<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Zino</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Zino"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Zino"/>
		<updated>2026-04-26T10:10:59Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Zino&amp;diff=229151</id>
		<title>User:Zino</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Zino&amp;diff=229151"/>
				<updated>2017-04-26T08:45:45Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: Blanked the page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981172&amp;diff=211132</id>
		<title>OWASP ModSec CRS Paranoia Mode Sibling 981172</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981172&amp;diff=211132"/>
				<updated>2016-03-15T06:45:19Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: /* 981172 : SQL Injection Character Anomaly Usage */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;''This page contains a proposal for a stricter rule-clone for [[OWASP_ModSec_CRS_Paranoia_Mode|ModSecurity CRS Paranoia Mode]].''&lt;br /&gt;
&lt;br /&gt;
== 981172 : SQL Injection Character Anomaly Usage ==&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | '''RuleID 2.2.x'''&lt;br /&gt;
 | '''RuleID 3.0.0-rc1 (original Rule)'''&lt;br /&gt;
 | '''RuleID 3.0.0-rc1 (paranoid Rule)'''&lt;br /&gt;
 | '''Change'''&lt;br /&gt;
 | '''Whitelisting'''&lt;br /&gt;
|-&lt;br /&gt;
 | 981172&lt;br /&gt;
 | 942420&lt;br /&gt;
 | 942421-942424&lt;br /&gt;
 | Regex counter decreased from 8 to 2.&amp;lt;br&amp;gt;Anomaly scoring increased to critical.&lt;br /&gt;
 | None&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
  #&lt;br /&gt;
  # -=[ SQL Injection Character Anomaly Usage  ]=-&lt;br /&gt;
  #&lt;br /&gt;
  # This is a paranoid sibling to 2.2.9 Rule 981172.&lt;br /&gt;
  # The regex limit is set to '2' and the anomaly scoring is increased to 'critical'.&lt;br /&gt;
  #&lt;br /&gt;
  SecRule REQUEST_COOKIES|!REQUEST_COOKIES:/__utm/|!REQUEST_COOKIES:/__utm/|REQUEST_COOKIES_NAMES &amp;quot;([\~\!\@\#\$\%\^\&amp;amp;\*\(\)\-\+\=\{\}\[\]\|\:\;\&amp;quot;\'\´\’\‘\`\&amp;lt;\&amp;gt;].*?){2,}&amp;quot;&lt;br /&gt;
        &amp;quot;capture,\&lt;br /&gt;
        phase:request,\&lt;br /&gt;
        rev:'2',\&lt;br /&gt;
        ver:'OWASP_CRS/3.0.0',\&lt;br /&gt;
        maturity:'X',\&lt;br /&gt;
        accuracy:'Y',\&lt;br /&gt;
        t:none,t:urlDecodeUni,\&lt;br /&gt;
        block,\&lt;br /&gt;
        msg:'Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded',\&lt;br /&gt;
        id:'XXXXXX',\&lt;br /&gt;
        tag:'OWASP_CRS/WEB_ATTACK/SQL_INJECTION',\&lt;br /&gt;
        tag:'Paranoia rule on level Z',\&lt;br /&gt;
        logdata:'Matched Data: %{TX.1} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}',\&lt;br /&gt;
        severity:'CRITICAL',\&lt;br /&gt;
        setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
        setvar:tx.sql_injection_score=+1,\&lt;br /&gt;
        setvar:'tx.msg=%{rule.msg}',\&lt;br /&gt;
        setvar:tx.%{rule.id}-OWASP_CRS/WEB_ATTACK/RESTRICTED_SQLI_CHARS-%{matched_var_name}=%{tx.0}&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP ModSecurity Core Rule Set Project]]&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981173&amp;diff=211131</id>
		<title>OWASP ModSec CRS Paranoia Mode Sibling 981173</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981173&amp;diff=211131"/>
				<updated>2016-03-15T06:44:34Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: /* 981173 : SQL Injection Character Anomaly Usage */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;''This page contains a proposal for a stricter rule-clone for [[OWASP_ModSec_CRS_Paranoia_Mode|ModSecurity CRS Paranoia Mode]].''&lt;br /&gt;
&lt;br /&gt;
== 981173 : SQL Injection Character Anomaly Usage ==&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | '''RuleID 2.2.x'''&lt;br /&gt;
 | '''RuleID 3.0.0-rc1 (original Rule)'''&lt;br /&gt;
 | '''RuleID 3.0.0-rc1 (paranoid Rule)'''&lt;br /&gt;
 | '''Change'''&lt;br /&gt;
 | '''Whitelisting'''&lt;br /&gt;
|-&lt;br /&gt;
 | 981173&lt;br /&gt;
 | 942430&lt;br /&gt;
 | 942431-942434&lt;br /&gt;
 | Regex counter decreased from 4 to 1.&amp;lt;br&amp;gt;Anomaly scoring increased to critical.&lt;br /&gt;
 | Regex for UUIDs in chained Rule&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
  #&lt;br /&gt;
  # -=[ SQL Injection Character Anomaly Usage ]=-&lt;br /&gt;
  #&lt;br /&gt;
  # This is a paranoid sibling to 2.2.x Rule 981173.&lt;br /&gt;
  # The regex limit is set to '1' and the anomaly scoring is increased to 'critical'.&lt;br /&gt;
  # For dealing with false positives, UUID format is whitelisted with a chained rule.&lt;br /&gt;
  # For 3.0.0-rc1 rule, see FIXME.&lt;br /&gt;
  #&lt;br /&gt;
  SecRule ARGS_NAMES|ARGS|XML:/* &amp;quot;([\~\!\@\#\$\%\^\&amp;amp;\*\(\)\-\+\=\{\}\[\]\|\:\;\&amp;quot;\'\´\’\‘\`\&amp;lt;\&amp;gt;].*?){1,}&amp;quot;\&lt;br /&gt;
        &amp;quot;chain,\&lt;br /&gt;
        phase:request,\&lt;br /&gt;
        rev:'2',\&lt;br /&gt;
        ver:'OWASP_CRS/3.0.0',\&lt;br /&gt;
        maturity:'X',\&lt;br /&gt;
        accuracy:'Y',\&lt;br /&gt;
        t:none,t:urlDecodeUni,\&lt;br /&gt;
        block,\&lt;br /&gt;
        msg:'Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded',\&lt;br /&gt;
        id:'XXXXXX',\&lt;br /&gt;
        tag:'OWASP_CRS/WEB_ATTACK/SQL_INJECTION',\&lt;br /&gt;
        tag:'Paranoia rule on level Z',\&lt;br /&gt;
        logdata:'Matched Data: %{TX.1} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}',\&lt;br /&gt;
        severity:'CRITICAL',\&lt;br /&gt;
        setvar:'tx.msg=%{rule.msg}',\&lt;br /&gt;
        setvar:tx.%{rule.id}-OWASP_CRS/WEB_ATTACK/RESTRICTED_SQLI_CHARS-%{matched_var_name}=%{tx.0}&amp;quot;&lt;br /&gt;
        SecRule MATCHED_VARS &amp;quot;!@rx ^[a-f0-9-]{36}$&amp;quot;\&lt;br /&gt;
                &amp;quot;t:lowercase,\&lt;br /&gt;
                setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
                setvar:tx.sql_injection_score=+1&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP ModSecurity Core Rule Set Project]]&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode&amp;diff=211129</id>
		<title>OWASP ModSec CRS Paranoia Mode</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode&amp;diff=211129"/>
				<updated>2016-03-15T05:11:42Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: Task list and Project info&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Abstract==&lt;br /&gt;
&lt;br /&gt;
This is a page about the development of a paranoia mode aka bringing back the rules that used to yield a high number of false positives. This little project is aimed at inclusion into the 3.0.0 release of the OWASP ModSecurity Core Rules, where some rules have been removed in order to reduce the number of false positives with vanilla installations.&lt;br /&gt;
&lt;br /&gt;
FIXME: Detailed description&lt;br /&gt;
&lt;br /&gt;
''Back to the [https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project OWASP ModSecurity Core Rules Set].''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Sub-Project Infos==&lt;br /&gt;
&lt;br /&gt;
* '''Status''': active (January 2016)&lt;br /&gt;
* '''Schedule''': Pull request in &amp;lt;strike&amp;gt;January&amp;lt;/strike&amp;gt;&amp;lt;strike&amp;gt;February&amp;lt;/strike&amp;gt;March 2016 (Almost there!)&lt;br /&gt;
* '''Who''': Christian Folini (dune73), Noël Zindel (zino), Franziska Bühler (franziskabuehler), Manuel Leos (Spartan), Walter Hop (lifeforms)&lt;br /&gt;
* '''Documentation''': Here on the [https://www.owasp.org/index.php/OWASP_ModSec_CRS_Paranoia_Mode OWASP Wiki] / [https://www.netnea.com/cms/2016/02/04/owasp-modsecurity-core-rules-paranoia-mode-mechanics-proposal/ Mechanics Proposal]&lt;br /&gt;
* '''Discussion / Archive''': &amp;lt;tt&amp;gt;owasp-modsecurity-core-rule-set@lists.owasp.org&amp;lt;/tt&amp;gt; / archive: http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/&lt;br /&gt;
* '''Github Link v3.0.0-rc1 (our base)''': https://github.com/SpiderLabs/owasp-modsecurity-crs/tree/v3.0.0-rc1&lt;br /&gt;
* '''Github Link paranoia-mode''': https://github.com/dune73/owasp-modsecurity-crs/tree/paranoia-mode&lt;br /&gt;
* '''Final Pull Request #1: Add paranoia mode mechanics''': https://github.com/SpiderLabs/owasp-modsecurity-crs/pull/292 MERGED&lt;br /&gt;
* '''Final Pull Request #2: Move first rules to paranoia mode''': https://github.com/SpiderLabs/owasp-modsecurity-crs/pull/300 MERGED&lt;br /&gt;
* '''Final Pull Request #3: Add 2.2.X rules to paranoia mode''': https://github.com/SpiderLabs/owasp-modsecurity-crs/pull/308 MERGED&lt;br /&gt;
* '''Final Pull Request #4: Add stricter siblings''': FIXME&lt;br /&gt;
&lt;br /&gt;
==Tasks==&lt;br /&gt;
&lt;br /&gt;
===Open Tasks===&lt;br /&gt;
&lt;br /&gt;
Please define state as follows: ''new'', ''assigned'', ''waiting'', ''closed''. When a task is closed, it is moved to the seperate closed tasks table below.&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''Task'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Who'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | Write pull request&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Submit pull request&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Draw flowchart&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Write documentation&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Closed Tasks===&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''Task'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Who'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of rules, which triggered false positives in 2.2.X frequently&lt;br /&gt;
  | Christian&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 2.2.x rules, which have disappeared from 3.0.0-rc1&lt;br /&gt;
  | Spartan&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 3.0.0-rc1 rules, which could be accompanied with&amp;lt;br /&amp;gt;stricter siblings in paranoia mode&amp;lt;br /&amp;gt;(same idea of the rule, but harder limit etc.)&lt;br /&gt;
  | Christian&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 3.0.0-rc1 rules, which could be moved to the paranoia mode&lt;br /&gt;
  | Franziska&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of disappeared / missing 2.2.X base_rules, which should be brought back&lt;br /&gt;
  | group&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 2.2.X optional and experimental rules, which should be brought back&lt;br /&gt;
  | group&lt;br /&gt;
  | closed (could be repeated more throughly)&lt;br /&gt;
|-&lt;br /&gt;
  | Nail down final list of rules which should be moved / recreated into the paranoia mode&lt;br /&gt;
  | group&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Sort out mechanics of the paranoia mode&lt;br /&gt;
  | Christian&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Write new stricter siblings for existing rules&lt;br /&gt;
  | Noël&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Define ID-space for strict siblings&lt;br /&gt;
  | Fraziska, group&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Define exact syntax of paranoia mode setup&lt;br /&gt;
  | Christian, group&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Sort out name: Is &amp;quot;Paranoia Mode&amp;quot; really the right term?&lt;br /&gt;
  | Christian, group&lt;br /&gt;
  | closed&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Rules==&lt;br /&gt;
&lt;br /&gt;
===Paranoia Mode Candidates===&lt;br /&gt;
&lt;br /&gt;
The 3.0.0-rc1 has all rules renumbered. Existing numbering was fairly crazy and the new numbering follows the numbering scheme of the rules files (-&amp;gt; 9&amp;lt;2-digit-rulefile&amp;gt;&amp;lt;3-digit-id&amp;gt;)&lt;br /&gt;
A mapping table exists [[https://github.com/SpiderLabs/owasp-modsecurity-crs/blob/v3.0.0-rc1/id_renumbering/IdNumbering.csv IdNumbering.csv]]&lt;br /&gt;
We need to make sure, we do not mess things up, so let's add both IDs to the table, the old one and the new one.&lt;br /&gt;
&lt;br /&gt;
Please set status as follows : ''confirmed'',''candidate'', ''cloning-confirmed'',''cloning-candidate'', ''unsure'', ''dropped''. &lt;br /&gt;
* 'cloning-confirmed', 'cloning-candidates' are rules, that could be cloned into an even stricter variant with a stricter limit in a higher paranoia setting.&lt;br /&gt;
* If dropped, please provide reasoning in the remarks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''RuleID 2.2.x'''&lt;br /&gt;
  |'''RuleID 3.0.0-rc1'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''msg'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Remarks'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | 950001&lt;br /&gt;
  | 942150&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Also Franziska's candidate: @pmf file with very short function names, could match frequently.&lt;br /&gt;
|-&lt;br /&gt;
  | 950109&lt;br /&gt;
  | 920230&lt;br /&gt;
  | Multiple URL Encoding Detected&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 950120&lt;br /&gt;
  | 931130&lt;br /&gt;
  | Possible Remote File Inclusion (RFI) Attack: Off-Domain Reference/Link&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Walter's 2.2.X candidate: many FP; Chrstian: hardly any FPs; &amp;lt;br/&amp;gt;discussion concluded, that rule should end up in paranoia mode, possibly with additional conditions to reduce FPs (scope outside of this paranoia mode project)&amp;lt;br/&amp;gt;[http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-February/001885.html Link to discussion]&lt;br /&gt;
|-&lt;br /&gt;
  | 960335&lt;br /&gt;
  | 920380&lt;br /&gt;
  | Too many arguments in request&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Walter's 2.2.X candidate: some FP (phpMyAdmin, large forms), alternatively would recommend raising &amp;lt;code&amp;gt;tx.max_num_args&amp;lt;/code&amp;gt; to 1000&lt;br /&gt;
|-&lt;br /&gt;
  | 950901&lt;br /&gt;
  | 942130&lt;br /&gt;
  | SQL Injection Attack: SQL Tautology Detected.&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Also Franziska's candidate: legitimate sentences could match. Walter's 2.2.x experience: many FP in natural text however the rule seems to have merit&lt;br /&gt;
|-&lt;br /&gt;
  | 950916&lt;br /&gt;
  | 921170&lt;br /&gt;
  | HTTP Header Injection Attack via payload (CR/LF detected)&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Franziska's candidate: change action from pass to block and move to paranoia mode.&lt;br /&gt;
|-&lt;br /&gt;
  | 959070&lt;br /&gt;
  | gone -&amp;gt; 942380  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 959071&lt;br /&gt;
  | gone -&amp;gt; 942390 &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 959072&lt;br /&gt;
  | gone -&amp;gt; 942400  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 959073&lt;br /&gt;
  | gone -&amp;gt; 942410  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 960015&lt;br /&gt;
  | 920300&lt;br /&gt;
  | Request Missing an Accept Header&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Also Franziska's candidate: Not every legitimate client behaves correctly. Walter's experience: many FP (PHP SoapClient)&amp;lt;br/&amp;gt;Discussion concluded it's moved to paranoia mode.&amp;lt;br/&amp;gt;[http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-February/001888.html Link to discussion]&amp;lt;br/&amp;gt;Spartan: Many mobile devices do not send this header, very high FP.&lt;br /&gt;
|-&lt;br /&gt;
  | 960024&lt;br /&gt;
  | gone -&amp;gt; 942460 &lt;br /&gt;
  | Meta-Character Anomaly Detection Alert - Repetative Non-Word Characters&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 960035&lt;br /&gt;
  | 920440&lt;br /&gt;
  | URL file extension is restricted by policy&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 970901&lt;br /&gt;
  | 950100&lt;br /&gt;
  | The Application Returned a 500-Level Status Code&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Franziska's candidate: too strict, too generic, no data leakage happened so far. Walter: it's useful however to prevent attacker from distinguishing between a failed SQLi attempt (403 blocked by ModSec) or a query error due to vulnerable app (500 from application); &amp;lt;br/&amp;gt;Discussion resolved with move to paranoia mode. 403 will cloak a backend error, which is hard for an inexperienced admin and thus complicates things in standard installations&amp;lt;br/&amp;gt;[http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-February/001889.html Link to discussion]&lt;br /&gt;
|-&lt;br /&gt;
  | 973300&lt;br /&gt;
  | gone -&amp;gt; 941320 &lt;br /&gt;
  | Possible XSS Attack Detected - HTML Tag Handler&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP&lt;br /&gt;
|-&lt;br /&gt;
  | 973332&lt;br /&gt;
  | gone -&amp;gt; 941330 &lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP&lt;br /&gt;
|-&lt;br /&gt;
  | 973333&lt;br /&gt;
  | gone -&amp;gt; 941340 &lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981172&lt;br /&gt;
  | gone -&amp;gt; 942420 &lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: very high FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981173&lt;br /&gt;
  | gone -&amp;gt; 942430 &lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: very high FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981231&lt;br /&gt;
  | gone -&amp;gt; 942440 &lt;br /&gt;
  | SQL Comment Sequence Detected.&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: high FP but rule seems useful&lt;br /&gt;
|-&lt;br /&gt;
  | 981240&lt;br /&gt;
  | 942300&lt;br /&gt;
  | Detects MySQL comments, conditions and ch(a)r injections&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981242&lt;br /&gt;
  | 942330&lt;br /&gt;
  | Detects classic SQL injection probings 1/2&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Also Franziska's candidate: one quote character already matches?? Walter: low FP, but seen in cookies injected by some US ISPs; &lt;br /&gt;
|-&lt;br /&gt;
  | 981243&lt;br /&gt;
  | 942370&lt;br /&gt;
  | Detects classic SQL injection probings 2/2&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981244&lt;br /&gt;
  | 942180&lt;br /&gt;
  | Detects basic SQL authentication bypass attempts 1/3&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP; &amp;lt;br/&amp;gt; discussion did not bring up additional arguments. Moving to paranoia mode&amp;lt;br/&amp;gt;[http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-February/001890.html Link to discussion]&lt;br /&gt;
|-&lt;br /&gt;
  | 981245&lt;br /&gt;
  | 942260&lt;br /&gt;
  | Detects basic SQL authentication bypass attempts 2/3&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981246&lt;br /&gt;
  | 942340&lt;br /&gt;
  | Detects basic SQL authentication bypass attempts 3/3&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981248&lt;br /&gt;
  | 942210&lt;br /&gt;
  | Detects chained SQL injection attempts 1/2&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: low FP, &amp;lt;br/&amp;gt; discussion did not bring up any additional arguments. Moving to paranoia mode&amp;lt;br/&amp;gt;[http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-February/001890.html Link to discussion]&lt;br /&gt;
|-&lt;br /&gt;
  | 981249&lt;br /&gt;
  | 942310&lt;br /&gt;
  | Detects chained SQL injection attempts 2/2&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP but seen in very specific situations&lt;br /&gt;
|-&lt;br /&gt;
  | 981257&lt;br /&gt;
  | 942200&lt;br /&gt;
  | Detects MySQL comment-/space-obfuscated injections and backtick termination&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981260&lt;br /&gt;
  | gone -&amp;gt; 942450 &lt;br /&gt;
  | SQL Hex Encoding Identified&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: high FP in long random strings&lt;br /&gt;
|-&lt;br /&gt;
  | 981318&lt;br /&gt;
  | 942110&lt;br /&gt;
  | SQL Injection Attack: Common Injection Testing Detected&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Franziska's candidate: one quote character at the beginning/end really not legitimate? Walter 2.2.X candidate: frequent FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981319&lt;br /&gt;
  | 942120&lt;br /&gt;
  | SQL Injection Attack: SQL Operator Detected&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Also Franziska's candidate: very short operators or strings already match. Walter: some FP (WooCommerce)&lt;br /&gt;
|-&lt;br /&gt;
  | 981049&lt;br /&gt;
  | 912100&lt;br /&gt;
  | Potential Denial of Service (DoS) Attack from ... - # of Request Bursts: ...	   &lt;br /&gt;
  | cloning-confirmed	&lt;br /&gt;
  | limit currently at 2; could be set to 1; now, the attacker has to exceed dos_counter_threshold twice. With full reset of counter after first hit. Source: 2.2.X-&amp;gt;experimental rules&lt;br /&gt;
|-&lt;br /&gt;
  | 960901          &lt;br /&gt;
  | 920270			&lt;br /&gt;
  | Invalid character in request&lt;br /&gt;
  | cloning-confirmed	&lt;br /&gt;
  | @validateByteRange 1-255; there was a conditional rule with stricter byterange 32-126 in 2.2.X as well&lt;br /&gt;
|-&lt;br /&gt;
  | 970003          &lt;br /&gt;
  | 951100			&lt;br /&gt;
  | none					   					   &lt;br /&gt;
  | cloning-confirmed	&lt;br /&gt;
  | rule is only setting tx.sql_error_match. Could also trigger score directly&lt;br /&gt;
|-&lt;br /&gt;
  | 950907          &lt;br /&gt;
  | 932100			&lt;br /&gt;
  | Remote Command Execution (RCE) Attempt					   	   &lt;br /&gt;
  | cloning-confirmed	&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 958977          &lt;br /&gt;
  | 933110			&lt;br /&gt;
  | PHP Injection Attack: Function Name Found					    &lt;br /&gt;
  | cloning-confirmed&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 958979          &lt;br /&gt;
  | 933120			&lt;br /&gt;
  | PHP Injection Attack: Configuration Directive Found				    &lt;br /&gt;
  | cloning-candidate&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 958980          &lt;br /&gt;
  | 933130			&lt;br /&gt;
  | PHP Injection Attack: Variables Found					   	    &lt;br /&gt;
  | cloning-confirmed&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 950001          &lt;br /&gt;
  | 942150			&lt;br /&gt;
  | SQL Injection Attack					   			    &lt;br /&gt;
  | cloning-confirmed&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 950907&lt;br /&gt;
  | 932100&lt;br /&gt;
  | System Command Injection&lt;br /&gt;
  | dropped&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Also Franziska's candidate: false positives possible because of @pmf, file with short cmds. Discussion evolved about splitting the file, which everybody thinks is a good idea. But that would be outside the scope of the introduction of the paranoia mode. So the rule stays in the standard set of rules for the time being and will be split in the future [http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-February/001886.html Link to discussion]&lt;br /&gt;
|-&lt;br /&gt;
  | 900050&lt;br /&gt;
  | 910100&lt;br /&gt;
  | Client IP is from a HIGH Risk Country Location.&lt;br /&gt;
  | dropped&lt;br /&gt;
  | Franziska's candidate: Do we want to exlude countries? But then easy to configure. Discussion pointed out this as an effective rule. We leave it in the standard rules, but provide an empty country list by default [http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-February/001951.html Link to discussion]. [https://github.com/SpiderLabs/owasp-modsecurity-crs/pull/284 Separate pull request]&lt;br /&gt;
|-&lt;br /&gt;
  | 960017&lt;br /&gt;
  | 920350&lt;br /&gt;
  | Host header is a numeric IP address&lt;br /&gt;
  | dropped&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Also Franziska's candidate: Not every legitimate client behaves correctly. Walter's experience: low FP (almost all are mass scans); &amp;lt;br/&amp;gt; Discussion concluded that legitimate use of numeric IP addresses is rare. This is really mostly mass scanners. Rule will be kept in standard set of rules&amp;lt;br/&amp;gt;[http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-February/001888.html Link to discussion]&lt;br /&gt;
|-&lt;br /&gt;
  | 958977&lt;br /&gt;
  | 933110&lt;br /&gt;
  | PHP Injection Attack: Function Name Found&lt;br /&gt;
  | dropped&lt;br /&gt;
