\"\^]*(?:s[\"\^]*(?:e[\"\^]*r[\"\^]*a[\"\^]*c[\"\^]*c[\"\^]*o[\"\^]*u[\"\^]*n[\"\^]*t[\"\^]*c[\"\^]*o[\"\^]*n[\"\^]*t[\"\^]*r[\"\^]*o[\"\^]*l[\"\^]*s[\"\^]*e[\"\^]*t[\"\^]*t[\"\^]*i[\"\^]*n[\"\^]*g[\"\^]*s|r[\"\^]*s[\"\^]*t[\"\^]*a[\"\^]*t)|n[\"\^]*(?:r[\"\^]*a[\"\^]*r|z[\"\^]*i[\"\^]*p))|q[\"\^]*(?:u[\"\^]*e[\"\^]*r[\"\^]*y[\"\^]*(?:[\s,;]|\.|/|<|>).*|p[\"\^]*r[\"\^]*o[\"\^]*c[\"\^]*e[\"\^]*s[\"\^]*s|w[\"\^]*i[\"\^]*n[\"\^]*s[\"\^]*t[\"\^]*a|g[\"\^]*r[\"\^]*e[\"\^]*p)|o[\"\^]*(?:d[\"\^]*b[\"\^]*c[\"\^]*(?:a[\"\^]*d[\"\^]*3[\"\^]*2|c[\"\^]*o[\"\^]*n[\"\^]*f)|p[\"\^]*e[\"\^]*n[\"\^]*f[\"\^]*i[\"\^]*l[\"\^]*e[\"\^]*s)|v[\"\^]*(?:o[\"\^]*l[\"\^]*(?:[\s,;]|\.|/|<|>).*|e[\"\^]*r[\"\^]*i[\"\^]*f[\"\^]*y)|x[\"\^]*c[\"\^]*(?:a[\"\^]*c[\"\^]*l[\"\^]*s|o[\"\^]*p[\"\^]*y)|z[\"\^]*i[\"\^]*p[\"\^]*(?:[\s,;]|\.|/|<|>).*)(?:\.[\"\^]*\w+)?\b" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "q" (Variable: ARGS_NAMES:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: ""><script>alert(1)</script>" (Variable: ARGS:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 932120) Executing operator "PmFromFile" with param "windows-powershell-commands.data" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:cmdLine: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:lowercase: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "q" (Variable: ARGS_NAMES:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:cmdLine: "><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:lowercase: "><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "><script>alert(1)</script>" (Variable: ARGS:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 932130) Executing operator "Rx" with param "(?:\$(?:\((?:\(.*\)|.*)\)|\{.*\})|[<>]\(.*\))" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:cmdLine: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "q" (Variable: ARGS_NAMES:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:cmdLine: "><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "><script>alert(1)</script>" (Variable: ARGS:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 932140) Executing operator "Rx" with param "\b(?:if(?:/i)?(?: not)?(?: exist\b| defined\b| errorlevel\b| cmdextversion\b|(?: |\().*(?:\bgeq\b|\bequ\b|\bneq\b|\bleq\b|\bgtr\b|\blss\b|==))|for(?:/[dflr].*)? %+[^ ]+ in\(.*\)\s?do)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:cmdLine: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "q" (Variable: ARGS_NAMES:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:cmdLine: "><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "><script>alert(1)</script>" (Variable: ARGS:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 932150) Executing operator "Rx" with param "(?:^|=)\s*(?:{|\s*\(\s*|\w+=(?:[^\s]*|\$.*|\$.*|<.*|>.*|\'.*\'|\".*\")\s+|!\s*|\$)*\s*(?:'|\")*(?:[\?\*\[\]\(\)\-\|+\w'\"\./\\\\]+/)?[\\\\'\"]*(?:l[\\\\'\"]*(?:s(?:[\\\\'\"]*(?:b[\\\\'\"]*_[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*l[\\\\'\"]*e[\\\\'\"]*a[\\\\'\"]*s[\\\\'\"]*e|c[\\\\'\"]*p[\\\\'\"]*u|m[\\\\'\"]*o[\\\\'\"]*d|p[\\\\'\"]*c[\\\\'\"]*i|u[\\\\'\"]*s[\\\\'\"]*b|-[\\\\'\"]*F|o[\\\\'\"]*f))?|z[\\\\'\"]*(?:(?:[ef][\\\\'\"]*)?g[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*p|c[\\\\'\"]*(?:a[\\\\'\"]*t|m[\\\\'\"]*p)|m[\\\\'\"]*(?:o[\\\\'\"]*r[\\\\'\"]*e|a)|d[\\\\'\"]*i[\\\\'\"]*f[\\\\'\"]*f|l[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*s)|e[\\\\'\"]*s[\\\\'\"]*s[\\\\'\"]*(?:(?:f[\\\\'\"]*i[\\\\'\"]*l|p[\\\\'\"]*i[\\\\'\"]*p)[\\\\'\"]*e|e[\\\\'\"]*c[\\\\'\"]*h[\\\\'\"]*o)|a[\\\\'\"]*s[\\\\'\"]*t[\\\\'\"]*(?:l[\\\\'\"]*o[\\\\'\"]*g(?:[\\\\'\"]*i[\\\\'\"]*n)?|c[\\\\'\"]*o[\\\\'\"]*m[\\\\'\"]*m)|w[\\\\'\"]*p(?:[\\\\'\"]*-[\\\\'\"]*d[\\\\'\"]*o[\\\\'\"]*w[\\\\'\"]*n[\\\\'\"]*l[\\\\'\"]*o[\\\\'\"]*a[\\\\'\"]*d)?|f[\\\\'\"]*t[\\\\'\"]*p(?:[\\\\'\"]*g[\\\\'\"]*e[\\\\'\"]*t)?|y[\\\\'\"]*n[\\\\'\"]*x)|s[\\\\'\"]*(?:e[\\\\'\"]*(?:t[\\\\'\"]*(?:e[\\\\'\"]*n[\\\\'\"]*v|s[\\\\'\"]*i[\\\\'\"]*d)|n[\\\\'\"]*d[\\\\'\"]*m[\\\\'\"]*a[\\\\'\"]*i[\\\\'\"]*l|d)|h(?:[\\\\'\"]*\.[\\\\'\"]*d[\\\\'\"]*i[\\\\'\"]*s[\\\\'\"]*t[\\\\'\"]*r[\\\\'\"]*i[\\\\'\"]*b)?|o[\\\\'\"]*(?:u[\\\\'\"]*r[\\\\'\"]*c[\\\\'\"]*e|c[\\\\'\"]*a[\\\\'\"]*t)|t[\\\\'\"]*r[\\\\'\"]*i[\\\\'\"]*n[\\\\'\"]*g[\\\\'\"]*s|y[\\\\'\"]*s[\\\\'\"]*c[\\\\'\"]*t[\\\\'\"]*l|c[\\\\'\"]*(?:h[\\\\'\"]*e[\\\\'\"]*d|p)|d[\\\\'\"]*i[\\\\'\"]*f[\\\\'\"]*f|f[\\\\'\"]*t[\\\\'\"]*p|u[\\\\'\"]*d[\\\\'\"]*o|s[\\\\'\"]*h|v[\\\\'\"]*n)|p[\\\\'\"]*(?:t[\\\\'\"]*a[\\\\'\"]*r(?:[\\\\'\"]*(?:d[\\\\'\"]*i[\\\\'\"]*f[\\\\'\"]*f|g[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*p))?|y[\\\\'\"]*t[\\\\'\"]*h[\\\\'\"]*o[\\\\'\"]*n(?:[\\\\'\"]*(?:3(?:[\\\\'\"]*m)?|2))?|k[\\\\'\"]*(?:e[\\\\'\"]*x[\\\\'\"]*e[\\\\'\"]*c|i[\\\\'\"]*l[\\\\'\"]*l)|r[\\\\'\"]*i[\\\\'\"]*n[\\\\'\"]*t[\\\\'\"]*e[\\\\'\"]*n[\\\\'\"]*v|(?:g[\\\\'\"]*r[\\\\'\"]*e|f[\\\\'\"]*t)[\\\\'\"]*p|e[\\\\'\"]*r[\\\\'\"]*l(?:[\\\\'\"]*5)?|h[\\\\'\"]*p(?:[\\\\'\"]*[57])?|i[\\\\'\"]*n[\\\\'\"]*g|o[\\\\'\"]*p[\\\\'\"]*d)|n[\\\\'\"]*(?:c(?:[\\\\'\"]*(?:\.[\\\\'\"]*(?:t[\\\\'\"]*r[\\\\'\"]*a[\\\\'\"]*d[\\\\'\"]*i[\\\\'\"]*t[\\\\'\"]*i[\\\\'\"]*o[\\\\'\"]*n[\\\\'\"]*a[\\\\'\"]*l|o[\\\\'\"]*p[\\\\'\"]*e[\\\\'\"]*n[\\\\'\"]*b[\\\\'\"]*s[\\\\'\"]*d)|a[\\\\'\"]*t))?|e[\\\\'\"]*t[\\\\'\"]*(?:k[\\\\'\"]*i[\\\\'\"]*t[\\\\'\"]*-[\\\\'\"]*f[\\\\'\"]*t[\\\\'\"]*p|(?:s[\\\\'\"]*t|c)[\\\\'\"]*a[\\\\'\"]*t)|o[\\\\'\"]*h[\\\\'\"]*u[\\\\'\"]*p|p[\\\\'\"]*i[\\\\'\"]*n[\\\\'\"]*g|s[\\\\'\"]*t[\\\\'\"]*a[\\\\'\"]*t)|t[\\\\'\"]*(?:c[\\\\'\"]*(?:p[\\\\'\"]*(?:t[\\\\'\"]*r[\\\\'\"]*a[\\\\'\"]*c[\\\\'\"]*e[\\\\'\"]*r[\\\\'\"]*o[\\\\'\"]*u[\\\\'\"]*t[\\\\'\"]*e|i[\\\\'\"]*n[\\\\'\"]*g)|s[\\\\'\"]*h)|r[\\\\'\"]*a[\\\\'\"]*c[\\\\'\"]*e[\\\\'\"]*r[\\\\'\"]*o[\\\\'\"]*u[\\\\'\"]*t[\\\\'\"]*e(?:[\\\\'\"]*6)?|i[\\\\'\"]*m[\\\\'\"]*e(?:[\\\\'\"]*o[\\\\'\"]*u[\\\\'\"]*t)?|a[\\\\'\"]*(?:i[\\\\'\"]*l(?:[\\\\'\"]*f)?|r)|e[\\\\'\"]*l[\\\\'\"]*n[\\\\'\"]*e[\\\\'\"]*t)|r[\\\\'\"]*(?:e[\\\\'\"]*(?:p[\\\\'\"]*(?:l[\\\\'\"]*a[\\\\'\"]*c[\\\\'\"]*e|e[\\\\'\"]*a[\\\\'\"]*t)|a[\\\\'\"]*l[\\\\'\"]*p[\\\\'\"]*a[\\\\'\"]*t[\\\\'\"]*h|n[\\\\'\"]*a[\\\\'\"]*m[\\\\'\"]*e)|u[\\\\'\"]*b[\\\\'\"]*y(?:[\\\\'\"]*(?:1(?:[\\\\'\"]*[89])?|2[\\\\'\"]*[012]))?|m[\\\\'\"]*(?:u[\\\\'\"]*s[\\\\'\"]*e|d[\\\\'\"]*i)[\\\\'\"]*r|n[\\\\'\"]*a[\\\\'\"]*n[\\\\'\"]*o|s[\\\\'\"]*y[\\\\'\"]*n[\\\\'\"]*c|c[\\\\'\"]*p)|b[\\\\'\"]*(?:z[\\\\'\"]*(?:(?:[ef][\\\\'\"]*)?g[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*p|d[\\\\'\"]*i[\\\\'\"]*f[\\\\'\"]*f|l[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*s|m[\\\\'\"]*o[\\\\'\"]*r[\\\\'\"]*e|c[\\\\'\"]*a[\\\\'\"]*t)|s[\\\\'\"]*d[\\\\'\"]*(?:c[\\\\'\"]*a[\\\\'\"]*t|i[\\\\'\"]*f[\\\\'\"]*f|t[\\\\'\"]*a[\\\\'\"]*r)|u[\\\\'\"]*i[\\\\'\"]*l[\\\\'\"]*t[\\\\'\"]*i[\\\\'\"]*n|a[\\\\'\"]*s[\\\\'\"]*h)|m[\\\\'\"]*(?:y[\\\\'\"]*s[\\\\'\"]*q[\\\\'\"]*l[\\\\'\"]*(?:d[\\\\'\"]*u[\\\\'\"]*m[\\\\'\"]*p(?:[\\\\'\"]*s[\\\\'\"]*l[\\\\'\"]*o[\\\\'\"]*w)?|h[\\\\'\"]*o[\\\\'\"]*t[\\\\'\"]*c[\\\\'\"]*o[\\\\'\"]*p[\\\\'\"]*y|a[\\\\'\"]*d[\\\\'\"]*m[\\\\'\"]*i[\\\\'\"]*n|s[\\\\'\"]*h[\\\\'\"]*o[\\\\'\"]*w)|l[\\\\'\"]*o[\\\\'\"]*c[\\\\'\"]*a[\\\\'\"]*t[\\\\'\"]*e|a[\\\\'\"]*i[\\\\'\"]*l[\\\\'\"]*q)|u[\\\\'\"]*(?:n[\\\\'\"]*(?:c[\\\\'\"]*o[\\\\'\"]*m[\\\\'\"]*p[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*s|l[\\\\'\"]*z[\\\\'\"]*m[\\\\'\"]*a|a[\\\\'\"]*m[\\\\'\"]*e|r[\\\\'\"]*a[\\\\'\"]*r|s[\\\\'\"]*e[\\\\'\"]*t|z[\\\\'\"]*i[\\\\'\"]*p|x[\\\\'\"]*z)|s[\\\\'\"]*e[\\\\'\"]*r[\\\\'\"]*(?:(?:a[\\\\'\"]*d|m[\\\\'\"]*o)[\\\\'\"]*d|d[\\\\'\"]*e[\\\\'\"]*l))|x[\\\\'\"]*(?:z(?:[\\\\'\"]*(?:(?:[ef][\\\\'\"]*)?g[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*p|d[\\\\'\"]*(?:i[\\\\'\"]*f[\\\\'\"]*f|e[\\\\'\"]*c)|c[\\\\'\"]*(?:a[\\\\'\"]*t|m[\\\\'\"]*p)|l[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*s|m[\\\\'\"]*o[\\\\'\"]*r[\\\\'\"]*e))?|a[\\\\'\"]*r[\\\\'\"]*g[\\\\'\"]*s)|z[\\\\'\"]*(?:(?:(?:[ef][\\\\'\"]*)?g[\\\\'\"]*r[\\\\'\"]*e|i)[\\\\'\"]*p|c[\\\\'\"]*(?:a[\\\\'\"]*t|m[\\\\'\"]*p)|d[\\\\'\"]*i[\\\\'\"]*f[\\\\'\"]*f|l[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*s|m[\\\\'\"]*o[\\\\'\"]*r[\\\\'\"]*e|r[\\\\'\"]*u[\\\\'\"]*n|s[\\\\'\"]*h)|f[\\\\'\"]*(?:t[\\\\'\"]*p[\\\\'\"]*(?:s[\\\\'\"]*t[\\\\'\"]*a[\\\\'\"]*t[\\\\'\"]*s|w[\\\\'\"]*h[\\\\'\"]*o)|i[\\\\'\"]*l[\\\\'\"]*e[\\\\'\"]*t[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*t|e[\\\\'\"]*t[\\\\'\"]*c[\\\\'\"]*h|g[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*p)|c[\\\\'\"]*(?:o[\\\\'\"]*(?:m[\\\\'\"]*m[\\\\'\"]*a[\\\\'\"]*n[\\\\'\"]*d|p[\\\\'\"]*r[\\\\'\"]*o[\\\\'\"]*c)|u[\\\\'\"]*r[\\\\'\"]*l|s[\\\\'\"]*h|c)|e[\\\\'\"]*(?:g[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*p|c[\\\\'\"]*h[\\\\'\"]*o|v[\\\\'\"]*a[\\\\'\"]*l|x[\\\\'\"]*e[\\\\'\"]*c|n[\\\\'\"]*v)|d[\\\\'\"]*(?:m[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*g|a[\\\\'\"]*s[\\\\'\"]*h|i[\\\\'\"]*f[\\\\'\"]*f|o[\\\\'\"]*a[\\\\'\"]*s)|g[\\\\'\"]*(?:z[\\\\'\"]*(?:c[\\\\'\"]*a[\\\\'\"]*t|i[\\\\'\"]*p)|r[\\\\'\"]*e[\\\\'\"]*p|c[\\\\'\"]*c)|j[\\\\'\"]*(?:o[\\\\'\"]*b[\\\\'\"]*s[\\\\'\"]*\s+[\\\\'\"]*-[\\\\'\"]*x|a[\\\\'\"]*v[\\\\'\"]*a)|w[\\\\'\"]*(?:h[\\\\'\"]*o[\\\\'\"]*a[\\\\'\"]*m[\\\\'\"]*i|g[\\\\'\"]*e[\\\\'\"]*t|3[\\\\'\"]*m)|i[\\\\'\"]*r[\\\\'\"]*b(?:[\\\\'\"]*(?:1(?:[\\\\'\"]*[89])?|2[\\\\'\"]*[012]))?|o[\\\\'\"]*n[\\\\'\"]*i[\\\\'\"]*n[\\\\'\"]*t[\\\\'\"]*r|h[\\\\'\"]*(?:e[\\\\'\"]*a[\\\\'\"]*d|u[\\\\'\"]*p)|v[\\\\'\"]*i[\\\\'\"]*(?:g[\\\\'\"]*r|p[\\\\'\"]*w)|G[\\\\'\"]*E[\\\\'\"]*T)[\\\\'\"]*(?:\s|;|\||&|<|>)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "q" (Variable: ARGS_NAMES:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: ""><script>alert(1)</script>" (Variable: ARGS:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 932160) Executing operator "PmFromFile" with param "unix-shell.data" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:cmdLine: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:normalizePath: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:lowercase: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "q" (Variable: ARGS_NAMES:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:cmdLine: "><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:normalizePath: "><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:lowercase: "><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "><script>alert(1)</script>" (Variable: ARGS:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 932170) Executing operator "Rx" with param "^\(\s*\)\s+{" against REQUEST_HEADERS|REQUEST_LINE. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecode: "localhost:8080" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "localhost:8080" (Variable: REQUEST_HEADERS:Host) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecode: "curl/7.54.0" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "curl/7.54.0" (Variable: REQUEST_HEADERS:User-Agent) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecode: "*/*" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "*/*" (Variable: REQUEST_HEADERS:Accept) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecode: "GET /?q="><script>alert(1)</script> HTTP/1.1" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "GET /?q="><script>alert(1)</script> HTTP/1.1" (Variable: REQUEST_LINE) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 932171) Executing operator "Rx" with param "^\(\s*\)\s+{" against ARGS_NAMES|ARGS|FILES_NAMES. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecode: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "q" (Variable: ARGS_NAMES:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecode: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: ""><script>alert(1)</script>" (Variable: ARGS:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 932180) Executing operator "PmFromFile" with param "restricted-upload.data" against FILES|REQUEST_HEADERS:X-Filename|REQUEST_HEADERS:X_Filename|REQUEST_HEADERS:X-File-Name. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 932014) Executing operator "Lt" with param "2" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: skipAfter [157893220069.056272] [/?q="><script>alert(1)</script>] [5] Setting skipAfter for: END-REQUEST-932-APPLICATION-ATTACK-RCE [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '932016' due to a SecMarker: END-REQUEST-932-APPLICATION-ATTACK-RCE [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '932106' due to a SecMarker: END-REQUEST-932-APPLICATION-ATTACK-RCE [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '932190' due to a SecMarker: END-REQUEST-932-APPLICATION-ATTACK-RCE [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '932018' due to a SecMarker: END-REQUEST-932-APPLICATION-ATTACK-RCE [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '0' due to a SecMarker: END-REQUEST-932-APPLICATION-ATTACK-RCE [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: END-REQUEST-932-APPLICATION-ATTACK-RCE [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Out of a SecMarker after skip 5 rules. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 933012) Executing operator "Lt" with param "1" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 933100) Executing operator "Rx" with param "(?:<\?(?:[^x]|x[^m]|xm[^l]|xml[^\s]|xml$|$)|<\?php|\[(?:\/|\\\\)?php\])" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:lowercase: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "q" (Variable: ARGS_NAMES:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:lowercase: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: ""><script>alert(1)</script>" (Variable: ARGS:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 933110) Executing operator "Rx" with param ".*\.(?:php\d*|phtml)\.*$" against FILES|REQUEST_HEADERS:X-Filename|REQUEST_HEADERS:X_Filename|REQUEST_HEADERS:X.Filename|REQUEST_HEADERS:X-File-Name. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 933120) Executing operator "PmFromFile" with param "php-config-directives.data" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:normalisePath: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:lowercase: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "q" (Variable: ARGS_NAMES:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:normalisePath: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:lowercase: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: ""><script>alert(1)</script>" (Variable: ARGS:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 933130) Executing operator "PmFromFile" with param "php-variables.data" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:normalisePath: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:lowercase: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "q" (Variable: ARGS_NAMES:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:normalisePath: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:lowercase: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: ""><script>alert(1)</script>" (Variable: ARGS:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 933140) Executing operator "Rx" with param "(?i)php://(?:std(?:in|out|err)|(?:in|out)put|fd|memory|temp|filter)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "q" (Variable: ARGS_NAMES:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: ""><script>alert(1)</script>" (Variable: ARGS:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 933200) Executing operator "Rx" with param "(?i:zlib|glob|phar|ssh2|rar|ogg|expect|zip)://" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:utf8toUnicode: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:removeNulls: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:cmdLine: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "q" (Variable: ARGS_NAMES:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:utf8toUnicode: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:removeNulls: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:cmdLine: "><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "><script>alert(1)</script>" (Variable: ARGS:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 933150) Executing operator "PmFromFile" with param "php-function-names-933150.data" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|REQUEST_FILENAME|ARGS_NAMES|ARGS|XML:/*. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:lowercase: "/" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "/" (Variable: REQUEST_FILENAME) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:lowercase: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "q" (Variable: ARGS_NAMES:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:lowercase: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: ""><script>alert(1)</script>" (Variable: ARGS:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 933160) Executing operator "Rx" with param "(?i)\b(?:s(?:e(?:t(?:_(?:e(?:xception|rror)_handler|magic_quotes_runtime|include_path)|defaultstub)|ssion_s(?:et_save_handler|tart))|qlite_(?:(?:(?:unbuffered|single|array)_)?query|create_(?:aggregate|function)|p?open|exec)|tr(?:eam_(?:context_create|socket_client)|ipc?slashes|rev)|implexml_load_(?:string|file)|ocket_c(?:onnect|reate)|h(?:ow_sourc|a1_fil)e|pl_autoload_register|ystem)|p(?:r(?:eg_(?:replace(?:_callback(?:_array)?)?|match(?:_all)?|split)|oc_(?:(?:terminat|clos|nic)e|get_status|open)|int_r)|o(?:six_(?:get(?:(?:e[gu]|g)id|login|pwnam)|mk(?:fifo|nod)|ttyname|kill)|pen)|hp(?:_(?:strip_whitespac|unam)e|version|info)|g_(?:(?:execut|prepar)e|connect|query)|a(?:rse_(?:ini_file|str)|ssthru)|utenv)|r(?:unkit_(?:function_(?:re(?:defin|nam)e|copy|add)|method_(?:re(?:defin|nam)e|copy|add)|constant_(?:redefine|add))|e(?:(?:gister_(?:shutdown|tick)|name)_function|ad(?:(?:gz)?file|_exif_data|dir))|awurl(?:de|en)code)|i(?:mage(?:createfrom(?:(?:jpe|pn)g|x[bp]m|wbmp|gif)|(?:jpe|pn)g|g(?:d2?|if)|2?wbmp|xbm)|s_(?:(?:(?:execut|write?|read)ab|fi)le|dir)|ni_(?:get(?:_all)?|set)|terator_apply|ptcembed)|g(?:et(?:_(?:c(?:urrent_use|fg_va)r|meta_tags)|my(?:[gpu]id|inode)|(?:lastmo|cw)d|imagesize|env)|z(?:(?:(?:defla|wri)t|encod|fil)e|compress|open|read)|lob)|a(?:rray_(?:u(?:intersect(?:_u?assoc)?|diff(?:_u?assoc)?)|intersect_u(?:assoc|key)|diff_u(?:assoc|key)|filter|reduce|map)|ssert(?:_options)?)|h(?:tml(?:specialchars(?:_decode)?|_entity_decode|entities)|(?:ash(?:_(?:update|hmac))?|ighlight)_file|e(?:ader_register_callback|x2bin))|f(?:i(?:le(?:(?:[acm]tim|inod)e|(?:_exist|perm)s|group)?|nfo_open)|tp_(?:nb_(?:ge|pu)|connec|ge|pu)t|(?:unction_exis|pu)ts|write|open)|o(?:b_(?:get_(?:c(?:ontents|lean)|flush)|end_(?:clean|flush)|clean|flush|start)|dbc_(?:result(?:_all)?|exec(?:ute)?|connect)|pendir)|m(?:b_(?:ereg(?:_(?:replace(?:_callback)?|match)|i(?:_replace)?)?|parse_str)|(?:ove_uploaded|d5)_file|ethod_exists|ysql_query|kdir)|e(?:x(?:if_(?:t(?:humbnail|agname)|imagetype|read_data)|ec)|scapeshell(?:arg|cmd)|rror_reporting|val)|c(?:url_(?:file_create|exec|init)|onvert_uuencode|reate_function|hr)|u(?:n(?:serialize|pack)|rl(?:de|en)code|[ak]?sort)|(?:json_(?:de|en)cod|debug_backtrac|tmpfil)e|b(?:(?:son_(?:de|en)|ase64_en)code|zopen)|var_dump)(?:\s|/\*.*\*/|//.*|#.*)*\(.*\)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|REQUEST_FILENAME|ARGS_NAMES|ARGS|XML:/*. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "/" (Variable: REQUEST_FILENAME) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "q" (Variable: ARGS_NAMES:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: ""><script>alert(1)</script>" (Variable: ARGS:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 933170) Executing operator "Rx" with param "[oOcC]:\d+:\".+?\":\d+:{.*}" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|REQUEST_HEADERS|ARGS_NAMES|ARGS|XML:/*. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "localhost:8080" (Variable: REQUEST_HEADERS:Host) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "curl/7.54.0" (Variable: REQUEST_HEADERS:User-Agent) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "*/*" (Variable: REQUEST_HEADERS:Accept) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "q" (Variable: ARGS_NAMES:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: ""><script>alert(1)</script>" (Variable: ARGS:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 933180) Executing operator "Rx" with param "\$+(?:[a-zA-Z_\x7f-\xff][a-zA-Z0-9_\x7f-\xff]*|\s*{.+})(?:\s|\[.+\]|{.+}|/\*.*\*/|//.*|#.*)*\(.*\)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|REQUEST_FILENAME|ARGS_NAMES|ARGS|XML:/*. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "/" (Variable: REQUEST_FILENAME) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "q" (Variable: ARGS_NAMES:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: ""><script>alert(1)</script>" (Variable: ARGS:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 933210) Executing operator "Rx" with param "(?:(?:\(|\[)[a-zA-Z0-9_.$\"'\[\](){}/*\s]+(?:\)|\])[0-9_.$\"'\[\](){}/*\s]*\([a-zA-Z0-9_.$\"'\[\](){}/*\s].*\)|\([\s]*string[\s]*\)[\s]*(?:\"|'))" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|REQUEST_FILENAME|ARGS_NAMES|ARGS|XML:/*. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecode: "/" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:replaceComments: "/" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:compressWhitespace: "/" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "/" (Variable: REQUEST_FILENAME) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecode: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:replaceComments: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:compressWhitespace: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "q" (Variable: ARGS_NAMES:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecode: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:replaceComments: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:compressWhitespace: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: ""><script>alert(1)</script>" (Variable: ARGS:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 933014) Executing operator "Lt" with param "2" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: skipAfter [157893220069.056272] [/?q="><script>alert(1)</script>] [5] Setting skipAfter for: END-REQUEST-933-APPLICATION-ATTACK-PHP [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: pass. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action pass [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '933151' due to a SecMarker: END-REQUEST-933-APPLICATION-ATTACK-PHP [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '933016' due to a SecMarker: END-REQUEST-933-APPLICATION-ATTACK-PHP [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '933131' due to a SecMarker: END-REQUEST-933-APPLICATION-ATTACK-PHP [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '933161' due to a SecMarker: END-REQUEST-933-APPLICATION-ATTACK-PHP [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '933111' due to a SecMarker: END-REQUEST-933-APPLICATION-ATTACK-PHP [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '933190' due to a SecMarker: END-REQUEST-933-APPLICATION-ATTACK-PHP [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '933018' due to a SecMarker: END-REQUEST-933-APPLICATION-ATTACK-PHP [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Skipped rule id '0' due to a SecMarker: END-REQUEST-933-APPLICATION-ATTACK-PHP [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule: END-REQUEST-933-APPLICATION-ATTACK-PHP [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Out of a SecMarker after skip 8 rules. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 941012) Executing operator "Lt" with param "1" against TX:EXECUTING_PARANOIA_LEVEL. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "1" (Variable: TX:EXECUTING_PARANOIA_LEVEL) [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 0. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars cleaned. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] (Rule: 941100) Executing operator "DetectXSS against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|REQUEST_HEADERS:User-Agent|ARGS_NAMES|ARGS|XML:/*. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:utf8toUnicode: "curl/7.54.0" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: "curl/7.54.0" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:htmlEntityDecode: "curl/7.54.0" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:jsDecode: "curl/7.54.0" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:cssDecode: "curl/7.54.0" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:removeNulls: "curl/7.54.0" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "curl/7.54.0" (Variable: REQUEST_HEADERS:User-Agent) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] libinjection was not able to find any XSS in: curl/7.54.0 [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:utf8toUnicode: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:htmlEntityDecode: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:jsDecode: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:cssDecode: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:removeNulls: "q" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: "q" (Variable: ARGS_NAMES:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [9] libinjection was not able to find any XSS in: q [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:utf8toUnicode: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:urlDecodeUni: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:htmlEntityDecode: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:jsDecode: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:cssDecode: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] T (0) t:removeNulls: ""><script>alert(1)</script>" [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Target value: ""><script>alert(1)</script>" (Variable: ARGS:q) [157893220069.056272] [/?q="><script>alert(1)</script>] [5] detected XSS using libinjection. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Matched vars updated. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:xss_score with value: 5 [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running [independent] (non-disruptive) action: setvar [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Saving variable: TX:anomaly_score_pl1 with value: 5 [157893220069.056272] [/?q="><script>alert(1)</script>] [9] This rule severity is: 2 current transaction is: 2 [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving msg: XSS Attack Detected via libinjection [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Rule returned 1. [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: nolog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: auditlog [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Saving transaction to logs [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: status [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (non-disruptive) action: tag [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule tag: application-multi [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (non-disruptive) action: tag [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule tag: language-multi [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (non-disruptive) action: tag [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule tag: platform-multi [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (non-disruptive) action: tag [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule tag: attack-xss [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (non-disruptive) action: tag [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule tag: paranoia-level/1 [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (non-disruptive) action: tag [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule tag: OWASP_CRS [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (non-disruptive) action: tag [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule tag: OWASP_CRS/WEB_ATTACK/XSS [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (non-disruptive) action: tag [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule tag: WASCTC/WASC-8 [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (non-disruptive) action: tag [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule tag: WASCTC/WASC-22 [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (non-disruptive) action: tag [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule tag: OWASP_TOP_10/A3 [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (non-disruptive) action: tag [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule tag: OWASP_AppSensor/IE1 [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (non-disruptive) action: tag [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Rule tag: CAPEC-242 [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Running (disruptive) action: block. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Marking request as disruptive. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Running action deny [157893220069.056272] [/?q="><script>alert(1)</script>] [9] Running action: ctl [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Skipping this phase as this request was already intercepted. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Not appending response body. Response Content-Type is . It is not marked to be inspected. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Not appending response body. Response Content-Type is . It is not marked to be inspected. [157893220069.056272] [/?q="><script>alert(1)</script>] [4] Starting phase RESPONSE_BODY. (SecRules 4) [157893220069.056272] [/?q="><script>alert(1)</script>] [5] Response Content-Type is . It is not marked to be inspected. [157893220069.056272] [/?q="><script>alert(1)</script>] [8] Content-Type(s) marked to be inspected: text/html text/plain text/xml