  | Franziska's candidate: false positives possible because of @pmf, file with short function names. Maybe we should split the data file. The discussion revealed that splitting the data file in a clean way is very difficult. Walter Hop volunteered to rework the php rules completely. Chaim might join that effort.&lt;br /&gt;
|-&lt;br /&gt;
  | 958979&lt;br /&gt;
  | 933120&lt;br /&gt;
  | PHP Injection Attack: Configuration Directive Found&lt;br /&gt;
  | dropped&lt;br /&gt;
  | Franziska's candidate: false positives possible because of @pmf, file with short configuration directives. Splitting file?  The discussion revealed that splitting the data file in a clean way is very difficult. Walter Hop volunteered to rework the php rules completely. Chaim might join that effort.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Rules from 2.2.X, missing in 3.0.0-rc1===&lt;br /&gt;
&lt;br /&gt;
It looks as if only the base_rules made it into 3.0.0. In fact there are a few rule ids know from the optional and experimental rule folders in 2.2.X, but it is more likely, these are new 3.0.0 rules reusing old rule ids as the rules (regexes and msg) do not match at all.&lt;br /&gt;
&lt;br /&gt;
When trying to generate the list below, be aware that the rule ids have been renumbered between 3.0.0-dev and 3.0.0-rc1. IdNumbering.csv in your friend.&lt;br /&gt;
&lt;br /&gt;
====Base rules====&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''2.2.X rule id'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''msg'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''remarks'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | 950002&lt;br /&gt;
  | System Command Access&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950006&lt;br /&gt;
  | System Command Injection&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950007&lt;br /&gt;
  | Blind SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950008&lt;br /&gt;
  | Injection of Undocumented ColdFusion Tags&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950010&lt;br /&gt;
  | LDAP Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950011&lt;br /&gt;
  | SSI injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950018&lt;br /&gt;
  | Universal PDF XSS URL Detected.&lt;br /&gt;
  | Walter: medium FP (foo.pdf#javascript)&lt;br /&gt;
|-&lt;br /&gt;
  | 950019&lt;br /&gt;
  | Email Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950908&lt;br /&gt;
  | SQL Injection Attack.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950921&lt;br /&gt;
  | Backdoor access&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950922&lt;br /&gt;
  | Backdoor access&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958000&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958001&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958002&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958003&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958004&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958005&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958006&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958007&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958008&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958009&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958010&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958011&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958012&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958013&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958016&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958017&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958018&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958019&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958020&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958022&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958023&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958024&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958025&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958026&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958027&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958028&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958030&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958031&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958032&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958033&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958034&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958036&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958037&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958038&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958039&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958040&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958041&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958045&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958046&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958047&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958049&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958051&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958052&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958054&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958056&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958057&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958059&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958291&lt;br /&gt;
  | Range: field exists and begins with 0.&lt;br /&gt;
  | Walter: high FP (Chrome PDF viewer) and not useful.&lt;br /&gt;
|-&lt;br /&gt;
  | 958404&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958405&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958406&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958407&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958408&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958409&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958410&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958411&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958412&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958413&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958414&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958415&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958416&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958417&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958418&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958419&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958420&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958421&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958422&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958423&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958976&lt;br /&gt;
  | PHP Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959070&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959071&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959072&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959073&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960014&lt;br /&gt;
  | Proxy access attempt&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960018&lt;br /&gt;
  | Invalid character in request&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960020&lt;br /&gt;
  | Pragma Header requires Cache-Control Header for HTTP/1.1 requests.&lt;br /&gt;
  | Walter: some FP&lt;br /&gt;
|-&lt;br /&gt;
  | 960022&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960024&lt;br /&gt;
  | Meta-Character Anomaly Detection Alert - Repetative Non-Word Characters&lt;br /&gt;
  | Walter: many FP&lt;br /&gt;
|-&lt;br /&gt;
  | 960902&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960913&lt;br /&gt;
  | Invalid request&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970007&lt;br /&gt;
  | Zope Information Leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970008&lt;br /&gt;
  | Cold Fusion Information Leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970010&lt;br /&gt;
  | ISA server existence revealed&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970011&lt;br /&gt;
  | File or Directory Names Leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970012&lt;br /&gt;
  | Microsoft Office document properties leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970016&lt;br /&gt;
  | Cold Fusion source code leakage&lt;br /&gt;
  | Walter: some FP but not using this language&lt;br /&gt;
|-&lt;br /&gt;
  | 970018&lt;br /&gt;
  | IIS installed in default location&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970021&lt;br /&gt;
  | WebLogic information disclosure&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970903&lt;br /&gt;
  | ASP/JSP source code leakage&lt;br /&gt;
  | Walter: some FP but not using this language&lt;br /&gt;
|-&lt;br /&gt;
  | 973300&lt;br /&gt;
  | Possible XSS Attack Detected - HTML Tag Handler&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973301&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973302&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973303&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973304&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973305&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973306&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973307&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973308&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973309&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973310&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973311&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973312&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973313&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973314&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973316&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973325&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973327&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973328&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973329&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973330&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973331&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973332&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973333&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973334&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | Walter: many FP in text&lt;br /&gt;
|-&lt;br /&gt;
  | 973335&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | Walter: many FP in text&lt;br /&gt;
|-&lt;br /&gt;
  | 973347&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981000&lt;br /&gt;
  | Possibly malicious iframe tag in output&lt;br /&gt;
  | Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981001&lt;br /&gt;
  | Possibly malicious iframe tag in output&lt;br /&gt;
  | Walter: medium FP (iframes with display:none)&lt;br /&gt;
|-&lt;br /&gt;
  | 981003&lt;br /&gt;
  | Malicious iframe+javascript tag in output&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981004&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Excessive fromCharCode&lt;br /&gt;
  | Walter: many FP (Wordpress 4.4 inlined emoji javascripts); folinic: Problem solved in WP: https://core.trac.wordpress.org/ticket/35412&lt;br /&gt;
|-&lt;br /&gt;
  | 981005&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Eval+Unescape&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981006&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Unescape&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981007&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Heap Spray&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981018&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981022&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981133&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981134&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981136&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981172&lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | Walter: many FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981173&lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | Walter: many FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981177&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981178&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981231&lt;br /&gt;
  | SQL Comment Sequence Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981260&lt;br /&gt;
  | SQL Hex Encoding Identified&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981300&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981301&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981302&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981303&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981304&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981305&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981306&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981307&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981308&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981309&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981310&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981311&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981312&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981313&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981314&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981315&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981316&lt;br /&gt;
  | SQL SELECT Statement Anomaly Detection Alert&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981317&lt;br /&gt;
  | SQL SELECT Statement Anomaly Detection Alert&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 990012&lt;br /&gt;
  | Rogue web site crawler&lt;br /&gt;
  | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
====Optional, experimental, slr rules====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | 900048&lt;br /&gt;
 | Identifies Reflected XSS (optional_rules)&lt;br /&gt;
 | Walter: could be very interesting candidate but have not used it in production&lt;br /&gt;
|-&lt;br /&gt;
 | 920021, 920022, 920023&lt;br /&gt;
 | Possible Credit Card Track 1 Data Leakage. (experimental_rules)&lt;br /&gt;
 | Walter: could be interesting candidates but have not used it in production&lt;br /&gt;
|-&lt;br /&gt;
 | 981080, 920020, 920006&lt;br /&gt;
 | Detect CC# in output and block transaction (optional_rules)&lt;br /&gt;
 | Walter: could be interesting candidate but have not used it in production&lt;br /&gt;
|-&lt;br /&gt;
 | 900047, 900048, 981180, 981182&lt;br /&gt;
 | Identifies Stored XSS (optional_rules)&lt;br /&gt;
 | Walter: could be somewhat interesting candidate but have not used it in production&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Stricter siblings for existing rules ===&lt;br /&gt;
&lt;br /&gt;
Stricter Siblings are rules that are present in the CRS but could be accompanied by a stricter clone in Paranoia Mode. Adjustments can differ from rule to rule but include higher anomaly ratings or stricter triggers (e.g. regex counters). To prevent masses of false positives, rules can come with additional filters (chained rules) for common use-cases. These can either be included into Paranoia Mode or simply serve as a recommendation.&lt;br /&gt;
&lt;br /&gt;
Note: To avoid a cluttered project main-page, rule proposals are documented in their respective sub-page. When adding new proposals, make sure adding the rules original (2.2.x) ID, a quick description of what changes were made, and, if applicable, which additional filters were added.&lt;br /&gt;
&lt;br /&gt;
'''Possible siblings:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981173|981173 : SQL Injection Character Anomaly Usage]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981172|981172 : SQL Injection Character Anomaly Usage]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981049|981049 : Potential Denial of Service (DoS)]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_970003|970003 : SQL Error Leakage]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_960901|960901 : Invalid character in request]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_958980|958980 : PHP Injection Attack: Variables Found]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_958979|958979 : PHP Injection Attack: Configuration Directive Found]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_958977|958977 : PHP Injection Attack: Function Name Found]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_950907|950907 : Remote Command Execution (RCE) Attempt]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_950001|950001 : SQL Injection Attack]]&lt;br /&gt;
&lt;br /&gt;
==Project Status==&lt;br /&gt;
&lt;br /&gt;
===Project Status January 30, 2016===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
Hello everybody,&lt;br /&gt;
&lt;br /&gt;
It's time to do a status report of our little core rules project.&lt;br /&gt;
&lt;br /&gt;
I am including Franziska Bühler and Walter Hop in this status mail.&lt;br /&gt;
Both are experienced ModSec sysadmins. Franziska contributed to this&lt;br /&gt;
first stage, Walter told me he does not have much time, but he&lt;br /&gt;
was interested in participating at least in the discussions about&lt;br /&gt;
the rules.&lt;br /&gt;
&lt;br /&gt;
All in all, this is taking more time than anticipated. But we&lt;br /&gt;
have also done things very throughly than I thought. Which is&lt;br /&gt;
generally a good thing.&lt;br /&gt;
&lt;br /&gt;
Done so far:&lt;br /&gt;
* Manuel has provided us with a list of rules removed between 2.2.x and 3.0.0rc1&lt;br /&gt;
* I have assembled a list of rules known to trigger false positives frequently in the 2.2.x ruleset, they are thus candidates for the paranoia mode&lt;br /&gt;
* Franziska has looked through the 3.0.0rc1 rules and identified a set of rules which look like good candidates.&lt;br /&gt;
* Noël has sharpened his skills by re-writing 981173 in a way that ignores innocent UUIDs. In my eyes, he found a very elegant solution.&lt;br /&gt;
* With the development of 3.0.0-dev, Chaim unfortunately reused rule ids formerly used with optional and experimental rules. Now this has all been renumbered. I have pointed this out in the mailinglist and had private contact with Chaim where he confirmed the fact - and promised to resolve the issue.&lt;br /&gt;
&lt;br /&gt;
We have not really looked at the disappeared rules and identified those&lt;br /&gt;
who should be brought back and have not been picked so far. This&lt;br /&gt;
includes the 2.2.X base_rules, but also the optional, experimental,&lt;br /&gt;
and huge stock of slr rules. Of these three groups, only the&lt;br /&gt;
anti-ddos rules have made it into 3.0.0. There are probably more&lt;br /&gt;
interesting candidates.&lt;br /&gt;
&lt;br /&gt;
If somebody among you wants to look into these, then that would be&lt;br /&gt;
welcome, but I do not want to have these tasks delay us any further.&lt;br /&gt;
After all, Old rules can also be brought back in subsequent releases&lt;br /&gt;
if we see a benefit.&lt;br /&gt;
&lt;br /&gt;
So the next real tasks are:&lt;br /&gt;
* Looking through the list of candidates and cloning-candidates (the latter are those rules we might accompany with a clone with stricter limits in paranoia mode).&lt;br /&gt;
* Defining the exact working of the paranoia mode.&lt;br /&gt;
&lt;br /&gt;
Please sit down and look through the rule lists in the wiki and add&lt;br /&gt;
remarks with regards to the candidate rules. If you think a rule&lt;br /&gt;
should be included, if you think an individual rule should not be&lt;br /&gt;
included etc.&lt;br /&gt;
&lt;br /&gt;
I am also going to invite the people on the mailinglist to take look at&lt;br /&gt;
the rules as well and add their remarks in the wiki (or respond via mail).&lt;br /&gt;
This should allow us to nail down the list of rules which will&lt;br /&gt;
actually be included in the paranoia mode.&lt;br /&gt;
&lt;br /&gt;
As for defining the exact working of the paranoia mode, I guess I&lt;br /&gt;
need to write down the idea I have in mind and see if it makes sense to&lt;br /&gt;
you.&lt;br /&gt;
&lt;br /&gt;
Thank you for contributing so far! It is a lot of fun to work in a team!&lt;br /&gt;
&lt;br /&gt;
Christian&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==How to Perform Pull Request to a Branch of Master==&lt;br /&gt;
&lt;br /&gt;
'''By Walter Hop'''&lt;br /&gt;
&lt;br /&gt;
This example assumes that the Github username is 'lifeforms', replace with your own username.&lt;br /&gt;
&lt;br /&gt;
'''Step 1. Create a Github fork of the original repository'''&lt;br /&gt;
* a. Browse to CRS: https://github.com/SpiderLabs/owasp-modsecurity-crs&lt;br /&gt;
* b. Click &amp;quot;Fork&amp;quot; button in the top right&lt;br /&gt;
&lt;br /&gt;
'''Step 2. Download your Github fork, and checkout the correct branch '''&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
git clone git@github.com:lifeforms/owasp-modsecurity-crs.git &amp;lt;br/&amp;gt;&lt;br /&gt;
cd owasp-modsecurity-crs &amp;lt;br/&amp;gt;&lt;br /&gt;
git checkout v3.0.0-rc1 &amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Step 3. Add the original repository as upstream, to integrate new changes easily'''&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
	git remote add upstream git@github.com:SpiderLabs/owasp-modsecurity-crs.git&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Step 4. Make sure your forked repo is up to date with changes in the original repository'''&amp;lt;br/&amp;gt;&lt;br /&gt;
(You may only need to do this if somebody else worked on the original in the meantime)&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
git checkout v3.0.0-rc1 &amp;lt;br/&amp;gt;&lt;br /&gt;
git fetch upstream &amp;lt;br/&amp;gt;&lt;br /&gt;
git merge upstream/v3.0.0-rc1 &amp;lt;br/&amp;gt;&lt;br /&gt;
git push &amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Step 5. Optional: If you want to create multiple pull requests, then create a branch for every separate issue you'd like to fix.'''&amp;lt;br/&amp;gt;&lt;br /&gt;
(Upstream can then select to accept and reject individual fixes)&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
git checkout -b myfeature v3.0.0-rc1&amp;lt;br/&amp;gt;&lt;br /&gt;
git push --set-upstream origin myfeature&amp;lt;br/&amp;gt;&lt;br /&gt;
git remote set-branches --add origin myfeature&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Step 6. Make local changes and commit them'''&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
git add ...&amp;lt;br/&amp;gt;&lt;br /&gt;
git commit&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Step 7. Push your local changes to your fork at Github'''&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
git push&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Step 8. Create the pull request'''&lt;br /&gt;
* a. Browse to your own fork: https://github.com/lifeforms/owasp-modsecurity-crs&lt;br /&gt;
* b. Click &amp;quot;New pull request&amp;quot; button&lt;br /&gt;
* c. In the &amp;quot;base fork&amp;quot;, ensure that the correct branch is selected: v3.0.0-rc1&lt;br /&gt;
* d. In the &amp;quot;head fork&amp;quot;, pick &amp;quot;myfeature&amp;quot; (if you used branches) or v3.0.0-rc1 (if you didn't)&lt;br /&gt;
* e. Review the content of the pull request (should only contain your commits)&lt;br /&gt;
* f. Press &amp;quot;Create pull request&amp;quot; button&lt;br /&gt;
&lt;br /&gt;
===Resources===&lt;br /&gt;
&lt;br /&gt;
* https://help.github.com/articles/fork-a-repo/&lt;br /&gt;
* https://help.github.com/articles/syncing-a-fork/&lt;br /&gt;
* https://help.github.com/articles/using-pull-requests/&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP ModSecurity Core Rule Set Project]]&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_950001&amp;diff=210896</id>
		<title>OWASP ModSec CRS Paranoia Mode Sibling 950001</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_950001&amp;diff=210896"/>
				<updated>2016-03-10T09:39:07Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: /* 950001 : SQL Injection Attack */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;''This page contains a proposal for a stricter rule-clone for [[OWASP_ModSec_CRS_Paranoia_Mode|ModSecurity CRS Paranoia Mode]].''&lt;br /&gt;
&lt;br /&gt;
== 950001 : SQL Injection Attack ==&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | '''RuleID 2.2.x'''&lt;br /&gt;
 | '''RuleID 3.0.0-rc1 (original Rule)'''&lt;br /&gt;
 | '''RuleID 3.0.0-rc1 (paranoid Rule)'''&lt;br /&gt;
 | '''Change'''&lt;br /&gt;
 | '''Whitelisting'''&lt;br /&gt;
|-&lt;br /&gt;
 | 950001&lt;br /&gt;
 | 942150&lt;br /&gt;
 | 942151-942154&lt;br /&gt;
 | Rule now triggers on it's own&lt;br /&gt;
 | none&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
  #&lt;br /&gt;
  # -=[ SQL Function Names ]=-&lt;br /&gt;
  #&lt;br /&gt;
  # This is a paranoid sibling to 2.2.x Rule 950001.&lt;br /&gt;
  # The rule is no longer chained in order to trigger anomaly scoring.&lt;br /&gt;
  # For 3.0.0-rc1 rule, see 942150.&lt;br /&gt;
  #&lt;br /&gt;
  SecRule REQUEST_COOKIES|!REQUEST_COOKIES:/__utm/|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/* &amp;quot;@pmf sql-function-names.data&amp;quot; \&lt;br /&gt;
        &amp;quot;msg:'SQL Injection Attack',\&lt;br /&gt;
        phase:request,\&lt;br /&gt;
        rev:'2',\&lt;br /&gt;
        ver:'OWASP_CRS/2.2.6',\&lt;br /&gt;
        maturity:'9',\&lt;br /&gt;
        accuracy:'8',\&lt;br /&gt;
        capture,\&lt;br /&gt;
        t:none,t:urlDecodeUni,\&lt;br /&gt;
        ctl:auditLogParts=+E,\&lt;br /&gt;
        block,\&lt;br /&gt;
        id:'XXXXXX',\&lt;br /&gt;
        tag:'application-multi',\&lt;br /&gt;
        tag:'language-mutli',\&lt;br /&gt;
        tag:'platform-multi',\&lt;br /&gt;
        tag:'attack-sqli',\&lt;br /&gt;
        tag:'OWASP_CRS/WEB_ATTACK/SQL_INJECTION',\&lt;br /&gt;
        tag:'WASCTC/WASC-19',\&lt;br /&gt;
        tag:'OWASP_TOP_10/A1',\&lt;br /&gt;
        tag:'OWASP_AppSensor/CIE1',\&lt;br /&gt;
        tag:'PCI/6.5.2',\&lt;br /&gt;
        logdata:'Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}',\&lt;br /&gt;
        severity:'CRITICAL'&lt;br /&gt;
        setvar:'tx.msg=%{rule.msg}',\&lt;br /&gt;
        setvar:tx.sql_injection_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
        setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
        setvar:tx.%{rule.id}-OWASP_CRS/WEB_ATTACK/SQL_INJECTION-%{matched_var_name}=%{tx.0}&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP ModSecurity Core Rule Set Project]]&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_950907&amp;diff=210895</id>
		<title>OWASP ModSec CRS Paranoia Mode Sibling 950907</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_950907&amp;diff=210895"/>
				<updated>2016-03-10T09:36:32Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: /* 950907 : OS Command Injection Attacks */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;''This page contains a proposal for a stricter rule-clone for [[OWASP_ModSec_CRS_Paranoia_Mode|ModSecurity CRS Paranoia Mode]].''&lt;br /&gt;
&lt;br /&gt;
== 950907 : OS Command Injection Attacks ==&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | '''RuleID 2.2.x'''&lt;br /&gt;
 | '''RuleID 3.0.0-rc1 (original Rule)'''&lt;br /&gt;
 | '''RuleID 3.0.0-rc1 (paranoid Rule)'''&lt;br /&gt;
 | '''Change'''&lt;br /&gt;
 | '''Whitelisting'''&lt;br /&gt;
|-&lt;br /&gt;
 | 950907&lt;br /&gt;
 | 932100&lt;br /&gt;
 | 932101-932104&lt;br /&gt;
 | Rule now triggers on it's own&lt;br /&gt;
 | none&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
  #&lt;br /&gt;
  # OS Command Injection Attacks&lt;br /&gt;
  #&lt;br /&gt;
  # This is a paranoid sibling to 2.2.x Rule 950907.&lt;br /&gt;
  # The rule is no longer chained in order to trigger anomaly scoring.&lt;br /&gt;
  # For 3.0.0-rc1 rule, see 932100. &lt;br /&gt;
  #&lt;br /&gt;
  SecRule REQUEST_COOKIES|!REQUEST_COOKIES:/__utm/|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/* &amp;quot;@pmf os-commands.data&amp;quot; \&lt;br /&gt;
        &amp;quot;msg:'Remote Command Execution (RCE) Attempt',\&lt;br /&gt;
        phase:request,\&lt;br /&gt;
        rev:'2',\&lt;br /&gt;
        ver:'OWASP_CRS/3.0.0',\&lt;br /&gt;
        maturity:'9',\&lt;br /&gt;
        accuracy:'8',\&lt;br /&gt;
        t:none,t:normalisePath,\&lt;br /&gt;
        ctl:auditLogParts=+E,\&lt;br /&gt;
        block,\&lt;br /&gt;
        id:'XXXXXX',\&lt;br /&gt;
        tag:'application-multi',\&lt;br /&gt;
        tag:'language-multi',\&lt;br /&gt;
        tag:'platform-multi',\&lt;br /&gt;
        tag:'attack-remote code execution',\&lt;br /&gt;
        tag:'OWASP_CRS/WEB_ATTACK/COMMAND_INJECTION',\&lt;br /&gt;
        tag:'WASCTC/WASC-31',\&lt;br /&gt;
        tag:'OWASP_TOP_10/A1',\&lt;br /&gt;
        tag:'PCI/6.5.2',\&lt;br /&gt;
        logdata:'Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}',\&lt;br /&gt;
        severity:'CRITICAL',\&lt;br /&gt;
        setvar:'tx.msg=%{rule.msg}',\&lt;br /&gt;
        setvar:tx.rce_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
        setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
        setvar:tx.%{rule.id}-OWASP_CRS/WEB_ATTACK/RCE-%{matched_var_name}=%{tx.0}&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP ModSecurity Core Rule Set Project]]&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_958977&amp;diff=210892</id>
		<title>OWASP ModSec CRS Paranoia Mode Sibling 958977</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_958977&amp;diff=210892"/>
				<updated>2016-03-10T09:33:59Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: /* 958977 : PHP Injection Attack: Configuration Directive Found */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;''This page contains a proposal for a stricter rule-clone for [[OWASP_ModSec_CRS_Paranoia_Mode|ModSecurity CRS Paranoia Mode]].''&lt;br /&gt;
&lt;br /&gt;
== 958977 : PHP Injection Attack: Function Name Found ==&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | '''RuleID 2.2.x'''&lt;br /&gt;
 | '''RuleID 3.0.0-rc1 (original Rule)'''&lt;br /&gt;
 | '''RuleID 3.0.0-rc1 (paranoid Rule)'''&lt;br /&gt;
 | '''Change'''&lt;br /&gt;
 | '''Whitelisting'''&lt;br /&gt;
|-&lt;br /&gt;
 | 958977&lt;br /&gt;
 | 933110&lt;br /&gt;
 | 933111-933114&lt;br /&gt;
 | Rule now triggers on it's own&lt;br /&gt;
 | none&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
  #&lt;br /&gt;
  # [ PHP Function Names ]&lt;br /&gt;
  # &lt;br /&gt;
  # This is a paranoid sibling to 2.2.x Rule 958977.&lt;br /&gt;
  # The rule is no longer chained in order to trigger anomaly scoring.&lt;br /&gt;
  # For 3.0.0-rc1 rule, see 933110. &lt;br /&gt;
  #&lt;br /&gt;
  SecRule REQUEST_COOKIES|!REQUEST_COOKIES:/__utm/|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/* &amp;quot;@pmf php-function-names.data&amp;quot; \&lt;br /&gt;
        &amp;quot;msg:'PHP Injection Attack: Function Name Found',\&lt;br /&gt;
        phase:request,\&lt;br /&gt;
        rev:'2',\&lt;br /&gt;
        ver:'OWASP_CRS/3.0.0',\&lt;br /&gt;
        maturity:'1',\&lt;br /&gt;
        accuracy:'8',\&lt;br /&gt;
        t:none,t:normalisePath,t:urldecode,\&lt;br /&gt;
        ctl:auditLogParts=+E,\&lt;br /&gt;
        block,\&lt;br /&gt;
        id:'XXXXXX',\&lt;br /&gt;
        tag:'application-multi',\&lt;br /&gt;
        tag:'language-PHP',\&lt;br /&gt;
        tag:'platform-multi',\&lt;br /&gt;
        tag:'attack-PHP injection',\&lt;br /&gt;
        tag:'OWASP_CRS/WEB_ATTACK/PHP_INJECTION',\&lt;br /&gt;
        tag:'OWASP_TOP_10/A1',\&lt;br /&gt;
        logdata:'Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}',\&lt;br /&gt;
        severity:'CRITICAL',\&lt;br /&gt;
        setvar:'tx.msg=%{rule.msg}',\&lt;br /&gt;
        setvar:tx.php_injection_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
        setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
        setvar:tx.%{rule.id}-OWASP_CRS/WEB_ATTACK/PHP_INJECTION-%{matched_var_name}=%{tx.0}&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP ModSecurity Core Rule Set Project]]&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_958977&amp;diff=210891</id>
		<title>OWASP ModSec CRS Paranoia Mode Sibling 958977</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_958977&amp;diff=210891"/>
				<updated>2016-03-10T09:31:34Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: /* 958977 : PHP Injection Attack: Configuration Directive Found */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;''This page contains a proposal for a stricter rule-clone for [[OWASP_ModSec_CRS_Paranoia_Mode|ModSecurity CRS Paranoia Mode]].''&lt;br /&gt;
&lt;br /&gt;
== 958977 : PHP Injection Attack: Configuration Directive Found ==&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | '''RuleID 2.2.x'''&lt;br /&gt;
 | '''RuleID 3.0.0-rc1 (original Rule)'''&lt;br /&gt;
 | '''RuleID 3.0.0-rc1 (paranoid Rule)'''&lt;br /&gt;
 | '''Change'''&lt;br /&gt;
 | '''Whitelisting'''&lt;br /&gt;
|-&lt;br /&gt;
 | 958977&lt;br /&gt;
 | 933110&lt;br /&gt;
 | 933111-933114&lt;br /&gt;
 | Rule now triggers on it's own&lt;br /&gt;
 | none&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
  #&lt;br /&gt;
  # [ PHP Function Names ]&lt;br /&gt;
  # &lt;br /&gt;
  # This is a paranoid sibling to 2.2.x Rule 958977.&lt;br /&gt;
  # The rule is no longer chained in order to trigger anomaly scoring.&lt;br /&gt;
  # For 3.0.0-rc1 rule, see 933110. &lt;br /&gt;
  #&lt;br /&gt;
  SecRule REQUEST_COOKIES|!REQUEST_COOKIES:/__utm/|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/* &amp;quot;@pmf php-function-names.data&amp;quot; \&lt;br /&gt;
        &amp;quot;msg:'PHP Injection Attack: Function Name Found',\&lt;br /&gt;
        phase:request,\&lt;br /&gt;
        rev:'2',\&lt;br /&gt;
        ver:'OWASP_CRS/3.0.0',\&lt;br /&gt;
        maturity:'1',\&lt;br /&gt;
        accuracy:'8',\&lt;br /&gt;
        t:none,t:normalisePath,t:urldecode,\&lt;br /&gt;
        ctl:auditLogParts=+E,\&lt;br /&gt;
        block,\&lt;br /&gt;
        id:'XXXXXX',\&lt;br /&gt;
        tag:'application-multi',\&lt;br /&gt;
        tag:'language-PHP',\&lt;br /&gt;
        tag:'platform-multi',\&lt;br /&gt;
        tag:'attack-PHP injection',\&lt;br /&gt;
        tag:'OWASP_CRS/WEB_ATTACK/PHP_INJECTION',\&lt;br /&gt;
        tag:'OWASP_TOP_10/A1',\&lt;br /&gt;
        logdata:'Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}',\&lt;br /&gt;
        severity:'CRITICAL',\&lt;br /&gt;
        setvar:'tx.msg=%{rule.msg}',\&lt;br /&gt;
        setvar:tx.php_injection_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
        setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
        setvar:tx.%{rule.id}-OWASP_CRS/WEB_ATTACK/PHP_INJECTION-%{matched_var_name}=%{tx.0}&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP ModSecurity Core Rule Set Project]]&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_958979&amp;diff=210890</id>
		<title>OWASP ModSec CRS Paranoia Mode Sibling 958979</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_958979&amp;diff=210890"/>
				<updated>2016-03-10T09:29:26Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: /* 958979 : PHP Injection Attack: Configuration Directive Found */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;''This page contains a proposal for a stricter rule-clone for [[OWASP_ModSec_CRS_Paranoia_Mode|ModSecurity CRS Paranoia Mode]].''&lt;br /&gt;
&lt;br /&gt;
== 958979 : PHP Injection Attack: Configuration Directive Found ==&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | '''RuleID 2.2.x'''&lt;br /&gt;
 | '''RuleID 3.0.0-rc1 (original Rule)'''&lt;br /&gt;
 | '''RuleID 3.0.0-rc1 (paranoid Rule)'''&lt;br /&gt;
 | '''Change'''&lt;br /&gt;
 | '''Whitelisting'''&lt;br /&gt;
|-&lt;br /&gt;
 | 958979&lt;br /&gt;
 | 933120&lt;br /&gt;
 | 933121-933124&lt;br /&gt;
 | Rule now triggers on it's own&lt;br /&gt;
 | none&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
  #&lt;br /&gt;
  # [ PHP Configuration Directives ]&lt;br /&gt;
  # &lt;br /&gt;
  # This is a paranoid sibling to 2.2.x Rule 958979.&lt;br /&gt;
  # The rule is no longer chained in order to trigger anomaly scoring.&lt;br /&gt;
  # For 3.0.0-rc1 rule, see 933120. &lt;br /&gt;
  #&lt;br /&gt;
  SecRule REQUEST_COOKIES|!REQUEST_COOKIES:/__utm/|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/* &amp;quot;@pmf php-config-directives.data&amp;quot; \&lt;br /&gt;
        &amp;quot;msg:'PHP Injection Attack: Configuration Directive Found',\&lt;br /&gt;
        phase:request,\&lt;br /&gt;
        rev:'1',\&lt;br /&gt;
        ver:'OWASP_CRS/3.0.0',\&lt;br /&gt;
        maturity:'1',\&lt;br /&gt;
        accuracy:'8',\&lt;br /&gt;
        t:none,t:normalisePath,\&lt;br /&gt;
        ctl:auditLogParts=+E,\&lt;br /&gt;
        block,\&lt;br /&gt;
        id:'XXXXXX',\&lt;br /&gt;
        tag:'application-multi',\&lt;br /&gt;
        tag:'language-PHP',\&lt;br /&gt;
        tag:'platform-multi',\&lt;br /&gt;
        tag:'attack-PHP injection',\&lt;br /&gt;
        tag:'OWASP_CRS/WEB_ATTACK/PHP_INJECTION',\&lt;br /&gt;
        tag:'OWASP_TOP_10/A1',\&lt;br /&gt;
        logdata:'Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}',\&lt;br /&gt;
        severity:'CRITICAL',\&lt;br /&gt;
        setvar:'tx.msg=%{rule.msg}',\&lt;br /&gt;
        setvar:tx.php_injection_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
        setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
        setvar:tx.%{rule.id}-OWASP_CRS/WEB_ATTACK/PHP_INJECTION-%{matched_var_name}=%{tx.0}&amp;quot;&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_958980&amp;diff=210889</id>
		<title>OWASP ModSec CRS Paranoia Mode Sibling 958980</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_958980&amp;diff=210889"/>
				<updated>2016-03-10T09:26:12Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: /* 958980 : PHP Injection Attack: Variables Found */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;''This page contains a proposal for a stricter rule-clone for [[OWASP_ModSec_CRS_Paranoia_Mode|ModSecurity CRS Paranoia Mode]].''&lt;br /&gt;
&lt;br /&gt;
== 958980 : PHP Injection Attack: Variables Found ==&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | '''RuleID 2.2.x'''&lt;br /&gt;
 | '''RuleID 3.0.0-rc1 (original Rule)'''&lt;br /&gt;
 | '''RuleID 3.0.0-rc1 (paranoid Rule)'''&lt;br /&gt;
 | '''Change'''&lt;br /&gt;
 | '''Whitelisting'''&lt;br /&gt;
|-&lt;br /&gt;
 | 958980&lt;br /&gt;
 | 933130&lt;br /&gt;
 | 933131-933134&lt;br /&gt;
 | Rule now triggers on it's own&lt;br /&gt;
 | none&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
  #&lt;br /&gt;
  # [ PHP Variables ]&lt;br /&gt;
  #&lt;br /&gt;
  # This is a paranoid sibling to 2.2.x Rule 958980.&lt;br /&gt;
  # The rule is no longer chained in order to trigger anomaly scoring.&lt;br /&gt;
  # For 3.0.0-rc1 rule, see 933130.&lt;br /&gt;
  #&lt;br /&gt;
  SecRule REQUEST_COOKIES|!REQUEST_COOKIES:/__utm/|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/* &amp;quot;@pmf php-variables.data&amp;quot; \&lt;br /&gt;
        &amp;quot;msg:'PHP Injection Attack: Variables Found',\&lt;br /&gt;
        phase:request,\&lt;br /&gt;
        rev:'1',\&lt;br /&gt;
        ver:'OWASP_CRS/3.0.0',\&lt;br /&gt;
        maturity:'1',\&lt;br /&gt;
        accuracy:'8',\&lt;br /&gt;
        t:none,t:normalisePath,\&lt;br /&gt;
        ctl:auditLogParts=+E,\&lt;br /&gt;
        block,\&lt;br /&gt;
        id:'XXXXXX',\&lt;br /&gt;
        tag:'application-multi',\&lt;br /&gt;
        tag:'language-PHP',\&lt;br /&gt;
        tag:'platform-multi',\&lt;br /&gt;
        tag:'attack-PHP injection',\&lt;br /&gt;
        tag:'OWASP_CRS/WEB_ATTACK/PHP_INJECTION',\&lt;br /&gt;
        tag:'OWASP_TOP_10/A1',\&lt;br /&gt;
        logdata:'Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}',\&lt;br /&gt;
        severity:'CRITICAL',\&lt;br /&gt;
        setvar:'tx.msg=%{rule.msg}',\&lt;br /&gt;
        setvar:tx.php_injection_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
        setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
        setvar:tx.%{rule.id}-OWASP_CRS/WEB_ATTACK/PHP_INJECTION-%{matched_var_name}=%{tx.0}&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP ModSecurity Core Rule Set Project]]&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_960901&amp;diff=210887</id>
		<title>OWASP ModSec CRS Paranoia Mode Sibling 960901</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_960901&amp;diff=210887"/>
				<updated>2016-03-10T09:12:39Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: /* 960901 : Invalid character in request */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;''This page contains a proposal for a stricter rule-clone for [[OWASP_ModSec_CRS_Paranoia_Mode|ModSecurity CRS Paranoia Mode]].''&lt;br /&gt;
&lt;br /&gt;
== 960901 : Invalid character in request ==&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | '''RuleID 2.2.x'''&lt;br /&gt;
 | '''RuleID 3.0.0-rc1 (original Rule)'''&lt;br /&gt;
 | '''RuleID 3.0.0-rc1 (paranoid Rule)'''&lt;br /&gt;
 | '''Change'''&lt;br /&gt;
 | '''Whitelisting'''&lt;br /&gt;
|-&lt;br /&gt;
 | 960901&lt;br /&gt;
 | 920270&lt;br /&gt;
 | 920271-920274&lt;br /&gt;
 | Character byte range limited to 32-126.&lt;br /&gt;
 | none&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
  #&lt;br /&gt;
  # [ Invalid character in request ]&lt;br /&gt;
  #&lt;br /&gt;
  # This is a paranoid sibling to 2.2.x Rule 960901.&lt;br /&gt;
  # Byte range restrictions are now set to 32-126.&lt;br /&gt;
  # For 3.0.0-rc1 rule, see 920270. &lt;br /&gt;
  #&lt;br /&gt;
  SecRule ARGS|ARGS_NAMES|REQUEST_HEADERS|!REQUEST_HEADERS:Referer &amp;quot;@validateByteRange 32-126&amp;quot; \&lt;br /&gt;
        &amp;quot;phase:request,\&lt;br /&gt;
        rev:'2',\&lt;br /&gt;
        ver:'OWASP_CRS/3.0.0',\&lt;br /&gt;
        maturity:'9',\&lt;br /&gt;
        accuracy:'9',\&lt;br /&gt;
        block,\&lt;br /&gt;
        msg:'Invalid character in request',\&lt;br /&gt;
        id:'XXXXXX',\&lt;br /&gt;
        severity:'ERROR',\&lt;br /&gt;
        t:none,t:urlDecodeUni,\&lt;br /&gt;
        tag:'application-multi',\&lt;br /&gt;
        tag:'language-multi',\&lt;br /&gt;
        tag:'platform-multi',\&lt;br /&gt;
        tag:'attack-protocol',\&lt;br /&gt;
        tag:'OWASP_CRS/PROTOCOL_VIOLATION/EVASION',\&lt;br /&gt;
        setvar:'tx.msg=%{rule.msg}',\&lt;br /&gt;
        setvar:tx.anomaly_score=+%{tx.error_anomaly_score},\&lt;br /&gt;
        setvar:tx.%{rule.id}-OWASP_CRS/PROTOCOL_VIOLATION/EVASION-%{matched_var_name}=%{matched_var}&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP ModSecurity Core Rule Set Project]]&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_960901&amp;diff=210884</id>
		<title>OWASP ModSec CRS Paranoia Mode Sibling 960901</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_960901&amp;diff=210884"/>
				<updated>2016-03-10T09:09:47Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: /* 960901 : Invalid character in request */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;''This page contains a proposal for a stricter rule-clone for [[OWASP_ModSec_CRS_Paranoia_Mode|ModSecurity CRS Paranoia Mode]].''&lt;br /&gt;
&lt;br /&gt;
== 960901 : Invalid character in request ==&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | '''RuleID 2.2.x'''&lt;br /&gt;
 | '''RuleID 3.0.0-rc1 (original Rule)'''&lt;br /&gt;
 | '''RuleID 3.0.0-rc1 (paranoid Rule)'''&lt;br /&gt;
 | '''Change'''&lt;br /&gt;
 | '''Whitelisting'''&lt;br /&gt;
|-&lt;br /&gt;
 | 960901&lt;br /&gt;
 | 920270&lt;br /&gt;
 | 920271-920274&lt;br /&gt;
 | Character byte range limited to 32-126.&lt;br /&gt;
 | none&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
  #&lt;br /&gt;
  # [ Invalid character in request ]&lt;br /&gt;
  #&lt;br /&gt;
  # This is a paranoid sibling to 2.2.x Rule 960901.&lt;br /&gt;
  # Byte range restrictions are now set to 32-126.&lt;br /&gt;
  # For unadapted 3.0.0 Rule see Rule ID 920270. &lt;br /&gt;
  #&lt;br /&gt;
  SecRule ARGS|ARGS_NAMES|REQUEST_HEADERS|!REQUEST_HEADERS:Referer &amp;quot;@validateByteRange 32-126&amp;quot; \&lt;br /&gt;
        &amp;quot;phase:request,\&lt;br /&gt;
        rev:'2',\&lt;br /&gt;
        ver:'OWASP_CRS/3.0.0',\&lt;br /&gt;
        maturity:'9',\&lt;br /&gt;
        accuracy:'9',\&lt;br /&gt;
        block,\&lt;br /&gt;
        msg:'Invalid character in request',\&lt;br /&gt;
        id:'XXXXXX',\&lt;br /&gt;
        severity:'ERROR',\&lt;br /&gt;
        t:none,t:urlDecodeUni,\&lt;br /&gt;
        tag:'application-multi',\&lt;br /&gt;
        tag:'language-multi',\&lt;br /&gt;
        tag:'platform-multi',\&lt;br /&gt;
        tag:'attack-protocol',\&lt;br /&gt;
        tag:'OWASP_CRS/PROTOCOL_VIOLATION/EVASION',\&lt;br /&gt;
        setvar:'tx.msg=%{rule.msg}',\&lt;br /&gt;
        setvar:tx.anomaly_score=+%{tx.error_anomaly_score},\&lt;br /&gt;
        setvar:tx.%{rule.id}-OWASP_CRS/PROTOCOL_VIOLATION/EVASION-%{matched_var_name}=%{matched_var}&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP ModSecurity Core Rule Set Project]]&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_970003&amp;diff=210878</id>
		<title>OWASP ModSec CRS Paranoia Mode Sibling 970003</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_970003&amp;diff=210878"/>
				<updated>2016-03-10T08:49:30Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: /* 970003 : SQL Error Leakage */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;''This page contains a proposal for a stricter rule-clone for [[OWASP_ModSec_CRS_Paranoia_Mode|ModSecurity CRS Paranoia Mode]].''&lt;br /&gt;
&lt;br /&gt;
== 970003 : SQL Error Leakage ==&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | '''RuleID 2.2.x'''&lt;br /&gt;
 | '''RuleID 3.0.0-rc1 (original Rule)'''&lt;br /&gt;
 | '''RuleID 3.0.0-rc1 (paranoid Rule)'''&lt;br /&gt;
 | '''Change'''&lt;br /&gt;
 | '''Whitelisting'''&lt;br /&gt;
|-&lt;br /&gt;
 | 970003&lt;br /&gt;
 | 951100&lt;br /&gt;
 | 951101-951104&lt;br /&gt;
 | Triggers anomaly score directly now&lt;br /&gt;
 | none&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
  #&lt;br /&gt;
  # -=[ SQL Error Leakage ]=-&lt;br /&gt;
  #&lt;br /&gt;
  # This is a paranoid sibling to 2.2.9 Rule 970003.&lt;br /&gt;
  # The rule now triggers the anomaly scoring instantly&lt;br /&gt;
  # instead of just setting tx.sql_error_match.&lt;br /&gt;
  # For 3.0.0-rc1 rule, see 951100.&lt;br /&gt;
  #&lt;br /&gt;
  SecRule RESPONSE_BODY &amp;quot;@pmFromFile sql-errors.data&amp;quot; \&lt;br /&gt;
        &amp;quot;phase:response,\&lt;br /&gt;
        id:XXXXXX,\&lt;br /&gt;
        rev:'5',\&lt;br /&gt;
        ver:'OWASP_CRS/3.0.0',\&lt;br /&gt;
        pass,\&lt;br /&gt;
        nolog,\&lt;br /&gt;
        tag:'application-multi',\&lt;br /&gt;
        tag:'language-multi',\&lt;br /&gt;
        tag:'platform-multi',\&lt;br /&gt;
        tag:'attack-information disclosure',\&lt;br /&gt;
        setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
        t:none&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP ModSecurity Core Rule Set Project]]&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981172&amp;diff=210877</id>
		<title>OWASP ModSec CRS Paranoia Mode Sibling 981172</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981172&amp;diff=210877"/>
				<updated>2016-03-10T08:44:25Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: /* 981172 : SQL Injection Character Anomaly Usage */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;''This page contains a proposal for a stricter rule-clone for [[OWASP_ModSec_CRS_Paranoia_Mode|ModSecurity CRS Paranoia Mode]].''&lt;br /&gt;
&lt;br /&gt;
== 981172 : SQL Injection Character Anomaly Usage ==&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | '''RuleID 2.2.x'''&lt;br /&gt;
 | '''RuleID 3.0.0-rc1 (original Rule)'''&lt;br /&gt;
 | '''RuleID 3.0.0-rc1 (paranoid Rule)'''&lt;br /&gt;
 | '''Change'''&lt;br /&gt;
 | '''Whitelisting'''&lt;br /&gt;
|-&lt;br /&gt;
 | 981172&lt;br /&gt;
 | tbd&lt;br /&gt;
 | tbd&lt;br /&gt;
 | Regex counter decreased from 8 to 2.&amp;lt;br&amp;gt;Anomaly scoring increased to critical.&lt;br /&gt;
 | None&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
  #&lt;br /&gt;
  # -=[ SQL Injection Character Anomaly Usage  ]=-&lt;br /&gt;
  #&lt;br /&gt;
  # This is a paranoid sibling to 2.2.9 Rule 981172.&lt;br /&gt;
  # The regex limit is set to '2' and the anomaly scoring is increased to 'critical'.&lt;br /&gt;
  #&lt;br /&gt;