/var/log/nginx/error.log
2020/01/13 16:20:12 [error] 6#6: *4 [client 172.17.0.1] ModSecurity: Access denied with code 403 (phase 2). detected XSS using libinjection. [file "/usr/local/owasp-modsecurity-crs/rules/REQUEST-941-APPLICATION-ATTACK-XSS.conf"] [line "37"] [id "941100"] [rev ""] [msg "XSS Attack Detected via libinjection"] [data "Matched Data: XSS data found within ARGS:q: "><script>alert(1)</script>"] [severity "2"] [ver "OWASP_CRS/3.2.0"] [maturity "0"] [accuracy "0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-xss"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "OWASP_CRS/WEB_ATTACK/XSS"] [tag "WASCTC/WASC-8"] [tag "WASCTC/WASC-22"] [tag "OWASP_TOP_10/A3"] [tag "OWASP_AppSensor/IE1"] [tag "CAPEC-242"] [hostname "172.17.0.3"] [uri "/"] [unique_id "157893241261.889121"] [ref "v8,27t:utf8toUnicode,t:urlDecodeUni,t:htmlEntityDecode,t:jsDecode,t:cssDecode,t:removeNulls"], client: 172.17.0.1, server: juice.sky, request: "GET /?q="><script>alert(1)</script> HTTP/1.1", host: "localhost:8080"