  SecRule REQUEST_COOKIES|!REQUEST_COOKIES:/__utm/|!REQUEST_COOKIES:/__utm/|REQUEST_COOKIES_NAMES &amp;quot;([\~\!\@\#\$\%\^\&amp;amp;\*\(\)\-\+\=\{\}\[\]\|\:\;\&amp;quot;\'\´\’\‘\`\&amp;lt;\&amp;gt;].*?){2,}&amp;quot;&lt;br /&gt;
        &amp;quot;capture,\&lt;br /&gt;
        phase:request,\&lt;br /&gt;
        rev:'2',\&lt;br /&gt;
        ver:'OWASP_CRS/3.0.0',\&lt;br /&gt;
        maturity:'X',\&lt;br /&gt;
        accuracy:'Y',\&lt;br /&gt;
        t:none,t:urlDecodeUni,\&lt;br /&gt;
        block,\&lt;br /&gt;
        msg:'Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded',\&lt;br /&gt;
        id:'XXXXXX',\&lt;br /&gt;
        tag:'OWASP_CRS/WEB_ATTACK/SQL_INJECTION',\&lt;br /&gt;
        tag:'Paranoia rule on level Z',\&lt;br /&gt;
        logdata:'Matched Data: %{TX.1} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}',\&lt;br /&gt;
        severity:'CRITICAL',\&lt;br /&gt;
        setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
        setvar:tx.sql_injection_score=+1,\&lt;br /&gt;
        setvar:'tx.msg=%{rule.msg}',\&lt;br /&gt;
        setvar:tx.%{rule.id}-OWASP_CRS/WEB_ATTACK/RESTRICTED_SQLI_CHARS-%{matched_var_name}=%{tx.0}&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP ModSecurity Core Rule Set Project]]&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981173&amp;diff=210857</id>
		<title>OWASP ModSec CRS Paranoia Mode Sibling 981173</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981173&amp;diff=210857"/>
				<updated>2016-03-10T07:24:02Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: /* 981173 : SQL Injection Character Anomaly Usage */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;''This page contains a proposal for a stricter rule-clone for [[OWASP_ModSec_CRS_Paranoia_Mode|ModSecurity CRS Paranoia Mode]].''&lt;br /&gt;
&lt;br /&gt;
== 981173 : SQL Injection Character Anomaly Usage ==&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | '''RuleID 2.2.x'''&lt;br /&gt;
 | '''RuleID 3.0.0-rc1 (original Rule)'''&lt;br /&gt;
 | '''RuleID 3.0.0-rc1 (paranoid Rule)'''&lt;br /&gt;
 | '''Change'''&lt;br /&gt;
 | '''Whitelisting'''&lt;br /&gt;
|-&lt;br /&gt;
 | 981173&lt;br /&gt;
 | tbd&lt;br /&gt;
 | tbd&lt;br /&gt;
 | Regex counter decreased from 4 to 1.&amp;lt;br&amp;gt;Anomaly scoring increased to critical.&lt;br /&gt;
 | Regex for UUIDs in chained Rule&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
  #&lt;br /&gt;
  # -=[ SQL Injection Character Anomaly Usage ]=-&lt;br /&gt;
  #&lt;br /&gt;
  # This is a paranoid sibling to 2.2.x Rule 981173.&lt;br /&gt;
  # The regex limit is set to '1' and the anomaly scoring is increased to 'critical'.&lt;br /&gt;
  # For dealing with false positives, UUID format is whitelisted with a chained rule.&lt;br /&gt;
  # For 3.0.0-rc1 rule, see FIXME.&lt;br /&gt;
  #&lt;br /&gt;
  SecRule ARGS_NAMES|ARGS|XML:/* &amp;quot;([\~\!\@\#\$\%\^\&amp;amp;\*\(\)\-\+\=\{\}\[\]\|\:\;\&amp;quot;\'\´\’\‘\`\&amp;lt;\&amp;gt;].*?){1,}&amp;quot;\&lt;br /&gt;
        &amp;quot;chain,\&lt;br /&gt;
        phase:request,\&lt;br /&gt;
        rev:'2',\&lt;br /&gt;
        ver:'OWASP_CRS/3.0.0',\&lt;br /&gt;
        maturity:'X',\&lt;br /&gt;
        accuracy:'Y',\&lt;br /&gt;
        t:none,t:urlDecodeUni,\&lt;br /&gt;
        block,\&lt;br /&gt;
        msg:'Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded',\&lt;br /&gt;
        id:'XXXXXX',\&lt;br /&gt;
        tag:'OWASP_CRS/WEB_ATTACK/SQL_INJECTION',\&lt;br /&gt;
        tag:'Paranoia rule on level Z',\&lt;br /&gt;
        logdata:'Matched Data: %{TX.1} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}',\&lt;br /&gt;
        severity:'CRITICAL',\&lt;br /&gt;
        setvar:'tx.msg=%{rule.msg}',\&lt;br /&gt;
        setvar:tx.%{rule.id}-OWASP_CRS/WEB_ATTACK/RESTRICTED_SQLI_CHARS-%{matched_var_name}=%{tx.0}&amp;quot;&lt;br /&gt;
        SecRule MATCHED_VARS &amp;quot;!@rx ^[a-f0-9-]{36}$&amp;quot;\&lt;br /&gt;
                &amp;quot;t:lowercase,\&lt;br /&gt;
                setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
                setvar:tx.sql_injection_score=+1&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP ModSecurity Core Rule Set Project]]&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981049&amp;diff=210856</id>
		<title>OWASP ModSec CRS Paranoia Mode Sibling 981049</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981049&amp;diff=210856"/>
				<updated>2016-03-10T07:21:44Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: /* 981049 : Potential Denial of Service (DoS) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;''This page contains a proposal for a stricter rule-clone for [[OWASP_ModSec_CRS_Paranoia_Mode|ModSecurity CRS Paranoia Mode]].''&lt;br /&gt;
&lt;br /&gt;
== 981049 : Potential Denial of Service (DoS) ==&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | '''RuleID 2.2.x'''&lt;br /&gt;
 | '''RuleID 3.0.0-rc1 (original Rule)'''&lt;br /&gt;
 | '''RuleID 3.0.0-rc1 (paranoid Rule)'''&lt;br /&gt;
 | '''Change'''&lt;br /&gt;
 | '''Whitelisting'''&lt;br /&gt;
|-&lt;br /&gt;
 | 981049&lt;br /&gt;
 | 912100&lt;br /&gt;
 | 912101-912104&lt;br /&gt;
 | Operator match decreased form 2 to 1.&amp;lt;br&amp;gt;''Optional: change tx.dos_burst_time_slice, tx.dos_counter_threshold and/or tx.dos_block_timeout''&lt;br /&gt;
 | None&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
  #&lt;br /&gt;
  # -=[ Potential Denial of Service (DoS)  ]=-&lt;br /&gt;
  #&lt;br /&gt;
  # This is a paranoid sibling to 2.2.9 Experimental Rule 981049.&lt;br /&gt;
  # The rule now triggers after the first burst instead of the second.&lt;br /&gt;
  # For 3.0.0-rc1 rule, see 912100.&lt;br /&gt;
  #&lt;br /&gt;
  SecRule IP:DOS_BURST_COUNTER &amp;quot;@ge 1&amp;quot;&lt;br /&gt;
        &amp;quot;phase:logging,\&lt;br /&gt;
        rev:'1',\&lt;br /&gt;
        ver:'OWASP_CRS/3.0.0',\&lt;br /&gt;
        maturity:'X',\&lt;br /&gt;
        accuracy:'Y',\&lt;br /&gt;
        t:none,\&lt;br /&gt;
        log,\&lt;br /&gt;
        msg:'Potential Denial of Service (DoS) Attack from %{tx.real_ip} - # of Request Bursts:%{ip.dos_burst_counter}',\&lt;br /&gt;
        id:'XXXXXX',\&lt;br /&gt;
        tag:'FIXME Filler for attacktype',\&lt;br /&gt;
        tag:'Paranoia rule on level Z',\&lt;br /&gt;
        setvar:ip.dos_block=1,\&lt;br /&gt;
        expirevar:ip.dos_block=%{tx.dos_block_timeout},\&lt;br /&gt;
        pass&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== Notes ===&lt;br /&gt;
&lt;br /&gt;
This rule can not be implemented as is. Rules 981044 - 981048 from ''owasp-modsecurity-crs/experimental_rules/modsecurity_crs_11_dos_protection.conf'' need to be integrated to allow proper blocking. There should be no need to adjust these rules for desired effects.&lt;br /&gt;
&lt;br /&gt;
Also note that more Paranoia tuning can be done by adjusting the DoS Protection variable values in your main configuration (e.g. modsecurity_crs_10_setup.conf).&lt;br /&gt;
&lt;br /&gt;
  #&lt;br /&gt;
  # -- &amp;lt;nowiki&amp;gt;[[ DoS Protection ]]&amp;lt;/nowiki&amp;gt; ----------------------------------------------------------------&lt;br /&gt;
  #&lt;br /&gt;
  # This is a Paranoia Mode Clone.&lt;br /&gt;
  # Adjust the following variables to fine tune paranoia level.&lt;br /&gt;
  #&lt;br /&gt;
  # - Burst Time Slice Interval: time interval window to monitor for bursts&lt;br /&gt;
  # - Request Threshold: request # threshold to trigger a burst&lt;br /&gt;
  # - Block Period: temporary block timeout&lt;br /&gt;
  #&lt;br /&gt;
  SecAction \&lt;br /&gt;
        &amp;quot;id:XXXXXX',\&lt;br /&gt;
        phase:request,\&lt;br /&gt;
        t:none,\&lt;br /&gt;
        setvar:'tx.dos_burst_time_slice=90',\&lt;br /&gt;
        setvar:'tx.dos_counter_threshold=50',\&lt;br /&gt;
        setvar:'tx.dos_block_timeout=600',\&lt;br /&gt;
        nolog,\&lt;br /&gt;
        pass&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP ModSecurity Core Rule Set Project]]&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode&amp;diff=210579</id>
		<title>OWASP ModSec CRS Paranoia Mode</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode&amp;diff=210579"/>
				<updated>2016-03-06T19:42:28Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: /* Sub-Project Infos */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Abstract==&lt;br /&gt;
&lt;br /&gt;
This is a page about the development of a paranoia mode aka bringing back the rules that used to yield a high number of false positives. This little project is aimed at inclusion into the 3.0.0 release of the OWASP ModSecurity Core Rules, where some rules have been removed in order to reduce the number of false positives with vanilla installations.&lt;br /&gt;
&lt;br /&gt;
FIXME: Detailed description&lt;br /&gt;
&lt;br /&gt;
''Back to the [https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project OWASP ModSecurity Core Rules Set].''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Sub-Project Infos==&lt;br /&gt;
&lt;br /&gt;
* '''Status''': active (January 2016)&lt;br /&gt;
* '''Schedule''': Pull request in &amp;lt;strike&amp;gt;January&amp;lt;/strike&amp;gt;February  2016&lt;br /&gt;
* '''Who''': Christian Folini (dune73), Noël Zindel (zino), Franziska Bühler (franziskabuehler), Manuel Leos (Spartan), Walter Hop (lifeforms)&lt;br /&gt;
* '''Documentation''': Here on the [https://www.owasp.org/index.php/OWASP_ModSec_CRS_Paranoia_Mode OWASP Wiki] / [https://www.netnea.com/cms/2016/02/04/owasp-modsecurity-core-rules-paranoia-mode-mechanics-proposal/ Mechanics Proposal]&lt;br /&gt;
* '''Discussion / Archive''': &amp;lt;tt&amp;gt;owasp-modsecurity-core-rule-set@lists.owasp.org&amp;lt;/tt&amp;gt; / archive: http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/&lt;br /&gt;
* '''Github Link v3.0.0-rc1 (our base)''': https://github.com/SpiderLabs/owasp-modsecurity-crs/tree/v3.0.0-rc1&lt;br /&gt;
* '''Github Link paranoia-mode''': https://github.com/dune73/owasp-modsecurity-crs/tree/paranoia-mode&lt;br /&gt;
* '''Final Pull Request #1: Add paranoia mode mechanics''': https://github.com/SpiderLabs/owasp-modsecurity-crs/pull/292&lt;br /&gt;
* '''Final Pull Request #2: Move first rules to paranoia mode''': https://github.com/SpiderLabs/owasp-modsecurity-crs/pull/300&lt;br /&gt;
* '''Final Pull Request #3: Add 2.2.X rules to paranoia mode''': FIXME&lt;br /&gt;
* '''Final Pull Request #4: Add stricter siblings''': FIXME&lt;br /&gt;
&lt;br /&gt;
==Tasks==&lt;br /&gt;
&lt;br /&gt;
===Open Tasks===&lt;br /&gt;
&lt;br /&gt;
Please define state as follows: ''new'', ''assigned'', ''waiting'', ''closed''. When a task it is closed, it is moved to the seperate closed tasks table below.&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''Task'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Who'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | Write new stricter siblings for existing rules&lt;br /&gt;
  | Noël&lt;br /&gt;
  | assigned&lt;br /&gt;
|-&lt;br /&gt;
  | Define ID-space for strict siblings&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Sort out mechanics of the paranoia mode&lt;br /&gt;
  | Christian&lt;br /&gt;
  | assigned&lt;br /&gt;
|-&lt;br /&gt;
  | Define exact syntax of paranoia mode setup&lt;br /&gt;
  | Christian&lt;br /&gt;
  | waiting&lt;br /&gt;
|-&lt;br /&gt;
  | Sort out name: Is &amp;quot;Paranoia Mode&amp;quot; really the right term?&lt;br /&gt;
  | Christian&lt;br /&gt;
  | waiting&lt;br /&gt;
|-&lt;br /&gt;
  | Write pull request&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Submit pull request&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Draw flowchart&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Write documentation&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Closed Tasks===&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''Task'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Who'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of rules, which triggered false positives in 2.2.X frequently&lt;br /&gt;
  | Christian&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 2.2.x rules, which have disappeared from 3.0.0-rc1&lt;br /&gt;
  | Spartan&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 3.0.0-rc1 rules, which could be accompanied with&amp;lt;br /&amp;gt;stricter siblings in paranoia mode&amp;lt;br /&amp;gt;(same idea of the rule, but harder limit etc.)&lt;br /&gt;
  | Christian&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 3.0.0-rc1 rules, which could be moved to the paranoia mode&lt;br /&gt;
  | Franziska&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of disappeared / missing 2.2.X base_rules, which should be brought back&lt;br /&gt;
  | group&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 2.2.X optional and experimental rules, which should be brought back&lt;br /&gt;
  | group&lt;br /&gt;
  | closed (could be repeated more throughly)&lt;br /&gt;
|-&lt;br /&gt;
  | Nail down final list of rules which should be moved / recreated into the paranoia mode&lt;br /&gt;
  | group&lt;br /&gt;
  | closed&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Rules==&lt;br /&gt;
&lt;br /&gt;
===Paranoia Mode Candidates===&lt;br /&gt;
&lt;br /&gt;
The 3.0.0-rc1 has all rules renumbered. Existing numbering was fairly crazy and the new numbering follows the numbering scheme of the rules files (-&amp;gt; 9&amp;lt;2-digit-rulefile&amp;gt;&amp;lt;3-digit-id&amp;gt;)&lt;br /&gt;
A mapping table exists [[https://github.com/SpiderLabs/owasp-modsecurity-crs/blob/v3.0.0-rc1/id_renumbering/IdNumbering.csv IdNumbering.csv]]&lt;br /&gt;
We need to make sure, we do not mess things up, so let's add both IDs to the table, the old one and the new one.&lt;br /&gt;
&lt;br /&gt;
Please set status as follows : ''confirmed'',''candidate'', ''cloning-confirmed'',''cloning-candidate'', ''unsure'', ''dropped''. &lt;br /&gt;
* 'cloning-confirmed', 'cloning-candidates' are rules, that could be cloned into an even stricter variant with a stricter limit in a higher paranoia setting.&lt;br /&gt;
* If dropped, please provide reasoning in the remarks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''RuleID 2.2.x'''&lt;br /&gt;
  |'''RuleID 3.0.0-rc1'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''msg'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Remarks'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | 950001&lt;br /&gt;
  | 942150&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Also Franziska's candidate: @pmf file with very short function names, could match frequently.&lt;br /&gt;
|-&lt;br /&gt;
  | 950109&lt;br /&gt;
  | 920230&lt;br /&gt;
  | Multiple URL Encoding Detected&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 950120&lt;br /&gt;
  | 931130&lt;br /&gt;
  | Possible Remote File Inclusion (RFI) Attack: Off-Domain Reference/Link&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Walter's 2.2.X candidate: many FP; Chrstian: hardly any FPs; &amp;lt;br/&amp;gt;discussion concluded, that rule should end up in paranoia mode, possibly with additional conditions to reduce FPs (scope outside of this paranoia mode project)&amp;lt;br/&amp;gt;[http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-February/001885.html Link to discussion]&lt;br /&gt;
|-&lt;br /&gt;
  | 960335&lt;br /&gt;
  | 920380&lt;br /&gt;
  | Too many arguments in request&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Walter's 2.2.X candidate: some FP (phpMyAdmin, large forms), alternatively would recommend raising &amp;lt;code&amp;gt;tx.max_num_args&amp;lt;/code&amp;gt; to 1000&lt;br /&gt;
|-&lt;br /&gt;
  | 950901&lt;br /&gt;
  | 942130&lt;br /&gt;
  | SQL Injection Attack: SQL Tautology Detected.&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Also Franziska's candidate: legitimate sentences could match. Walter's 2.2.x experience: many FP in natural text however the rule seems to have merit&lt;br /&gt;
|-&lt;br /&gt;
  | 950916&lt;br /&gt;
  | 921170&lt;br /&gt;
  | HTTP Header Injection Attack via payload (CR/LF detected)&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Franziska's candidate: change action from pass to block and move to paranoia mode.&lt;br /&gt;
|-&lt;br /&gt;
  | 959070&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 959071&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 959072&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 959073&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 960015&lt;br /&gt;
  | 920300&lt;br /&gt;
  | Request Missing an Accept Header&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Also Franziska's candidate: Not every legitimate client behaves correctly. Walter's experience: many FP (PHP SoapClient)&amp;lt;br/&amp;gt;Discussion concluded it's moved to paranoia mode.&amp;lt;br/&amp;gt;[http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-February/001888.html Link to discussion]&amp;lt;br/&amp;gt;Spartan: Many mobile devices do not send this header, very high FP.&lt;br /&gt;
|-&lt;br /&gt;
  | 960024&lt;br /&gt;
  | gone  &lt;br /&gt;
  | Meta-Character Anomaly Detection Alert - Repetative Non-Word Characters&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 960035&lt;br /&gt;
  | 920440&lt;br /&gt;
  | URL file extension is restricted by policy&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 970901&lt;br /&gt;
  | 950100&lt;br /&gt;
  | The Application Returned a 500-Level Status Code&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Franziska's candidate: too strict, too generic, no data leakage happened so far. Walter: it's useful however to prevent attacker from distinguishing between a failed SQLi attempt (403 blocked by ModSec) or a query error due to vulnerable app (500 from application); &amp;lt;br/&amp;gt;Discussion resolved with move to paranoia mode. 403 will cloak a backend error, which is hard for an inexperienced admin and thus complicates things in standard installations&amp;lt;br/&amp;gt;[http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-February/001889.html Link to discussion]&lt;br /&gt;
|-&lt;br /&gt;
  | 973300&lt;br /&gt;
  | gone  &lt;br /&gt;
  | Possible XSS Attack Detected - HTML Tag Handler&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP&lt;br /&gt;
|-&lt;br /&gt;
  | 973332&lt;br /&gt;
  | gone  &lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP&lt;br /&gt;
|-&lt;br /&gt;
  | 973333&lt;br /&gt;
  | gone  &lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981172&lt;br /&gt;
  | gone  &lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: very high FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981173&lt;br /&gt;
  | gone  &lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: very high FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981231&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Comment Sequence Detected.&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: high FP but rule seems useful&lt;br /&gt;
|-&lt;br /&gt;
  | 981240&lt;br /&gt;
  | 942300&lt;br /&gt;
  | Detects MySQL comments, conditions and ch(a)r injections&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981242&lt;br /&gt;
  | 942330&lt;br /&gt;
  | Detects classic SQL injection probings 1/2&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Also Franziska's candidate: one quote character already matches?? Walter: low FP, but seen in cookies injected by some US ISPs; &lt;br /&gt;
|-&lt;br /&gt;
  | 981243&lt;br /&gt;
  | 942370&lt;br /&gt;
  | Detects classic SQL injection probings 2/2&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981244&lt;br /&gt;
  | 942180&lt;br /&gt;
  | Detects basic SQL authentication bypass attempts 1/3&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP; &amp;lt;br/&amp;gt; discussion did not bring up additional arguments. Moving to paranoia mode&amp;lt;br/&amp;gt;[http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-February/001890.html Link to discussion]&lt;br /&gt;
|-&lt;br /&gt;
  | 981245&lt;br /&gt;
  | 942260&lt;br /&gt;
  | Detects basic SQL authentication bypass attempts 2/3&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981246&lt;br /&gt;
  | 942340&lt;br /&gt;
  | Detects basic SQL authentication bypass attempts 3/3&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981248&lt;br /&gt;
  | 942210&lt;br /&gt;
  | Detects chained SQL injection attempts 1/2&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: low FP, &amp;lt;br/&amp;gt; discussion did not bring up any additional arguments. Moving to paranoia mode&amp;lt;br/&amp;gt;[http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-February/001890.html Link to discussion]&lt;br /&gt;
|-&lt;br /&gt;
  | 981249&lt;br /&gt;
  | 942310&lt;br /&gt;
  | Detects chained SQL injection attempts 2/2&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP but seen in very specific situations&lt;br /&gt;
|-&lt;br /&gt;
  | 981257&lt;br /&gt;
  | 942200&lt;br /&gt;
  | Detects MySQL comment-/space-obfuscated injections and backtick termination&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981260&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Hex Encoding Identified&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: high FP in long random strings&lt;br /&gt;
|-&lt;br /&gt;
  | 981318&lt;br /&gt;
  | 942110&lt;br /&gt;
  | SQL Injection Attack: Common Injection Testing Detected&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Franziska's candidate: one quote character at the beginning/end really not legitimate? Walter 2.2.X candidate: frequent FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981319&lt;br /&gt;
  | 942120&lt;br /&gt;
  | SQL Injection Attack: SQL Operator Detected&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Also Franziska's candidate: very short operators or strings already match. Walter: some FP (WooCommerce)&lt;br /&gt;
|-&lt;br /&gt;
  | 981049&lt;br /&gt;
  | 912100&lt;br /&gt;
  | Potential Denial of Service (DoS) Attack from ... - # of Request Bursts: ...	   &lt;br /&gt;
  | cloning-confirmed	&lt;br /&gt;
  | limit currently at 2; could be set to 1; now, the attacker has to exceed dos_counter_threshold twice. With full reset of counter after first hit. Source: 2.2.X-&amp;gt;experimental rules&lt;br /&gt;
|-&lt;br /&gt;
  | 960901          &lt;br /&gt;
  | 920270			&lt;br /&gt;
  | Invalid character in request&lt;br /&gt;
  | cloning-confirmed	&lt;br /&gt;
  | @validateByteRange 1-255; there was a conditional rule with stricter byterange 32-126 in 2.2.X as well&lt;br /&gt;
|-&lt;br /&gt;
  | 970003          &lt;br /&gt;
  | 951100			&lt;br /&gt;
  | none					   					   &lt;br /&gt;
  | cloning-confirmed	&lt;br /&gt;
  | rule is only setting tx.sql_error_match. Could also trigger score directly&lt;br /&gt;
|-&lt;br /&gt;
  | 950907          &lt;br /&gt;
  | 932100			&lt;br /&gt;
  | Remote Command Execution (RCE) Attempt					   	   &lt;br /&gt;
  | cloning-confirmed	&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 958977          &lt;br /&gt;
  | 933110			&lt;br /&gt;
  | PHP Injection Attack: Function Name Found					    &lt;br /&gt;
  | cloning-confirmed&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 958979          &lt;br /&gt;
  | 933120			&lt;br /&gt;
  | PHP Injection Attack: Configuration Directive Found				    &lt;br /&gt;
  | cloning-candidate&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 958980          &lt;br /&gt;
  | 933130			&lt;br /&gt;
  | PHP Injection Attack: Variables Found					   	    &lt;br /&gt;
  | cloning-confirmed&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 950001          &lt;br /&gt;
  | 942150			&lt;br /&gt;
  | SQL Injection Attack					   			    &lt;br /&gt;
  | cloning-confirmed&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 950907&lt;br /&gt;
  | 932100&lt;br /&gt;
  | System Command Injection&lt;br /&gt;
  | dropped&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Also Franziska's candidate: false positives possible because of @pmf, file with short cmds. Discussion evolved about splitting the file, which everybody thinks is a good idea. But that would be outside the scope of the introduction of the paranoia mode. So the rule stays in the standard set of rules for the time being and will be split in the future [http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-February/001886.html Link to discussion]&lt;br /&gt;
|-&lt;br /&gt;