To Reproduce

Steps to reproduce the behavior:

Enable RuleEngine and audit logs in modsecurity.conf,

SecRuleEngine On
SecAuditEngine On
SecAuditLogParts ABIJDEFHZ
SecAuditLogType Serial
SecAuditLogFormat JSON
SecAuditLog /var/log/modsec_audit.log

A curl command line that mimics the original request and reproduces the problem. Or a ModSecurity v3 test case.

[e.g: curl "modsec-full/ca/..\..\..\..\..\..\/\etc/\passwd" or issue-394.json]

curl 'http://localhost:8080/?q="><script>alert(1)</script>'

Expected behavior

A clear and concise description of what you expected to happen.

Block logged in /var/log/modsec_audit.log

Server (please complete the following information):

  • ModSecurity version (and connector): [e.g. ModSecurity v3.0.1 with nginx-connector v1.0.0]
  • WebServer: [e.g. nginx-1.15.5]
  • OS (and distro): [e.g. Linux, archlinux]

ModSecurity version v3.0.4 with nginx-connector v1.0.1
nginx-1.17.6
Linux, Debian 10 (Buster)

Rule Set (please complete the following information):

  • Running any public or commercial rule set? [e.g. SpiderLabs commercial rules]
  • What is the version number? [e.g. 2018-08-11]

OWASP v3.3

Additional context

Add any other context about the problem here.

`root@8f378ae6cecd:/# cat /usr/local/owasp-modsecurity-crs/crs-setup.conf

Set block by default (Won't block if SecRuleEngine is in detectiononly or off)

SecDefaultAction "phase:1,nolog,auditlog,deny,status:403"
SecDefaultAction "phase:2,nolog,auditlog,deny,status:403"

Set installed CRS version

SecAction
"id:900990,
phase:1,
nolog,
pass,
t:none,
setvar:tx.crs_setup_version=330"

Set timeout to lower value

SecCollectionTimeout 600`

@zimmerle
Copy link
Contributor

Is that happening within v3.0.3? is a new issue related to v3.0.4?

@dto20
Copy link
Author

dto20 commented Jan 14, 2020

It's 3.0.4 I think. I am just cloning v3/master and building from source in my docker file.

@dto20
Copy link
Author

dto20 commented Jan 15, 2020

I've done some further troubleshooting. If I change SecRuleEngine to DetectionOnly the audit logging works. If I then change it to On it only logs in the nginx error log, I'm still unsure as to why.

@dto20
Copy link
Author

dto20 commented Jan 20, 2020

So I think I've got to the bottom of it. If I leave the default Nginx error pages configuration in then it doesn't log to ModSecurity audit log. If I remove the lines then it does. I suspect Nginx is intercepting the 403 before ModSecurity can?

@zimmerle
Copy link
Contributor

@victorhora

@victorhora
Copy link
Contributor

@dto20 , see if victorhora/ModSecurity-nginx@ac3e8a9 solves your issue.

@victorhora victorhora self-assigned this Jan 27, 2020
@victorhora victorhora added 3.x Related to ModSecurity version 3.x bug It is a confirmed bug Platform - Nginx pr available labels Jan 27, 2020
@averges
Copy link

averges commented Feb 28, 2020

Exactly the same behavior here. Tried with 014adab and ModSecurity-nginx v1.0.1

@bryanspears
Copy link

@victorhora I had the same issue as above. No audit log when blocking action occurs. Building master, which included your change, did fix it.

@averges
Copy link

averges commented May 11, 2020

Tested with 7e0bc26 and custom error page and audit logs are working fine. Thanks

@xx-zhang
Copy link

@averges i tryd flow to build modsecurity but no using. what's the mater.

git clone https://github.com/SpiderLabs/ModSecurity \
        && git checkout  7e0bc2691727b8c75f74638cdc4d1c45a689a7b6 \
        &&  /bin/bash build.sh  \
        && yum install -y https://archives.fedoraproject.org/pub/archive/fedora/linux/updates/23/x86_64/b/bison-3.0.4-3.fc23.x86_64.rpm \
        &&  git submodule init  \
        &&  git submodule update  \
        &&  ./configure \
        && make && make install

modsecurity-7e0bc + modsecurity-nginx-v1.0.1

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
3.x Related to ModSecurity version 3.x bug It is a confirmed bug Platform - Nginx pr available
Projects
None yet
Development

No branches or pull requests

6 participants