  | 900050&lt;br /&gt;
  | 910100&lt;br /&gt;
  | Client IP is from a HIGH Risk Country Location.&lt;br /&gt;
  | dropped&lt;br /&gt;
  | Franziska's candidate: Do we want to exlude countries? But then easy to configure. Discussion pointed out this as an effective rule. We leave it in the standard rules, but provide an empty country list by default [http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-February/001951.html Link to discussion]. [https://github.com/SpiderLabs/owasp-modsecurity-crs/pull/284 Separate pull request]&lt;br /&gt;
|-&lt;br /&gt;
  | 960017&lt;br /&gt;
  | 920350&lt;br /&gt;
  | Host header is a numeric IP address&lt;br /&gt;
  | dropped&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Also Franziska's candidate: Not every legitimate client behaves correctly. Walter's experience: low FP (almost all are mass scans); &amp;lt;br/&amp;gt; Discussion concluded that legitimate use of numeric IP addresses is rare. This is really mostly mass scanners. Rule will be kept in standard set of rules&amp;lt;br/&amp;gt;[http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-February/001888.html Link to discussion]&lt;br /&gt;
|-&lt;br /&gt;
  | 958977&lt;br /&gt;
  | 933110&lt;br /&gt;
  | PHP Injection Attack: Function Name Found&lt;br /&gt;
  | dropped&lt;br /&gt;
  | Franziska's candidate: false positives possible because of @pmf, file with short function names. Maybe we should split the data file. The discussion revealed that splitting the data file in a clean way is very difficult. Walter Hop volunteered to rework the php rules completely. Chaim might join that effort.&lt;br /&gt;
|-&lt;br /&gt;
  | 958979&lt;br /&gt;
  | 933120&lt;br /&gt;
  | PHP Injection Attack: Configuration Directive Found&lt;br /&gt;
  | dropped&lt;br /&gt;
  | Franziska's candidate: false positives possible because of @pmf, file with short configuration directives. Splitting file?  The discussion revealed that splitting the data file in a clean way is very difficult. Walter Hop volunteered to rework the php rules completely. Chaim might join that effort.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Rules from 2.2.X, missing in 3.0.0-rc1===&lt;br /&gt;
&lt;br /&gt;
It looks as if only the base_rules made it into 3.0.0. In fact there are a few rule ids know from the optional and experimental rule folders in 2.2.X, but it is more likely, these are new 3.0.0 rules reusing old rule ids as the rules (regexes and msg) do not match at all.&lt;br /&gt;
&lt;br /&gt;
When trying to generate the list below, be aware that the rule ids have been renumbered between 3.0.0-dev and 3.0.0-rc1. IdNumbering.csv in your friend.&lt;br /&gt;
&lt;br /&gt;
====Base rules====&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''2.2.X rule id'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''msg'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''remarks'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | 950002&lt;br /&gt;
  | System Command Access&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950006&lt;br /&gt;
  | System Command Injection&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950007&lt;br /&gt;
  | Blind SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950008&lt;br /&gt;
  | Injection of Undocumented ColdFusion Tags&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950010&lt;br /&gt;
  | LDAP Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950011&lt;br /&gt;
  | SSI injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950018&lt;br /&gt;
  | Universal PDF XSS URL Detected.&lt;br /&gt;
  | Walter: medium FP (foo.pdf#javascript)&lt;br /&gt;
|-&lt;br /&gt;
  | 950019&lt;br /&gt;
  | Email Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950908&lt;br /&gt;
  | SQL Injection Attack.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950921&lt;br /&gt;
  | Backdoor access&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950922&lt;br /&gt;
  | Backdoor access&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958000&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958001&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958002&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958003&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958004&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958005&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958006&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958007&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958008&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958009&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958010&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958011&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958012&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958013&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958016&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958017&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958018&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958019&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958020&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958022&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958023&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958024&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958025&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958026&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958027&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958028&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958030&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958031&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958032&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958033&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958034&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958036&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958037&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958038&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958039&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958040&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958041&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958045&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958046&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958047&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958049&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958051&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958052&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958054&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958056&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958057&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958059&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958291&lt;br /&gt;
  | Range: field exists and begins with 0.&lt;br /&gt;
  | Walter: high FP (Chrome PDF viewer) and not useful.&lt;br /&gt;
|-&lt;br /&gt;
  | 958404&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958405&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958406&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958407&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958408&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958409&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958410&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958411&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958412&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958413&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958414&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958415&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958416&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958417&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958418&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958419&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958420&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958421&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958422&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958423&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958976&lt;br /&gt;
  | PHP Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959070&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959071&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959072&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959073&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960014&lt;br /&gt;
  | Proxy access attempt&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960018&lt;br /&gt;
  | Invalid character in request&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960020&lt;br /&gt;
  | Pragma Header requires Cache-Control Header for HTTP/1.1 requests.&lt;br /&gt;
  | Walter: some FP&lt;br /&gt;
|-&lt;br /&gt;
  | 960022&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960024&lt;br /&gt;
  | Meta-Character Anomaly Detection Alert - Repetative Non-Word Characters&lt;br /&gt;
  | Walter: many FP&lt;br /&gt;
|-&lt;br /&gt;
  | 960902&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960913&lt;br /&gt;
  | Invalid request&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970007&lt;br /&gt;
  | Zope Information Leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970008&lt;br /&gt;
  | Cold Fusion Information Leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970010&lt;br /&gt;
  | ISA server existence revealed&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970011&lt;br /&gt;
  | File or Directory Names Leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970012&lt;br /&gt;
  | Microsoft Office document properties leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970016&lt;br /&gt;
  | Cold Fusion source code leakage&lt;br /&gt;
  | Walter: some FP but not using this language&lt;br /&gt;
|-&lt;br /&gt;
  | 970018&lt;br /&gt;
  | IIS installed in default location&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970021&lt;br /&gt;
  | WebLogic information disclosure&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970903&lt;br /&gt;
  | ASP/JSP source code leakage&lt;br /&gt;
  | Walter: some FP but not using this language&lt;br /&gt;
|-&lt;br /&gt;
  | 973300&lt;br /&gt;
  | Possible XSS Attack Detected - HTML Tag Handler&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973301&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973302&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973303&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973304&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973305&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973306&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973307&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973308&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973309&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973310&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973311&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973312&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973313&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973314&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973316&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973325&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973327&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973328&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973329&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973330&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973331&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973332&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973333&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973334&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | Walter: many FP in text&lt;br /&gt;
|-&lt;br /&gt;
  | 973335&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | Walter: many FP in text&lt;br /&gt;
|-&lt;br /&gt;
  | 973347&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981000&lt;br /&gt;
  | Possibly malicious iframe tag in output&lt;br /&gt;
  | Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981001&lt;br /&gt;
  | Possibly malicious iframe tag in output&lt;br /&gt;
  | Walter: medium FP (iframes with display:none)&lt;br /&gt;
|-&lt;br /&gt;
  | 981003&lt;br /&gt;
  | Malicious iframe+javascript tag in output&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981004&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Excessive fromCharCode&lt;br /&gt;
  | Walter: many FP (Wordpress 4.4 inlined emoji javascripts); folinic: Problem solved in WP: https://core.trac.wordpress.org/ticket/35412&lt;br /&gt;
|-&lt;br /&gt;
  | 981005&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Eval+Unescape&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981006&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Unescape&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981007&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Heap Spray&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981018&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981022&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981133&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981134&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981136&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981172&lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | Walter: many FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981173&lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | Walter: many FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981177&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981178&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981231&lt;br /&gt;
  | SQL Comment Sequence Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981260&lt;br /&gt;
  | SQL Hex Encoding Identified&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981300&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981301&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981302&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981303&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981304&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981305&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981306&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981307&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981308&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981309&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981310&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981311&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981312&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981313&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981314&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981315&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981316&lt;br /&gt;
  | SQL SELECT Statement Anomaly Detection Alert&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981317&lt;br /&gt;
  | SQL SELECT Statement Anomaly Detection Alert&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 990012&lt;br /&gt;
  | Rogue web site crawler&lt;br /&gt;
  | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
====Optional, experimental, slr rules====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | 900048&lt;br /&gt;
 | Identifies Reflected XSS (optional_rules)&lt;br /&gt;
 | Walter: could be very interesting candidate but have not used it in production&lt;br /&gt;
|-&lt;br /&gt;
 | 920021, 920022, 920023&lt;br /&gt;
 | Possible Credit Card Track 1 Data Leakage. (experimental_rules)&lt;br /&gt;
 | Walter: could be interesting candidates but have not used it in production&lt;br /&gt;
|-&lt;br /&gt;
 | 981080, 920020, 920006&lt;br /&gt;
 | Detect CC# in output and block transaction (optional_rules)&lt;br /&gt;
 | Walter: could be interesting candidate but have not used it in production&lt;br /&gt;
|-&lt;br /&gt;
 | 900047, 900048, 981180, 981182&lt;br /&gt;
 | Identifies Stored XSS (optional_rules)&lt;br /&gt;
 | Walter: could be somewhat interesting candidate but have not used it in production&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Stricter siblings for existing rules ===&lt;br /&gt;
&lt;br /&gt;
Stricter Siblings are rules that are present in the CRS but could be accompanied by a stricter clone in Paranoia Mode. Adjustments can differ from rule to rule but include higher anomaly ratings or stricter triggers (e.g. regex counters). To prevent masses of false positives, rules can come with additional filters (chained rules) for common use-cases. These can either be included into Paranoia Mode or simply serve as a recommendation.&lt;br /&gt;
&lt;br /&gt;
Note: To avoid a cluttered project main-page, rule proposals are documented in their respective sub-page. When adding new proposals, make sure adding the rules original (2.2.x) ID, a quick description of what changes were made, and, if applicable, which additional filters were added.&lt;br /&gt;
&lt;br /&gt;
'''Possible siblings:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981173|981173 : SQL Injection Character Anomaly Usage]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981172|981172 : SQL Injection Character Anomaly Usage]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981049|981049 : Potential Denial of Service (DoS)]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_970003|970003 : SQL Error Leakage]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_960901|960901 : Invalid character in request]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_958980|958980 : PHP Injection Attack: Variables Found]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_958979|958979 : PHP Injection Attack: Configuration Directive Found]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_958977|958977 : PHP Injection Attack: Function Name Found]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_950907|950907 : Remote Command Execution (RCE) Attempt]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_950001|950001 : SQL Injection Attack]]&lt;br /&gt;
&lt;br /&gt;
==Project Status==&lt;br /&gt;
&lt;br /&gt;
===Project Status January 30, 2016===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
Hello everybody,&lt;br /&gt;
&lt;br /&gt;
It's time to do a status report of our little core rules project.&lt;br /&gt;
&lt;br /&gt;
I am including Franziska Bühler and Walter Hop in this status mail.&lt;br /&gt;
Both are experienced ModSec sysadmins. Franziska contributed to this&lt;br /&gt;
first stage, Walter told me he does not have much time, but he&lt;br /&gt;
was interested in participating at least in the discussions about&lt;br /&gt;
the rules.&lt;br /&gt;
&lt;br /&gt;
All in all, this is taking more time than anticipated. But we&lt;br /&gt;
have also done things very throughly than I thought. Which is&lt;br /&gt;
generally a good thing.&lt;br /&gt;
&lt;br /&gt;
Done so far:&lt;br /&gt;
* Manuel has provided us with a list of rules removed between 2.2.x and 3.0.0rc1&lt;br /&gt;
* I have assembled a list of rules known to trigger false positives frequently in the 2.2.x ruleset, they are thus candidates for the paranoia mode&lt;br /&gt;
* Franziska has looked through the 3.0.0rc1 rules and identified a set of rules which look like good candidates.&lt;br /&gt;
* Noël has sharpened his skills by re-writing 981173 in a way that ignores innocent UUIDs. In my eyes, he found a very elegant solution.&lt;br /&gt;
* With the development of 3.0.0-dev, Chaim unfortunately reused rule ids formerly used with optional and experimental rules. Now this has all been renumbered. I have pointed this out in the mailinglist and had private contact with Chaim where he confirmed the fact - and promised to resolve the issue.&lt;br /&gt;
&lt;br /&gt;
We have not really looked at the disappeared rules and identified those&lt;br /&gt;
who should be brought back and have not been picked so far. This&lt;br /&gt;
includes the 2.2.X base_rules, but also the optional, experimental,&lt;br /&gt;
and huge stock of slr rules. Of these three groups, only the&lt;br /&gt;
anti-ddos rules have made it into 3.0.0. There are probably more&lt;br /&gt;
interesting candidates.&lt;br /&gt;
&lt;br /&gt;
If somebody among you wants to look into these, then that would be&lt;br /&gt;
welcome, but I do not want to have these tasks delay us any further.&lt;br /&gt;
After all, Old rules can also be brought back in subsequent releases&lt;br /&gt;
if we see a benefit.&lt;br /&gt;
&lt;br /&gt;
So the next real tasks are:&lt;br /&gt;
* Looking through the list of candidates and cloning-candidates (the latter are those rules we might accompany with a clone with stricter limits in paranoia mode).&lt;br /&gt;
* Defining the exact working of the paranoia mode.&lt;br /&gt;
&lt;br /&gt;
Please sit down and look through the rule lists in the wiki and add&lt;br /&gt;
remarks with regards to the candidate rules. If you think a rule&lt;br /&gt;
should be included, if you think an individual rule should not be&lt;br /&gt;
included etc.&lt;br /&gt;
&lt;br /&gt;
I am also going to invite the people on the mailinglist to take look at&lt;br /&gt;
the rules as well and add their remarks in the wiki (or respond via mail).&lt;br /&gt;
This should allow us to nail down the list of rules which will&lt;br /&gt;
actually be included in the paranoia mode.&lt;br /&gt;
&lt;br /&gt;
As for defining the exact working of the paranoia mode, I guess I&lt;br /&gt;
need to write down the idea I have in mind and see if it makes sense to&lt;br /&gt;
you.&lt;br /&gt;
&lt;br /&gt;
Thank you for contributing so far! It is a lot of fun to work in a team!&lt;br /&gt;
&lt;br /&gt;
Christian&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981173&amp;diff=210228</id>
		<title>OWASP ModSec CRS Paranoia Mode Sibling 981173</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981173&amp;diff=210228"/>
				<updated>2016-03-01T19:47:18Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: additional Rule ID information added to table&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;''This page contains a proposal for a stricter rule-clone for [[OWASP_ModSec_CRS_Paranoia_Mode|ModSecurity CRS Paranoia Mode]].''&lt;br /&gt;
&lt;br /&gt;
== 981173 : SQL Injection Character Anomaly Usage ==&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | '''RuleID 2.2.x'''&lt;br /&gt;
 | '''RuleID 3.0.0-rc1 (original Rule)'''&lt;br /&gt;
 | '''RuleID 3.0.0-rc1 (paranoid Rule)'''&lt;br /&gt;
 | '''Change'''&lt;br /&gt;
 | '''Whitelisting'''&lt;br /&gt;
|-&lt;br /&gt;
 | 981173&lt;br /&gt;
 | none&lt;br /&gt;
 | tbd&lt;br /&gt;
 | Regex counter decreased from 4 to 1.&amp;lt;br&amp;gt;Anomaly scoring increased to critical&lt;br /&gt;
 | Regex for UUIDs in chained Rule&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
  #&lt;br /&gt;
  # -=[ SQL Injection Character Anomaly Usage ]=-&lt;br /&gt;
  #&lt;br /&gt;
  # This is a paranoid sibling to 2.2.x Rule 981173.&lt;br /&gt;
  # The regex limit is set to '1' and the anomaly scoring is increased to 'critical'.&lt;br /&gt;
  # For dealing with false positives, UUID format is whitelisted with a chained rule.&lt;br /&gt;
  #&lt;br /&gt;
  SecRule ARGS_NAMES|ARGS|XML:/* &amp;quot;([\~\!\@\#\$\%\^\&amp;amp;\*\(\)\-\+\=\{\}\[\]\|\:\;\&amp;quot;\'\´\’\‘\`\&amp;lt;\&amp;gt;].*?){1,}&amp;quot;\&lt;br /&gt;
        &amp;quot;chain,\&lt;br /&gt;
        phase:request,\&lt;br /&gt;
        rev:'2',\&lt;br /&gt;
        ver:'OWASP_CRS/3.0.0',\&lt;br /&gt;
        maturity:'X',\&lt;br /&gt;
        accuracy:'Y',\&lt;br /&gt;
        t:none,t:urlDecodeUni,\&lt;br /&gt;
        block,\&lt;br /&gt;
        msg:'Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded',\&lt;br /&gt;
        id:'XXXXXX',\&lt;br /&gt;
        tag:'OWASP_CRS/WEB_ATTACK/SQL_INJECTION',\&lt;br /&gt;
        tag:'Paranoia rule on level Z',\&lt;br /&gt;
        logdata:'Matched Data: %{TX.1} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}',\&lt;br /&gt;
        severity:'CRITICAL',\&lt;br /&gt;
        setvar:'tx.msg=%{rule.msg}',\&lt;br /&gt;
        setvar:tx.%{rule.id}-OWASP_CRS/WEB_ATTACK/RESTRICTED_SQLI_CHARS-%{matched_var_name}=%{tx.0}&amp;quot;&lt;br /&gt;
        SecRule MATCHED_VARS &amp;quot;!@rx ^[a-f0-9-]{36}$&amp;quot;\&lt;br /&gt;
                &amp;quot;t:lowercase,\&lt;br /&gt;
                setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
                setvar:tx.sql_injection_score=+1&amp;quot;&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981173&amp;diff=210227</id>
		<title>OWASP ModSec CRS Paranoia Mode Sibling 981173</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981173&amp;diff=210227"/>
				<updated>2016-03-01T19:44:56Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: /* 981173 : SQL Injection Character Anomaly Usage */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;''This page contains a proposal for a stricter rule-clone for [[OWASP_ModSec_CRS_Paranoia_Mode|ModSecurity CRS Paranoia Mode]].''&lt;br /&gt;
&lt;br /&gt;
== 981173 : SQL Injection Character Anomaly Usage ==&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | '''RuleID 2.2.x'''&lt;br /&gt;
 | '''RuleID 3.0.0-rc1'''&lt;br /&gt;
 | '''Change'''&lt;br /&gt;
 | '''Whitelisting'''&lt;br /&gt;
|-&lt;br /&gt;
 | 981173&lt;br /&gt;
 | none&lt;br /&gt;
 | Regex counter decreased from 4 to 1.&amp;lt;br&amp;gt;Anomaly scoring increased to critical&lt;br /&gt;
 | Regex for UUIDs in chained Rule&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
  #&lt;br /&gt;
  # -=[ SQL Injection Character Anomaly Usage ]=-&lt;br /&gt;
  #&lt;br /&gt;
  # This is a paranoid sibling to 2.2.x Rule 981173.&lt;br /&gt;
  # The regex limit is set to '1' and the anomaly scoring is increased to 'critical'.&lt;br /&gt;
  # For dealing with false positives, UUID format is whitelisted with a chained rule.&lt;br /&gt;
  #&lt;br /&gt;
  SecRule ARGS_NAMES|ARGS|XML:/* &amp;quot;([\~\!\@\#\$\%\^\&amp;amp;\*\(\)\-\+\=\{\}\[\]\|\:\;\&amp;quot;\'\´\’\‘\`\&amp;lt;\&amp;gt;].*?){1,}&amp;quot;\&lt;br /&gt;
        &amp;quot;chain,\&lt;br /&gt;
        phase:request,\&lt;br /&gt;
        rev:'2',\&lt;br /&gt;
        ver:'OWASP_CRS/3.0.0',\&lt;br /&gt;
        maturity:'X',\&lt;br /&gt;
        accuracy:'Y',\&lt;br /&gt;
        t:none,t:urlDecodeUni,\&lt;br /&gt;
        block,\&lt;br /&gt;
        msg:'Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded',\&lt;br /&gt;
        id:'XXXXXX',\&lt;br /&gt;
        tag:'OWASP_CRS/WEB_ATTACK/SQL_INJECTION',\&lt;br /&gt;
        tag:'Paranoia rule on level Z',\&lt;br /&gt;
        logdata:'Matched Data: %{TX.1} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}',\&lt;br /&gt;
        severity:'CRITICAL',\&lt;br /&gt;
        setvar:'tx.msg=%{rule.msg}',\&lt;br /&gt;
        setvar:tx.%{rule.id}-OWASP_CRS/WEB_ATTACK/RESTRICTED_SQLI_CHARS-%{matched_var_name}=%{tx.0}&amp;quot;&lt;br /&gt;
        SecRule MATCHED_VARS &amp;quot;!@rx ^[a-f0-9-]{36}$&amp;quot;\&lt;br /&gt;
                &amp;quot;t:lowercase,\&lt;br /&gt;
                setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
                setvar:tx.sql_injection_score=+1&amp;quot;&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_958977&amp;diff=209544</id>
		<title>OWASP ModSec CRS Paranoia Mode Sibling 958977</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_958977&amp;diff=209544"/>
				<updated>2016-02-24T12:25:41Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: /* 958977 : PHP Injection Attack: Configuration Directive Found */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;''This page contains a proposal for a stricter rule-clone for [[OWASP_ModSec_CRS_Paranoia_Mode|ModSecurity CRS Paranoia Mode]].''&lt;br /&gt;
&lt;br /&gt;
== 958977 : PHP Injection Attack: Configuration Directive Found ==&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | '''Original ID (2.2.x)'''&lt;br /&gt;
 | '''Change'''&lt;br /&gt;
 | '''Whitelisting'''&lt;br /&gt;
|-&lt;br /&gt;
 | 958977&lt;br /&gt;
 | Rule now triggers on it's own&lt;br /&gt;
 | none&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
  #&lt;br /&gt;
  # [ PHP Function Names ]&lt;br /&gt;
  # &lt;br /&gt;
  # This is a paranoid sibling to 2.2.x Rule 958977.&lt;br /&gt;
  # The rule is no longer chained in order to trigger anomaly scoring.&lt;br /&gt;
  # For chain-based scoring see 3.0.0 Rule 933110. &lt;br /&gt;
  #&lt;br /&gt;
  SecRule REQUEST_COOKIES|!REQUEST_COOKIES:/__utm/|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/* &amp;quot;@pmf php-function-names.data&amp;quot; \&lt;br /&gt;
        &amp;quot;msg:'PHP Injection Attack: Function Name Found',\&lt;br /&gt;
        phase:request,\&lt;br /&gt;
        rev:'2',\&lt;br /&gt;
        ver:'OWASP_CRS/3.0.0',\&lt;br /&gt;
        maturity:'1',\&lt;br /&gt;
        accuracy:'8',\&lt;br /&gt;
        t:none,t:normalisePath,t:urldecode,\&lt;br /&gt;
        ctl:auditLogParts=+E,\&lt;br /&gt;
        block,\&lt;br /&gt;
        id:'XXXXXX',\&lt;br /&gt;
        tag:'application-multi',\&lt;br /&gt;
        tag:'language-PHP',\&lt;br /&gt;
        tag:'platform-multi',\&lt;br /&gt;
        tag:'attack-PHP injection',\&lt;br /&gt;
        tag:'OWASP_CRS/WEB_ATTACK/PHP_INJECTION',\&lt;br /&gt;
        tag:'OWASP_TOP_10/A1',\&lt;br /&gt;
        logdata:'Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}',\&lt;br /&gt;
        severity:'CRITICAL',\&lt;br /&gt;
        setvar:'tx.msg=%{rule.msg}',\&lt;br /&gt;
        setvar:tx.php_injection_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
        setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
        setvar:tx.%{rule.id}-OWASP_CRS/WEB_ATTACK/PHP_INJECTION-%{matched_var_name}=%{tx.0}&amp;quot;&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_960901&amp;diff=209528</id>
		<title>OWASP ModSec CRS Paranoia Mode Sibling 960901</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_960901&amp;diff=209528"/>
				<updated>2016-02-24T09:09:27Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: Created page with &amp;quot;''This page contains a proposal for a stricter rule-clone for ModSecurity CRS Paranoia Mode.''  == 960901 : Invalid character in request ==...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;''This page contains a proposal for a stricter rule-clone for [[OWASP_ModSec_CRS_Paranoia_Mode|ModSecurity CRS Paranoia Mode]].''&lt;br /&gt;
&lt;br /&gt;
== 960901 : Invalid character in request ==&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | '''Original ID (2.2.x)'''&lt;br /&gt;
 | '''Change'''&lt;br /&gt;
 | '''Whitelisting'''&lt;br /&gt;
|-&lt;br /&gt;
 | 960901&lt;br /&gt;
 | Character byte range limited to 32-126.&lt;br /&gt;
 | none&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
  #&lt;br /&gt;
  # [ Invalid character in request ]&lt;br /&gt;
  #&lt;br /&gt;
  # This is a paranoid sibling to 2.2.x Rule 960901.&lt;br /&gt;
  # Byte range restrictions are now set to 32-126.&lt;br /&gt;
  # For unadapted 3.0.0 Rule see Rule ID 920270. &lt;br /&gt;
  #&lt;br /&gt;
  SecRule ARGS|ARGS_NAMES|REQUEST_HEADERS|!REQUEST_HEADERS:Referer &amp;quot;@validateByteRange 32-126&amp;quot; \&lt;br /&gt;
        &amp;quot;phase:request,\&lt;br /&gt;
        rev:'2',\&lt;br /&gt;
        ver:'OWASP_CRS/3.0.0',\&lt;br /&gt;
        maturity:'9',\&lt;br /&gt;
        accuracy:'9',\&lt;br /&gt;
        block,\&lt;br /&gt;
        msg:'Invalid character in request',\&lt;br /&gt;
        id:'XXXXXX',\&lt;br /&gt;
        severity:'ERROR',\&lt;br /&gt;
        t:none,t:urlDecodeUni,\&lt;br /&gt;
        tag:'application-multi',\&lt;br /&gt;
        tag:'language-multi',\&lt;br /&gt;
        tag:'platform-multi',\&lt;br /&gt;
        tag:'attack-protocol',\&lt;br /&gt;
        tag:'OWASP_CRS/PROTOCOL_VIOLATION/EVASION',\&lt;br /&gt;
        setvar:'tx.msg=%{rule.msg}',\&lt;br /&gt;
        setvar:tx.anomaly_score=+%{tx.error_anomaly_score},\&lt;br /&gt;
        setvar:tx.%{rule.id}-OWASP_CRS/PROTOCOL_VIOLATION/EVASION-%{matched_var_name}=%{matched_var}&amp;quot;&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_950001&amp;diff=209527</id>
		<title>OWASP ModSec CRS Paranoia Mode Sibling 950001</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_950001&amp;diff=209527"/>
				<updated>2016-02-24T08:43:48Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: Created page with &amp;quot;''This page contains a proposal for a stricter rule-clone for ModSecurity CRS Paranoia Mode.''  == 950001 : SQL Injection Attack ==  {|- cla...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;''This page contains a proposal for a stricter rule-clone for [[OWASP_ModSec_CRS_Paranoia_Mode|ModSecurity CRS Paranoia Mode]].''&lt;br /&gt;
&lt;br /&gt;
== 950001 : SQL Injection Attack ==&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | '''Original ID (2.2.x)'''&lt;br /&gt;
 | '''Change'''&lt;br /&gt;
 | '''Whitelisting'''&lt;br /&gt;
|-&lt;br /&gt;
 | 950001&lt;br /&gt;
 | Rule now triggers on it's own&lt;br /&gt;
 | none&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
  #&lt;br /&gt;
  # -=[ SQL Function Names ]=-&lt;br /&gt;
  #&lt;br /&gt;
  # This is a paranoid sibling to 2.2.x Rule 950001.&lt;br /&gt;
  # The rule is no longer chained in order to trigger anomaly scoring.&lt;br /&gt;
  # For chain-based scoring see 3.0.0 Rule 942150.&lt;br /&gt;
  #&lt;br /&gt;
  SecRule REQUEST_COOKIES|!REQUEST_COOKIES:/__utm/|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/* &amp;quot;@pmf sql-function-names.data&amp;quot; \&lt;br /&gt;
        &amp;quot;msg:'SQL Injection Attack',\&lt;br /&gt;
        phase:request,\&lt;br /&gt;
        rev:'2',\&lt;br /&gt;
        ver:'OWASP_CRS/2.2.6',\&lt;br /&gt;
        maturity:'9',\&lt;br /&gt;
        accuracy:'8',\&lt;br /&gt;
        capture,\&lt;br /&gt;
        t:none,t:urlDecodeUni,\&lt;br /&gt;
        ctl:auditLogParts=+E,\&lt;br /&gt;
        block,\&lt;br /&gt;
        id:'XXXXXX',\&lt;br /&gt;
        tag:'application-multi',\&lt;br /&gt;
        tag:'language-mutli',\&lt;br /&gt;
        tag:'platform-multi',\&lt;br /&gt;
        tag:'attack-sqli',\&lt;br /&gt;
        tag:'OWASP_CRS/WEB_ATTACK/SQL_INJECTION',\&lt;br /&gt;
        tag:'WASCTC/WASC-19',\&lt;br /&gt;
        tag:'OWASP_TOP_10/A1',\&lt;br /&gt;
        tag:'OWASP_AppSensor/CIE1',\&lt;br /&gt;
        tag:'PCI/6.5.2',\&lt;br /&gt;
        logdata:'Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}',\&lt;br /&gt;
        severity:'CRITICAL'&lt;br /&gt;
        setvar:'tx.msg=%{rule.msg}',\&lt;br /&gt;
        setvar:tx.sql_injection_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
        setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
        setvar:tx.%{rule.id}-OWASP_CRS/WEB_ATTACK/SQL_INJECTION-%{matched_var_name}=%{tx.0}&amp;quot;&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_950907&amp;diff=209526</id>
		<title>OWASP ModSec CRS Paranoia Mode Sibling 950907</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_950907&amp;diff=209526"/>
				<updated>2016-02-24T08:13:12Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: Created page with &amp;quot;''This page contains a proposal for a stricter rule-clone for ModSecurity CRS Paranoia Mode.''  == 950907 : OS Command Injection Attacks ==...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;''This page contains a proposal for a stricter rule-clone for [[OWASP_ModSec_CRS_Paranoia_Mode|ModSecurity CRS Paranoia Mode]].''&lt;br /&gt;
&lt;br /&gt;
== 950907 : OS Command Injection Attacks ==&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | '''Original ID (2.2.x)'''&lt;br /&gt;
 | '''Change'''&lt;br /&gt;
 | '''Whitelisting'''&lt;br /&gt;
|-&lt;br /&gt;
 | 950907&lt;br /&gt;
 | Rule now triggers on it's own&lt;br /&gt;
 | none&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
  #&lt;br /&gt;
  # OS Command Injection Attacks&lt;br /&gt;
  #&lt;br /&gt;
  # This is a paranoid sibling to 2.2.x Rule 950907.&lt;br /&gt;
  # The rule is no longer chained in order to trigger anomaly scoring.&lt;br /&gt;
  # For chain-based scoring see 3.0.0 Rule 932100. &lt;br /&gt;
  #&lt;br /&gt;
  SecRule REQUEST_COOKIES|!REQUEST_COOKIES:/__utm/|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/* &amp;quot;@pmf os-commands.data&amp;quot; \&lt;br /&gt;
        &amp;quot;msg:'Remote Command Execution (RCE) Attempt',\&lt;br /&gt;
        phase:request,\&lt;br /&gt;
        rev:'2',\&lt;br /&gt;
        ver:'OWASP_CRS/3.0.0',\&lt;br /&gt;
        maturity:'9',\&lt;br /&gt;
        accuracy:'8',\&lt;br /&gt;
        t:none,t:normalisePath,\&lt;br /&gt;
        ctl:auditLogParts=+E,\&lt;br /&gt;
        block,\&lt;br /&gt;
        id:'XXXXXX',\&lt;br /&gt;
        tag:'application-multi',\&lt;br /&gt;
        tag:'language-multi',\&lt;br /&gt;
        tag:'platform-multi',\&lt;br /&gt;
        tag:'attack-remote code execution',\&lt;br /&gt;
        tag:'OWASP_CRS/WEB_ATTACK/COMMAND_INJECTION',\&lt;br /&gt;
        tag:'WASCTC/WASC-31',\&lt;br /&gt;
        tag:'OWASP_TOP_10/A1',\&lt;br /&gt;
        tag:'PCI/6.5.2',\&lt;br /&gt;
        logdata:'Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}',\&lt;br /&gt;
        severity:'CRITICAL',\&lt;br /&gt;
        setvar:'tx.msg=%{rule.msg}',\&lt;br /&gt;
        setvar:tx.rce_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
        setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
        setvar:tx.%{rule.id}-OWASP_CRS/WEB_ATTACK/RCE-%{matched_var_name}=%{tx.0}&amp;quot;&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_958977&amp;diff=209479</id>
		<title>OWASP ModSec CRS Paranoia Mode Sibling 958977</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_958977&amp;diff=209479"/>
				<updated>2016-02-23T08:41:07Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: Created page with &amp;quot;''This page contains a proposal for a stricter rule-clone for ModSecurity CRS Paranoia Mode.''  == 958977 : PHP Injection Attack: Configurat...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;''This page contains a proposal for a stricter rule-clone for [[OWASP_ModSec_CRS_Paranoia_Mode|ModSecurity CRS Paranoia Mode]].''&lt;br /&gt;
&lt;br /&gt;
== 958977 : PHP Injection Attack: Configuration Directive Found ==&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | '''Original ID (2.2.x)'''&lt;br /&gt;
 | '''Change'''&lt;br /&gt;
 | '''Whitelisting'''&lt;br /&gt;
|-&lt;br /&gt;
 | 958977&lt;br /&gt;
 | Rule now triggers on it's own&lt;br /&gt;
 | none&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
  #&lt;br /&gt;
  # [ PHP Function Names ]&lt;br /&gt;
  # &lt;br /&gt;
  # This is a paranoid sibling to 2.2.x Rule 958977.&lt;br /&gt;
  # The rule is no longer chained in order to trigger anomaly scoring.&lt;br /&gt;
  # For chain-based scoring see 3.0.0 Rule 933110. &lt;br /&gt;
  #&lt;br /&gt;
  SecRule REQUEST_COOKIES|!REQUEST_COOKIES:/__utm/|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/* &amp;quot;@pmf php-function-names.data&amp;quot; \&lt;br /&gt;
        &amp;quot;msg:'PHP Injection Attack: Function Name Found',\&lt;br /&gt;
        phase:request,\&lt;br /&gt;
        rev:'2',\&lt;br /&gt;
        ver:'OWASP_CRS/3.0.0',\&lt;br /&gt;
        maturity:'1',\&lt;br /&gt;
        accuracy:'8',\&lt;br /&gt;
        capture,\&lt;br /&gt;
        t:none,t:normalisePath,t:urldecode,\&lt;br /&gt;
        ctl:auditLogParts=+E,\&lt;br /&gt;
        block,\&lt;br /&gt;
        id:'XXXXXX',\&lt;br /&gt;
        tag:'application-multi',\&lt;br /&gt;
        tag:'language-PHP',\&lt;br /&gt;
        tag:'platform-multi',\&lt;br /&gt;
        tag:'attack-PHP injection',\&lt;br /&gt;
        tag:'OWASP_CRS/WEB_ATTACK/PHP_INJECTION',\&lt;br /&gt;
        tag:'OWASP_TOP_10/A1',\&lt;br /&gt;
        logdata:'Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}',\&lt;br /&gt;
        severity:'CRITICAL',\&lt;br /&gt;
        setvar:'tx.msg=%{rule.msg}',\&lt;br /&gt;
        setvar:tx.php_injection_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
        setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
        setvar:tx.%{rule.id}-OWASP_CRS/WEB_ATTACK/PHP_INJECTION-%{matched_var_name}=%{tx.0}&amp;quot;&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_958980&amp;diff=209478</id>
		<title>OWASP ModSec CRS Paranoia Mode Sibling 958980</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_958980&amp;diff=209478"/>
				<updated>2016-02-23T08:22:44Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;''This page contains a proposal for a stricter rule-clone for [[OWASP_ModSec_CRS_Paranoia_Mode|ModSecurity CRS Paranoia Mode]].''&lt;br /&gt;
&lt;br /&gt;
== 958980 : PHP Injection Attack: Variables Found ==&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | '''Original ID (2.2.x)'''&lt;br /&gt;
 | '''Change'''&lt;br /&gt;
 | '''Whitelisting'''&lt;br /&gt;
|-&lt;br /&gt;
 | 958980&lt;br /&gt;
 | Rule now triggers on it's own&lt;br /&gt;
 | none&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
  #&lt;br /&gt;
  # [ PHP Variables ]&lt;br /&gt;
  #&lt;br /&gt;
  # This is a paranoid sibling to 2.2.x Rule 958980.&lt;br /&gt;
  # The rule is no longer chained in order to trigger anomaly scoring.&lt;br /&gt;
  # For chain-based scoring see 3.0.0 Rule 933130. &lt;br /&gt;
  #&lt;br /&gt;
  SecRule REQUEST_COOKIES|!REQUEST_COOKIES:/__utm/|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/* &amp;quot;@pmf php-variables.data&amp;quot; \&lt;br /&gt;
        &amp;quot;msg:'PHP Injection Attack: Variables Found',\&lt;br /&gt;
        phase:request,\&lt;br /&gt;
        rev:'1',\&lt;br /&gt;
        ver:'OWASP_CRS/3.0.0',\&lt;br /&gt;
        maturity:'1',\&lt;br /&gt;
        accuracy:'8',\&lt;br /&gt;
        t:none,t:normalisePath,\&lt;br /&gt;
        ctl:auditLogParts=+E,\&lt;br /&gt;
        block,\&lt;br /&gt;
        id:'XXXXXX',\&lt;br /&gt;
        tag:'application-multi',\&lt;br /&gt;
        tag:'language-PHP',\&lt;br /&gt;
        tag:'platform-multi',\&lt;br /&gt;
        tag:'attack-PHP injection',\&lt;br /&gt;
        tag:'OWASP_CRS/WEB_ATTACK/PHP_INJECTION',\&lt;br /&gt;
        tag:'OWASP_TOP_10/A1',\&lt;br /&gt;
        logdata:'Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}',\&lt;br /&gt;
        severity:'CRITICAL',\&lt;br /&gt;
        setvar:'tx.msg=%{rule.msg}',\&lt;br /&gt;
        setvar:tx.php_injection_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
        setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
        setvar:tx.%{rule.id}-OWASP_CRS/WEB_ATTACK/PHP_INJECTION-%{matched_var_name}=%{tx.0}&amp;quot;&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_958979&amp;diff=209477</id>
		<title>OWASP ModSec CRS Paranoia Mode Sibling 958979</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_958979&amp;diff=209477"/>
				<updated>2016-02-23T08:22:16Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: /* 958979 : PHP Injection Attack: Configuration Directive Found */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;''This page contains a proposal for a stricter rule-clone for [[OWASP_ModSec_CRS_Paranoia_Mode|ModSecurity CRS Paranoia Mode]].''&lt;br /&gt;
&lt;br /&gt;
== 958979 : PHP Injection Attack: Configuration Directive Found ==&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | '''Original ID (2.2.x)'''&lt;br /&gt;
 | '''Change'''&lt;br /&gt;
 | '''Whitelisting'''&lt;br /&gt;
|-&lt;br /&gt;
 | 958979&lt;br /&gt;
 | Rule now triggers on it's own&lt;br /&gt;
 | none&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
  #&lt;br /&gt;
  # [ PHP Configuration Directives ]&lt;br /&gt;
  # &lt;br /&gt;
  # This is a paranoid sibling to 2.2.x Rule 958979.&lt;br /&gt;
  # The rule is no longer chained in order to trigger anomaly scoring.&lt;br /&gt;
  # For chain-based scoring see 3.0.0 Rule 933120. &lt;br /&gt;
  #&lt;br /&gt;
  SecRule REQUEST_COOKIES|!REQUEST_COOKIES:/__utm/|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/* &amp;quot;@pmf php-config-directives.data&amp;quot; \&lt;br /&gt;
        &amp;quot;msg:'PHP Injection Attack: Configuration Directive Found',\&lt;br /&gt;
        phase:request,\&lt;br /&gt;
        rev:'1',\&lt;br /&gt;
        ver:'OWASP_CRS/3.0.0',\&lt;br /&gt;
        maturity:'1',\&lt;br /&gt;
        accuracy:'8',\&lt;br /&gt;
        t:none,t:normalisePath,\&lt;br /&gt;
        ctl:auditLogParts=+E,\&lt;br /&gt;
        block,\&lt;br /&gt;
        id:'XXXXXX',\&lt;br /&gt;
        tag:'application-multi',\&lt;br /&gt;
        tag:'language-PHP',\&lt;br /&gt;
        tag:'platform-multi',\&lt;br /&gt;
        tag:'attack-PHP injection',\&lt;br /&gt;
        tag:'OWASP_CRS/WEB_ATTACK/PHP_INJECTION',\&lt;br /&gt;
        tag:'OWASP_TOP_10/A1',\&lt;br /&gt;
        logdata:'Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}',\&lt;br /&gt;
        severity:'CRITICAL',\&lt;br /&gt;
        setvar:'tx.msg=%{rule.msg}',\&lt;br /&gt;
        setvar:tx.php_injection_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
        setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
        setvar:tx.%{rule.id}-OWASP_CRS/WEB_ATTACK/PHP_INJECTION-%{matched_var_name}=%{tx.0}&amp;quot;&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_958979&amp;diff=209476</id>
		<title>OWASP ModSec CRS Paranoia Mode Sibling 958979</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_958979&amp;diff=209476"/>
				<updated>2016-02-23T08:21:02Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: Created page with &amp;quot;''This page contains a proposal for a stricter rule-clone for ModSecurity CRS Paranoia Mode.''  == 958979 : PHP Injection Attack: Configurat...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;''This page contains a proposal for a stricter rule-clone for [[OWASP_ModSec_CRS_Paranoia_Mode|ModSecurity CRS Paranoia Mode]].''&lt;br /&gt;
&lt;br /&gt;
== 958979 : PHP Injection Attack: Configuration Directive Found ==&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | '''Original ID (2.2.x)'''&lt;br /&gt;
 | '''Change'''&lt;br /&gt;
 | '''Whitelisting'''&lt;br /&gt;
|-&lt;br /&gt;
 | 958979&lt;br /&gt;
 | Rule now triggers on it's own&lt;br /&gt;
 | none&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
  #&lt;br /&gt;
  # [ PHP Configuration Directives ]&lt;br /&gt;
  # &lt;br /&gt;
  # This is a paranoid sibling to 2.2.x Rule 958979.&lt;br /&gt;
  # The rule is no longer chained in order to trigger anomaly scoring.&lt;br /&gt;
  # For chain-based scoring see 3.0.0 Rule 933120. &lt;br /&gt;
  #&lt;br /&gt;
  SecRule REQUEST_COOKIES|!REQUEST_COOKIES:/__utm/|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/* &amp;quot;@pmf php-config-directives.data&amp;quot; \&lt;br /&gt;
        &amp;quot;msg:'PHP Injection Attack: Configuration Directive Found',\&lt;br /&gt;
        phase:request,\&lt;br /&gt;
        rev:'1',\&lt;br /&gt;
        ver:'OWASP_CRS/3.0.0',\&lt;br /&gt;
        maturity:'1',\&lt;br /&gt;
        accuracy:'8',\&lt;br /&gt;
        capture,\&lt;br /&gt;
        t:none,t:normalisePath,\&lt;br /&gt;
        ctl:auditLogParts=+E,\&lt;br /&gt;
        block,\&lt;br /&gt;
        id:'XXXXXX',\&lt;br /&gt;
        tag:'application-multi',\&lt;br /&gt;
        tag:'language-PHP',\&lt;br /&gt;
        tag:'platform-multi',\&lt;br /&gt;
        tag:'attack-PHP injection',\&lt;br /&gt;
        tag:'OWASP_CRS/WEB_ATTACK/PHP_INJECTION',\&lt;br /&gt;
        tag:'OWASP_TOP_10/A1',\&lt;br /&gt;
        logdata:'Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}',\&lt;br /&gt;
        severity:'CRITICAL',\&lt;br /&gt;
        setvar:'tx.msg=%{rule.msg}',\&lt;br /&gt;
        setvar:tx.php_injection_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
        setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
        setvar:tx.%{rule.id}-OWASP_CRS/WEB_ATTACK/PHP_INJECTION-%{matched_var_name}=%{tx.0}&amp;quot;&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_958980&amp;diff=209379</id>
		<title>OWASP ModSec CRS Paranoia Mode Sibling 958980</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_958980&amp;diff=209379"/>
				<updated>2016-02-22T11:13:48Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: Created page with &amp;quot;''This page contains a proposal for a stricter rule-clone for ModSecurity CRS Paranoia Mode.''  == 958980 : PHP Injection Attack: Variables...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;''This page contains a proposal for a stricter rule-clone for [[OWASP_ModSec_CRS_Paranoia_Mode|ModSecurity CRS Paranoia Mode]].''&lt;br /&gt;
&lt;br /&gt;
== 958980 : PHP Injection Attack: Variables Found ==&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | '''Original ID (2.2.x)'''&lt;br /&gt;
 | '''Change'''&lt;br /&gt;
 | '''Whitelisting'''&lt;br /&gt;
|-&lt;br /&gt;
 | 958980&lt;br /&gt;
 | Does trigger on it's own now&lt;br /&gt;
 | none&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
  #&lt;br /&gt;
  # [ PHP Variables ]&lt;br /&gt;
  #&lt;br /&gt;
  # This is a paranoid sibling to 2.2.x Rule 958980.&lt;br /&gt;
  # The rule is no longer chained in order to trigger anomaly scoring.&lt;br /&gt;
  # For chain-based scoring see 3.0.0 Rule 933130. &lt;br /&gt;
  #&lt;br /&gt;
  SecRule REQUEST_COOKIES|!REQUEST_COOKIES:/__utm/|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/* &amp;quot;@pmf php-variables.data&amp;quot; \&lt;br /&gt;
        &amp;quot;msg:'PHP Injection Attack: Variables Found',\&lt;br /&gt;
        phase:request,\&lt;br /&gt;
        rev:'1',\&lt;br /&gt;
        ver:'OWASP_CRS/3.0.0',\&lt;br /&gt;
        maturity:'1',\&lt;br /&gt;
        accuracy:'8',\&lt;br /&gt;
        capture,\&lt;br /&gt;
        t:none,t:normalisePath,\&lt;br /&gt;
        ctl:auditLogParts=+E,\&lt;br /&gt;
        block,\&lt;br /&gt;
        id:'XXXXXX',\&lt;br /&gt;
        tag:'application-multi',\&lt;br /&gt;
        tag:'language-PHP',\&lt;br /&gt;
        tag:'platform-multi',\&lt;br /&gt;
        tag:'attack-PHP injection',\&lt;br /&gt;
        tag:'OWASP_CRS/WEB_ATTACK/PHP_INJECTION',\&lt;br /&gt;
        tag:'OWASP_TOP_10/A1',\&lt;br /&gt;
        logdata:'Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}',\&lt;br /&gt;
        severity:'CRITICAL',\&lt;br /&gt;
        setvar:'tx.msg=%{rule.msg}',\&lt;br /&gt;
        setvar:tx.php_injection_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
        setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
        setvar:tx.%{rule.id}-OWASP_CRS/WEB_ATTACK/PHP_INJECTION-%{matched_var_name}=%{tx.0}&amp;quot;&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_970003&amp;diff=209373</id>
		<title>OWASP ModSec CRS Paranoia Mode Sibling 970003</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_970003&amp;diff=209373"/>
				<updated>2016-02-22T09:31:04Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: Created page with &amp;quot;''This page contains a proposal for a stricter rule-clone for ModSecurity CRS Paranoia Mode.''  == 970003 : SQL Error Leakage ==  {|- class=...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;''This page contains a proposal for a stricter rule-clone for [[OWASP_ModSec_CRS_Paranoia_Mode|ModSecurity CRS Paranoia Mode]].''&lt;br /&gt;
&lt;br /&gt;
== 970003 : SQL Error Leakage ==&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | '''Original ID (2.2.x)'''&lt;br /&gt;
 | '''Change'''&lt;br /&gt;
 | '''Whitelisting'''&lt;br /&gt;
|-&lt;br /&gt;
 | 970003&lt;br /&gt;
 | Triggers anomaly score directly now&lt;br /&gt;
 | none&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
  #&lt;br /&gt;
  # -=[ SQL Error Leakage ]=-&lt;br /&gt;
  #&lt;br /&gt;
  # This is a paranoid sibling to 2.2.9 Rule 970003.&lt;br /&gt;
  # The rule now triggers the anomaly scoring instantly&lt;br /&gt;
  # instead of just setting tx.sql_error_match.&lt;br /&gt;
  #&lt;br /&gt;
  SecRule RESPONSE_BODY &amp;quot;@pmFromFile sql-errors.data&amp;quot; \&lt;br /&gt;
        &amp;quot;phase:response,\&lt;br /&gt;
        id:XXXXXX,\&lt;br /&gt;
        rev:'5',\&lt;br /&gt;
        ver:'OWASP_CRS/3.0.0',\&lt;br /&gt;
        pass,\&lt;br /&gt;
        nolog,\&lt;br /&gt;
        tag:'application-multi',\&lt;br /&gt;
        tag:'language-multi',\&lt;br /&gt;
        tag:'platform-multi',\&lt;br /&gt;
        tag:'attack-information disclosure',\&lt;br /&gt;
        setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
        t:none&amp;quot;&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode&amp;diff=209226</id>
		<title>OWASP ModSec CRS Paranoia Mode</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode&amp;diff=209226"/>
				<updated>2016-02-20T11:07:10Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: /* Stricter siblings for existing rules */ -&amp;gt; New Rules added&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Abstract==&lt;br /&gt;
&lt;br /&gt;
This is a page about the development of a paranoia mode aka bringing back the rules that used to yield a high number of false positives. This little project is aimed at inclusion into the 3.0.0 release of the OWASP ModSecurity Core Rules, where some rules have been removed in order to reduce the number of false positives with vanilla installations.&lt;br /&gt;
&lt;br /&gt;
FIXME: Detailed description&lt;br /&gt;
&lt;br /&gt;
''Back to the [https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project OWASP ModSecurity Core Rules Set].''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Sub-Project Infos==&lt;br /&gt;
&lt;br /&gt;
* '''Status''': active (January 2016)&lt;br /&gt;
* '''Schedule''': Pull request in &amp;lt;strike&amp;gt;January&amp;lt;/strike&amp;gt;February  2016&lt;br /&gt;
* '''Who''': Christian Folini (dune73), Noël Zindel (zino), Franziska Bühler (franziskabuehler), Manuel Leos (Spartan), Walter Hop (lifeforms)&lt;br /&gt;
* '''Documentation''': Here on the [https://www.owasp.org/index.php/OWASP_ModSec_CRS_Paranoia_Mode OWASP Wiki] / [https://www.netnea.com/cms/2016/02/04/owasp-modsecurity-core-rules-paranoia-mode-mechanics-proposal/ Mechanics Proposal]&lt;br /&gt;
* '''Discussion / Archive''': &amp;lt;tt&amp;gt;owasp-modsecurity-core-rule-set@lists.owasp.org&amp;lt;/tt&amp;gt; / archive: http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/&lt;br /&gt;
* '''Github Link v3.0.0-rc1 (our base)''': https://github.com/SpiderLabs/owasp-modsecurity-crs/tree/v3.0.0-rc1&lt;br /&gt;
* '''Github Link paranoia-mode''': https://github.com/dune73/owasp-modsecurity-crs/tree/paranoia-mode&lt;br /&gt;
* '''Final Pull Request #1: Add paranoia mode mechanics''': FIXME&lt;br /&gt;
* '''Final Pull Request #2: Move first rules to paranoia mode''': FIXME&lt;br /&gt;
* '''Final Pull Request #3: Add 2.2.X rules to paranoia mode''': FIXME&lt;br /&gt;
* '''Final Pull Request #4: Add stricter siblings''': FIXME&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Tasks==&lt;br /&gt;
&lt;br /&gt;
===Open Tasks===&lt;br /&gt;
&lt;br /&gt;
Please define state as follows: ''new'', ''assigned'', ''waiting'', ''closed''. When a task it is closed, it is moved to the seperate closed tasks table below.&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''Task'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Who'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | Write new stricter siblings for existing rules&lt;br /&gt;
  | Noël&lt;br /&gt;
  | assigned&lt;br /&gt;
|-&lt;br /&gt;
  | Define ID-space for strict siblings&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Sort out mechanics of the paranoia mode&lt;br /&gt;
  | Christian&lt;br /&gt;
  | assigned&lt;br /&gt;
|-&lt;br /&gt;
  | Define exact syntax of paranoia mode setup&lt;br /&gt;
  | Christian&lt;br /&gt;
  | waiting&lt;br /&gt;
|-&lt;br /&gt;
  | Sort out name: Is &amp;quot;Paranoia Mode&amp;quot; really the right term?&lt;br /&gt;
  | Christian&lt;br /&gt;
  | waiting&lt;br /&gt;
|-&lt;br /&gt;
  | Write pull request&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Submit pull request&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Draw flowchart&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Write documentation&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Closed Tasks===&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''Task'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Who'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of rules, which triggered false positives in 2.2.X frequently&lt;br /&gt;
  | Christian&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 2.2.x rules, which have disappeared from 3.0.0-rc1&lt;br /&gt;
  | Spartan&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 3.0.0-rc1 rules, which could be accompanied with&amp;lt;br /&amp;gt;stricter siblings in paranoia mode&amp;lt;br /&amp;gt;(same idea of the rule, but harder limit etc.)&lt;br /&gt;
  | Christian&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 3.0.0-rc1 rules, which could be moved to the paranoia mode&lt;br /&gt;
  | Franziska&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of disappeared / missing 2.2.X base_rules, which should be brought back&lt;br /&gt;
  | group&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 2.2.X optional and experimental rules, which should be brought back&lt;br /&gt;
  | group&lt;br /&gt;
  | closed (could be repeated more throughly)&lt;br /&gt;
|-&lt;br /&gt;
  | Nail down final list of rules which should be moved / recreated into the paranoia mode&lt;br /&gt;
  | group&lt;br /&gt;
  | closed&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Rules==&lt;br /&gt;
&lt;br /&gt;
===Paranoia Mode Candidates===&lt;br /&gt;
&lt;br /&gt;
The 3.0.0-rc1 has all rules renumbered. Existing numbering was fairly crazy and the new numbering follows the numbering scheme of the rules files (-&amp;gt; 9&amp;lt;2-digit-rulefile&amp;gt;&amp;lt;3-digit-id&amp;gt;)&lt;br /&gt;
A mapping table exists [[https://github.com/SpiderLabs/owasp-modsecurity-crs/blob/v3.0.0-rc1/id_renumbering/IdNumbering.csv IdNumbering.csv]]&lt;br /&gt;
We need to make sure, we do not mess things up, so let's add both IDs to the table, the old one and the new one.&lt;br /&gt;
&lt;br /&gt;
Please set status as follows : ''confirmed'',''candidate'', ''cloning-confirmed'',''cloning-candidate'', ''unsure'', ''dropped''. &lt;br /&gt;
* 'cloning-confirmed', 'cloning-candidates' are rules, that could be cloned into an even stricter variant with a stricter limit in a higher paranoia setting.&lt;br /&gt;
* If dropped, please provide reasoning in the remarks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''RuleID 2.2.x'''&lt;br /&gt;
  |'''RuleID 3.0.0-rc1'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''msg'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Remarks'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | 950001&lt;br /&gt;
  | 942150&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Also Franziska's candidate: @pmf file with very short function names, could match frequently.&lt;br /&gt;
|-&lt;br /&gt;
  | 950109&lt;br /&gt;
  | 920230&lt;br /&gt;
  | Multiple URL Encoding Detected&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 950120&lt;br /&gt;
  | 931130&lt;br /&gt;
  | Possible Remote File Inclusion (RFI) Attack: Off-Domain Reference/Link&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Walter's 2.2.X candidate: many FP; Chrstian: hardly any FPs; &amp;lt;br/&amp;gt;discussion concluded, that rule should end up in paranoia mode, possibly with additional conditions to reduce FPs (scope outside of this paranoia mode project)&amp;lt;br/&amp;gt;[http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-February/001885.html Link to discussion]&lt;br /&gt;
|-&lt;br /&gt;
  | 960335&lt;br /&gt;
  | 920380&lt;br /&gt;
  | Too many arguments in request&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Walter's 2.2.X candidate: some FP (phpMyAdmin, large forms), alternatively would recommend raising &amp;lt;code&amp;gt;tx.max_num_args&amp;lt;/code&amp;gt; to 1000&lt;br /&gt;
|-&lt;br /&gt;
  | 950901&lt;br /&gt;
  | 942130&lt;br /&gt;
  | SQL Injection Attack: SQL Tautology Detected.&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Also Franziska's candidate: legitimate sentences could match. Walter's 2.2.x experience: many FP in natural text however the rule seems to have merit&lt;br /&gt;
|-&lt;br /&gt;
  | 950916&lt;br /&gt;
  | 921170&lt;br /&gt;
  | HTTP Header Injection Attack via payload (CR/LF detected)&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Franziska's candidate: change action from pass to block and move to paranoia mode.&lt;br /&gt;
|-&lt;br /&gt;
  | 959070&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 959071&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 959072&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 959073&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 960015&lt;br /&gt;
  | 920300&lt;br /&gt;
  | Request Missing an Accept Header&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Also Franziska's candidate: Not every legitimate client behaves correctly. Walter's experience: many FP (PHP SoapClient)&amp;lt;br/&amp;gt;Discussion concluded it's moved to paranoia mode.&amp;lt;br/&amp;gt;[http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-February/001888.html Link to discussion]&amp;lt;br/&amp;gt;Spartan: Many mobile devices do not send this header, very high FP.&lt;br /&gt;
|-&lt;br /&gt;
  | 960024&lt;br /&gt;
  | gone  &lt;br /&gt;
  | Meta-Character Anomaly Detection Alert - Repetative Non-Word Characters&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 960035&lt;br /&gt;
  | 920440&lt;br /&gt;
  | URL file extension is restricted by policy&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 970901&lt;br /&gt;
  | 950100&lt;br /&gt;
  | The Application Returned a 500-Level Status Code&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Franziska's candidate: too strict, too generic, no data leakage happened so far. Walter: it's useful however to prevent attacker from distinguishing between a failed SQLi attempt (403 blocked by ModSec) or a query error due to vulnerable app (500 from application); &amp;lt;br/&amp;gt;Discussion resolved with move to paranoia mode. 403 will cloak a backend error, which is hard for an inexperienced admin and thus complicates things in standard installations&amp;lt;br/&amp;gt;[http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-February/001889.html Link to discussion]&lt;br /&gt;
|-&lt;br /&gt;
  | 973300&lt;br /&gt;
  | gone  &lt;br /&gt;
  | Possible XSS Attack Detected - HTML Tag Handler&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP&lt;br /&gt;
|-&lt;br /&gt;
  | 973332&lt;br /&gt;
  | gone  &lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP&lt;br /&gt;
|-&lt;br /&gt;
  | 973333&lt;br /&gt;
  | gone  &lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981172&lt;br /&gt;
  | gone  &lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: very high FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981173&lt;br /&gt;
  | gone  &lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: very high FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981231&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Comment Sequence Detected.&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: high FP but rule seems useful&lt;br /&gt;
|-&lt;br /&gt;
  | 981240&lt;br /&gt;
  | 942300&lt;br /&gt;
  | Detects MySQL comments, conditions and ch(a)r injections&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981242&lt;br /&gt;
  | 942330&lt;br /&gt;
  | Detects classic SQL injection probings 1/2&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Also Franziska's candidate: one quote character already matches?? Walter: low FP, but seen in cookies injected by some US ISPs; &lt;br /&gt;
|-&lt;br /&gt;
  | 981243&lt;br /&gt;
  | 942370&lt;br /&gt;
  | Detects classic SQL injection probings 2/2&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981244&lt;br /&gt;
  | 942180&lt;br /&gt;
  | Detects basic SQL authentication bypass attempts 1/3&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP; &amp;lt;br/&amp;gt; discussion did not bring up additional arguments. Moving to paranoia mode&amp;lt;br/&amp;gt;[http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-February/001890.html Link to discussion]&lt;br /&gt;
|-&lt;br /&gt;
  | 981245&lt;br /&gt;
  | 942260&lt;br /&gt;
  | Detects basic SQL authentication bypass attempts 2/3&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981246&lt;br /&gt;
  | 942340&lt;br /&gt;
  | Detects basic SQL authentication bypass attempts 3/3&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981248&lt;br /&gt;
  | 942210&lt;br /&gt;
  | Detects chained SQL injection attempts 1/2&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: low FP, &amp;lt;br/&amp;gt; discussion did not bring up any additional arguments. Moving to paranoia mode&amp;lt;br/&amp;gt;[http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-February/001890.html Link to discussion]&lt;br /&gt;
|-&lt;br /&gt;
  | 981249&lt;br /&gt;
  | 942310&lt;br /&gt;
  | Detects chained SQL injection attempts 2/2&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP but seen in very specific situations&lt;br /&gt;
|-&lt;br /&gt;
  | 981257&lt;br /&gt;
  | 942200&lt;br /&gt;
  | Detects MySQL comment-/space-obfuscated injections and backtick termination&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981260&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Hex Encoding Identified&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: high FP in long random strings&lt;br /&gt;
|-&lt;br /&gt;
  | 981318&lt;br /&gt;
  | 942110&lt;br /&gt;
  | SQL Injection Attack: Common Injection Testing Detected&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Franziska's candidate: one quote character at the beginning/end really not legitimate? Walter 2.2.X candidate: frequent FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981319&lt;br /&gt;
  | 942120&lt;br /&gt;
  | SQL Injection Attack: SQL Operator Detected&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Also Franziska's candidate: very short operators or strings already match. Walter: some FP (WooCommerce)&lt;br /&gt;
|-&lt;br /&gt;
  | 981049&lt;br /&gt;
  | 912100&lt;br /&gt;
  | Potential Denial of Service (DoS) Attack from ... - # of Request Bursts: ...	   &lt;br /&gt;
  | cloning-confirmed	&lt;br /&gt;
  | limit currently at 2; could be set to 1; now, the attacker has to exceed dos_counter_threshold twice. With full reset of counter after first hit. Source: 2.2.X-&amp;gt;experimental rules&lt;br /&gt;
|-&lt;br /&gt;
  | 960901          &lt;br /&gt;
  | 920270			&lt;br /&gt;
  | Invalid character in request&lt;br /&gt;
  | cloning-confirmed	&lt;br /&gt;
  | @validateByteRange 1-255; there was a conditional rule with stricter byterange 32-126 in 2.2.X as well&lt;br /&gt;
|-&lt;br /&gt;
  | 970003          &lt;br /&gt;
  | 951100			&lt;br /&gt;
  | none					   					   &lt;br /&gt;
  | cloning-confirmed	&lt;br /&gt;
  | rule is only setting tx.sql_error_match. Could also trigger score directly&lt;br /&gt;
|-&lt;br /&gt;
  | 950907          &lt;br /&gt;
  | 932100			&lt;br /&gt;
  | Remote Command Execution (RCE) Attempt					   	   &lt;br /&gt;
  | cloning-confirmed	&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 958977          &lt;br /&gt;
  | 933110			&lt;br /&gt;
  | PHP Injection Attack: Function Name Found					    &lt;br /&gt;
  | cloning-confirmed&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 958979          &lt;br /&gt;
  | 933120			&lt;br /&gt;
  | PHP Injection Attack: Configuration Directive Found				    &lt;br /&gt;
  | cloning-candidate&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 958980          &lt;br /&gt;
  | 933130			&lt;br /&gt;
  | PHP Injection Attack: Variables Found					   	    &lt;br /&gt;
  | cloning-confirmed&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 950001          &lt;br /&gt;
  | 942150			&lt;br /&gt;
  | SQL Injection Attack					   			    &lt;br /&gt;
  | cloning-confirmed&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 950907&lt;br /&gt;
  | 932100&lt;br /&gt;
  | System Command Injection&lt;br /&gt;
  | dropped&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Also Franziska's candidate: false positives possible because of @pmf, file with short cmds. Discussion evolved about splitting the file, which everybody thinks is a good idea. But that would be outside the scope of the introduction of the paranoia mode. So the rule stays in the standard set of rules for the time being and will be split in the future [http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-February/001886.html Link to discussion]&lt;br /&gt;
|-&lt;br /&gt;
  | 900050&lt;br /&gt;
  | 910100&lt;br /&gt;
  | Client IP is from a HIGH Risk Country Location.&lt;br /&gt;
  | dropped&lt;br /&gt;
  | Franziska's candidate: Do we want to exlude countries? But then easy to configure. Discussion pointed out this as an effective rule. We leave it in the standard rules, but provide an empty country list by default [http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-February/001951.html Link to discussion]. [https://github.com/SpiderLabs/owasp-modsecurity-crs/pull/284 Separate pull request]&lt;br /&gt;
|-&lt;br /&gt;
  | 960017&lt;br /&gt;
  | 920350&lt;br /&gt;
  | Host header is a numeric IP address&lt;br /&gt;
  | dropped&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Also Franziska's candidate: Not every legitimate client behaves correctly. Walter's experience: low FP (almost all are mass scans); &amp;lt;br/&amp;gt; Discussion concluded that legitimate use of numeric IP addresses is rare. This is really mostly mass scanners. Rule will be kept in standard set of rules&amp;lt;br/&amp;gt;[http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-February/001888.html Link to discussion]&lt;br /&gt;
|-&lt;br /&gt;
  | 958977&lt;br /&gt;
  | 933110&lt;br /&gt;
  | PHP Injection Attack: Function Name Found&lt;br /&gt;
  | dropped&lt;br /&gt;
  | Franziska's candidate: false positives possible because of @pmf, file with short function names. Maybe we should split the data file. The discussion revealed that splitting the data file in a clean way is very difficult. Walter Hop volunteered to rework the php rules completely. Chaim might join that effort.&lt;br /&gt;
|-&lt;br /&gt;
  | 958979&lt;br /&gt;
  | 933120&lt;br /&gt;
  | PHP Injection Attack: Configuration Directive Found&lt;br /&gt;
  | dropped&lt;br /&gt;
  | Franziska's candidate: false positives possible because of @pmf, file with short configuration directives. Splitting file?  The discussion revealed that splitting the data file in a clean way is very difficult. Walter Hop volunteered to rework the php rules completely. Chaim might join that effort.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Rules from 2.2.X, missing in 3.0.0-rc1===&lt;br /&gt;
&lt;br /&gt;
It looks as if only the base_rules made it into 3.0.0. In fact there are a few rule ids know from the optional and experimental rule folders in 2.2.X, but it is more likely, these are new 3.0.0 rules reusing old rule ids as the rules (regexes and msg) do not match at all.&lt;br /&gt;
&lt;br /&gt;
When trying to generate the list below, be aware that the rule ids have been renumbered between 3.0.0-dev and 3.0.0-rc1. IdNumbering.csv in your friend.&lt;br /&gt;
&lt;br /&gt;
====Base rules====&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''2.2.X rule id'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''msg'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''remarks'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | 950002&lt;br /&gt;
  | System Command Access&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950006&lt;br /&gt;
  | System Command Injection&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950007&lt;br /&gt;
  | Blind SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950008&lt;br /&gt;
  | Injection of Undocumented ColdFusion Tags&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950010&lt;br /&gt;
  | LDAP Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950011&lt;br /&gt;
  | SSI injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950018&lt;br /&gt;
  | Universal PDF XSS URL Detected.&lt;br /&gt;
  | Walter: medium FP (foo.pdf#javascript)&lt;br /&gt;
|-&lt;br /&gt;
  | 950019&lt;br /&gt;
  | Email Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950908&lt;br /&gt;
  | SQL Injection Attack.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950921&lt;br /&gt;
  | Backdoor access&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950922&lt;br /&gt;
  | Backdoor access&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958000&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958001&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958002&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958003&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958004&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958005&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958006&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958007&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958008&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958009&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958010&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958011&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958012&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958013&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958016&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958017&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958018&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958019&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958020&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958022&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958023&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958024&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958025&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958026&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958027&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958028&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958030&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958031&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958032&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958033&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958034&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958036&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958037&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958038&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958039&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958040&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958041&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958045&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958046&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958047&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958049&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958051&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958052&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958054&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958056&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958057&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958059&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958291&lt;br /&gt;
  | Range: field exists and begins with 0.&lt;br /&gt;
  | Walter: high FP (Chrome PDF viewer) and not useful.&lt;br /&gt;
|-&lt;br /&gt;
  | 958404&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958405&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958406&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958407&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958408&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958409&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958410&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958411&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958412&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958413&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958414&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958415&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958416&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958417&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958418&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958419&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958420&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958421&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958422&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958423&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958976&lt;br /&gt;
  | PHP Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959070&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959071&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959072&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959073&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960014&lt;br /&gt;
  | Proxy access attempt&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960018&lt;br /&gt;
  | Invalid character in request&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960020&lt;br /&gt;
  | Pragma Header requires Cache-Control Header for HTTP/1.1 requests.&lt;br /&gt;
  | Walter: some FP&lt;br /&gt;
|-&lt;br /&gt;
  | 960022&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960024&lt;br /&gt;
  | Meta-Character Anomaly Detection Alert - Repetative Non-Word Characters&lt;br /&gt;
  | Walter: many FP&lt;br /&gt;
|-&lt;br /&gt;
  | 960902&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960913&lt;br /&gt;
  | Invalid request&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970007&lt;br /&gt;
  | Zope Information Leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970008&lt;br /&gt;
  | Cold Fusion Information Leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970010&lt;br /&gt;
  | ISA server existence revealed&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970011&lt;br /&gt;
  | File or Directory Names Leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970012&lt;br /&gt;
  | Microsoft Office document properties leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970016&lt;br /&gt;
  | Cold Fusion source code leakage&lt;br /&gt;
  | Walter: some FP but not using this language&lt;br /&gt;
|-&lt;br /&gt;
  | 970018&lt;br /&gt;
  | IIS installed in default location&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970021&lt;br /&gt;
  | WebLogic information disclosure&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970903&lt;br /&gt;
  | ASP/JSP source code leakage&lt;br /&gt;
  | Walter: some FP but not using this language&lt;br /&gt;
|-&lt;br /&gt;
  | 973300&lt;br /&gt;
  | Possible XSS Attack Detected - HTML Tag Handler&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973301&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973302&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973303&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973304&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973305&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973306&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973307&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973308&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973309&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973310&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973311&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973312&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973313&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973314&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973316&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973325&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973327&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973328&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973329&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973330&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973331&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973332&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973333&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973334&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | Walter: many FP in text&lt;br /&gt;
|-&lt;br /&gt;
  | 973335&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | Walter: many FP in text&lt;br /&gt;
|-&lt;br /&gt;
  | 973347&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981000&lt;br /&gt;
  | Possibly malicious iframe tag in output&lt;br /&gt;
  | Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981001&lt;br /&gt;
  | Possibly malicious iframe tag in output&lt;br /&gt;
  | Walter: medium FP (iframes with display:none)&lt;br /&gt;
|-&lt;br /&gt;
  | 981003&lt;br /&gt;
  | Malicious iframe+javascript tag in output&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981004&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Excessive fromCharCode&lt;br /&gt;
  | Walter: many FP (Wordpress 4.4 inlined emoji javascripts)&lt;br /&gt;
|-&lt;br /&gt;
  | 981005&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Eval+Unescape&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981006&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Unescape&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981007&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Heap Spray&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981018&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981022&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981133&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981134&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981136&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981172&lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | Walter: many FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981173&lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | Walter: many FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981177&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981178&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981231&lt;br /&gt;
  | SQL Comment Sequence Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981260&lt;br /&gt;
  | SQL Hex Encoding Identified&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981300&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981301&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981302&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981303&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981304&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981305&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981306&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981307&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981308&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981309&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981310&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981311&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981312&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981313&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981314&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981315&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981316&lt;br /&gt;
  | SQL SELECT Statement Anomaly Detection Alert&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981317&lt;br /&gt;
  | SQL SELECT Statement Anomaly Detection Alert&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 990012&lt;br /&gt;
  | Rogue web site crawler&lt;br /&gt;
  | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
====Optional, experimental, slr rules====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | 900048&lt;br /&gt;
 | Identifies Reflected XSS (optional_rules)&lt;br /&gt;
 | Walter: could be very interesting candidate but have not used it in production&lt;br /&gt;
|-&lt;br /&gt;
 | 920021, 920022, 920023&lt;br /&gt;
 | Possible Credit Card Track 1 Data Leakage. (experimental_rules)&lt;br /&gt;
 | Walter: could be interesting candidates but have not used it in production&lt;br /&gt;
|-&lt;br /&gt;
 | 981080, 920020, 920006&lt;br /&gt;
 | Detect CC# in output and block transaction (optional_rules)&lt;br /&gt;
 | Walter: could be interesting candidate but have not used it in production&lt;br /&gt;
|-&lt;br /&gt;
 | 900047, 900048, 981180, 981182&lt;br /&gt;
 | Identifies Stored XSS (optional_rules)&lt;br /&gt;
 | Walter: could be somewhat interesting candidate but have not used it in production&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Stricter siblings for existing rules ===&lt;br /&gt;
&lt;br /&gt;
Stricter Siblings are rules that are present in the CRS but could be accompanied by a stricter clone in Paranoia Mode. Adjustments can differ from rule to rule but include higher anomaly ratings or stricter triggers (e.g. regex counters). To prevent masses of false positives, rules can come with additional filters (chained rules) for common use-cases. These can either be included into Paranoia Mode or simply serve as a recommendation.&lt;br /&gt;
&lt;br /&gt;
Note: To avoid a cluttered project main-page, rule proposals are documented in their respective sub-page. When adding new proposals, make sure adding the rules original (2.2.x) ID, a quick description of what changes were made, and, if applicable, which additional filters were added.&lt;br /&gt;
&lt;br /&gt;
'''Possible siblings:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981173|981173 : SQL Injection Character Anomaly Usage]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981172|981172 : SQL Injection Character Anomaly Usage]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981049|981049 : Potential Denial of Service (DoS)]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_970003|970003 : SQL Error Leakage]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_960901|960901 : Invalid character in request]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_958980|958980 : PHP Injection Attack: Variables Found]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_958979|958979 : PHP Injection Attack: Configuration Directive Found]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_958977|958977 : PHP Injection Attack: Function Name Found]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_950907|950907 : Remote Command Execution (RCE) Attempt]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_950001|950001 : SQL Injection Attack]]&lt;br /&gt;
&lt;br /&gt;
==Project Status==&lt;br /&gt;
&lt;br /&gt;
===Project Status January 30, 2016===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
Hello everybody,&lt;br /&gt;
&lt;br /&gt;
It's time to do a status report of our little core rules project.&lt;br /&gt;
&lt;br /&gt;
I am including Franziska Bühler and Walter Hop in this status mail.&lt;br /&gt;
Both are experienced ModSec sysadmins. Franziska contributed to this&lt;br /&gt;
first stage, Walter told me he does not have much time, but he&lt;br /&gt;
was interested in participating at least in the discussions about&lt;br /&gt;
the rules.&lt;br /&gt;
&lt;br /&gt;
All in all, this is taking more time than anticipated. But we&lt;br /&gt;
have also done things very throughly than I thought. Which is&lt;br /&gt;
generally a good thing.&lt;br /&gt;
&lt;br /&gt;
Done so far:&lt;br /&gt;
* Manuel has provided us with a list of rules removed between 2.2.x and 3.0.0rc1&lt;br /&gt;
* I have assembled a list of rules known to trigger false positives frequently in the 2.2.x ruleset, they are thus candidates for the paranoia mode&lt;br /&gt;
* Franziska has looked through the 3.0.0rc1 rules and identified a set of rules which look like good candidates.&lt;br /&gt;
* Noël has sharpened his skills by re-writing 981173 in a way that ignores innocent UUIDs. In my eyes, he found a very elegant solution.&lt;br /&gt;
* With the development of 3.0.0-dev, Chaim unfortunately reused rule ids formerly used with optional and experimental rules. Now this has all been renumbered. I have pointed this out in the mailinglist and had private contact with Chaim where he confirmed the fact - and promised to resolve the issue.&lt;br /&gt;
&lt;br /&gt;
We have not really looked at the disappeared rules and identified those&lt;br /&gt;
who should be brought back and have not been picked so far. This&lt;br /&gt;
includes the 2.2.X base_rules, but also the optional, experimental,&lt;br /&gt;
and huge stock of slr rules. Of these three groups, only the&lt;br /&gt;
anti-ddos rules have made it into 3.0.0. There are probably more&lt;br /&gt;
interesting candidates.&lt;br /&gt;
&lt;br /&gt;
If somebody among you wants to look into these, then that would be&lt;br /&gt;
welcome, but I do not want to have these tasks delay us any further.&lt;br /&gt;
After all, Old rules can also be brought back in subsequent releases&lt;br /&gt;
if we see a benefit.&lt;br /&gt;
&lt;br /&gt;
So the next real tasks are:&lt;br /&gt;
* Looking through the list of candidates and cloning-candidates (the latter are those rules we might accompany with a clone with stricter limits in paranoia mode).&lt;br /&gt;
* Defining the exact working of the paranoia mode.&lt;br /&gt;
&lt;br /&gt;
Please sit down and look through the rule lists in the wiki and add&lt;br /&gt;
remarks with regards to the candidate rules. If you think a rule&lt;br /&gt;
should be included, if you think an individual rule should not be&lt;br /&gt;
included etc.&lt;br /&gt;
&lt;br /&gt;
I am also going to invite the people on the mailinglist to take look at&lt;br /&gt;
the rules as well and add their remarks in the wiki (or respond via mail).&lt;br /&gt;
This should allow us to nail down the list of rules which will&lt;br /&gt;
actually be included in the paranoia mode.&lt;br /&gt;
&lt;br /&gt;
As for defining the exact working of the paranoia mode, I guess I&lt;br /&gt;
need to write down the idea I have in mind and see if it makes sense to&lt;br /&gt;
you.&lt;br /&gt;
&lt;br /&gt;
Thank you for contributing so far! It is a lot of fun to work in a team!&lt;br /&gt;
&lt;br /&gt;
Christian&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981049&amp;diff=208434</id>
		<title>OWASP ModSec CRS Paranoia Mode Sibling 981049</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981049&amp;diff=208434"/>
				<updated>2016-02-10T11:04:51Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: /* 981049 : Potential Denial of Service (DoS) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;''This page contains a proposal for a stricter rule-clone for [[OWASP_ModSec_CRS_Paranoia_Mode|ModSecurity CRS Paranoia Mode]].''&lt;br /&gt;
&lt;br /&gt;
== 981049 : Potential Denial of Service (DoS) ==&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | '''Original ID (2.2.x)'''&lt;br /&gt;
 | '''Change'''&lt;br /&gt;
 | '''Whitelisting'''&lt;br /&gt;
|-&lt;br /&gt;
 | 981049&lt;br /&gt;
 | Operator match decreased form 2 to 1.&amp;lt;br&amp;gt;''Optional: change tx.dos_burst_time_slice, tx.dos_counter_threshold and/or tx.dos_block_timeout''&lt;br /&gt;
 | None&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
  #&lt;br /&gt;
  # -=[ Potential Denial of Service (DoS)  ]=-&lt;br /&gt;
  #&lt;br /&gt;
  # This is a paranoid sibling to 2.2.9 Experimental Rule 981049.&lt;br /&gt;
  # The rule now triggers after the first burst instead of the second.&lt;br /&gt;
  #&lt;br /&gt;
  SecRule IP:DOS_BURST_COUNTER &amp;quot;@ge 1&amp;quot;&lt;br /&gt;
        &amp;quot;phase:logging,\&lt;br /&gt;
        rev:'1',\&lt;br /&gt;
        ver:'OWASP_CRS/3.0.0',\&lt;br /&gt;
        maturity:'X',\&lt;br /&gt;
        accuracy:'Y',\&lt;br /&gt;
        t:none,\&lt;br /&gt;
        log,\&lt;br /&gt;
        msg:'Potential Denial of Service (DoS) Attack from %{tx.real_ip} - # of Request Bursts:%{ip.dos_burst_counter}',\&lt;br /&gt;
        id:'XXXXXX',\&lt;br /&gt;
        tag:'FIXME Filler for attacktype',\&lt;br /&gt;
        tag:'Paranoia rule on level Z',\&lt;br /&gt;
        setvar:ip.dos_block=1,\&lt;br /&gt;
        expirevar:ip.dos_block=%{tx.dos_block_timeout},\&lt;br /&gt;
        pass&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== Notes ===&lt;br /&gt;
&lt;br /&gt;
This rule can not be implemented as is. Rules 981044 - 981048 from ''owasp-modsecurity-crs/experimental_rules/modsecurity_crs_11_dos_protection.conf'' need to be integrated to allow proper blocking. There should be no need to adjust these rules for desired effects.&lt;br /&gt;
&lt;br /&gt;
Also note that more Paranoia tuning can be done by adjusting the DoS Protection variable values in your main configuration (e.g. modsecurity_crs_10_setup.conf).&lt;br /&gt;
&lt;br /&gt;
  #&lt;br /&gt;
  # -- &amp;lt;nowiki&amp;gt;[[ DoS Protection ]]&amp;lt;/nowiki&amp;gt; ----------------------------------------------------------------&lt;br /&gt;
  #&lt;br /&gt;
  # This is a Paranoia Mode Clone.&lt;br /&gt;
  # Adjust the following variables to fine tune paranoia level.&lt;br /&gt;
  #&lt;br /&gt;
  # - Burst Time Slice Interval: time interval window to monitor for bursts&lt;br /&gt;
  # - Request Threshold: request # threshold to trigger a burst&lt;br /&gt;
  # - Block Period: temporary block timeout&lt;br /&gt;
  #&lt;br /&gt;
  SecAction \&lt;br /&gt;
        &amp;quot;id:XXXXXX',\&lt;br /&gt;
        phase:request,\&lt;br /&gt;
        t:none,\&lt;br /&gt;
        setvar:'tx.dos_burst_time_slice=90',\&lt;br /&gt;
        setvar:'tx.dos_counter_threshold=50',\&lt;br /&gt;
        setvar:'tx.dos_block_timeout=600',\&lt;br /&gt;
        nolog,\&lt;br /&gt;
        pass&amp;quot;&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981049&amp;diff=208433</id>
		<title>OWASP ModSec CRS Paranoia Mode Sibling 981049</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981049&amp;diff=208433"/>
				<updated>2016-02-10T11:02:55Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: Created page with &amp;quot;''This page contains a proposal for a stricter rule-clone for ModSecurity CRS Paranoia Mode.''  == 981049 : Potential Denial of Service (DoS...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;''This page contains a proposal for a stricter rule-clone for [[OWASP_ModSec_CRS_Paranoia_Mode|ModSecurity CRS Paranoia Mode]].''&lt;br /&gt;
&lt;br /&gt;
== 981049 : Potential Denial of Service (DoS) ==&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | '''Original ID (2.2.x)'''&lt;br /&gt;
 | '''Change'''&lt;br /&gt;
 | '''Whitelisting'''&lt;br /&gt;
|-&lt;br /&gt;
 | 981049&lt;br /&gt;
 | Operator match decreased form 2 to 1.&amp;lt;br&amp;gt;''optional: change tx.dos_burst_time_slice, tx.dos_counter_threshold and/or tx.dos_block_timeout''&lt;br /&gt;
 | None&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
  #&lt;br /&gt;
  # -=[ Potential Denial of Service (DoS)  ]=-&lt;br /&gt;
  #&lt;br /&gt;
  # This is a paranoid sibling to 2.2.9 Experimental Rule 981049.&lt;br /&gt;
  # The rule now triggers after the first burst instead of the second.&lt;br /&gt;
  #&lt;br /&gt;
  SecRule IP:DOS_BURST_COUNTER &amp;quot;@ge 1&amp;quot;&lt;br /&gt;
        &amp;quot;phase:logging,\&lt;br /&gt;
        rev:'1',\&lt;br /&gt;
        ver:'OWASP_CRS/3.0.0',\&lt;br /&gt;
        maturity:'X',\&lt;br /&gt;
        accuracy:'Y',\&lt;br /&gt;
        t:none,\&lt;br /&gt;
        log,\&lt;br /&gt;
        msg:'Potential Denial of Service (DoS) Attack from %{tx.real_ip} - # of Request Bursts:%{ip.dos_burst_counter}',\&lt;br /&gt;
        id:'XXXXXX',\&lt;br /&gt;
        tag:'FIXME Filler for attacktype',\&lt;br /&gt;
        tag:'Paranoia rule on level Z',\&lt;br /&gt;
        setvar:ip.dos_block=1,\&lt;br /&gt;
        expirevar:ip.dos_block=%{tx.dos_block_timeout},\&lt;br /&gt;
        pass&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== Notes ===&lt;br /&gt;
&lt;br /&gt;
This rule can not be implemented as is. Rules 981044 - 981048 from ''owasp-modsecurity-crs/experimental_rules/modsecurity_crs_11_dos_protection.conf'' need to be integrated to allow proper blocking. There should be no need to adjust these rules for desired effects.&lt;br /&gt;
&lt;br /&gt;
Also note that more Paranoia tuning can be done by adjusting the DoS Protection variable values in your main configuration (e.g. modsecurity_crs_10_setup.conf).&lt;br /&gt;
&lt;br /&gt;
  #&lt;br /&gt;
  # -- &amp;lt;nowiki&amp;gt;[[ DoS Protection ]]&amp;lt;/nowiki&amp;gt; ----------------------------------------------------------------&lt;br /&gt;
  #&lt;br /&gt;
  # This is a Paranoia Mode Clone.&lt;br /&gt;
  # Adjust the following variables to fine tune paranoia level.&lt;br /&gt;
  #&lt;br /&gt;
  # - Burst Time Slice Interval: time interval window to monitor for bursts&lt;br /&gt;
  # - Request Threshold: request # threshold to trigger a burst&lt;br /&gt;
  # - Block Period: temporary block timeout&lt;br /&gt;
  #&lt;br /&gt;
  SecAction \&lt;br /&gt;
        &amp;quot;id:XXXXXX',\&lt;br /&gt;
        phase:request,\&lt;br /&gt;
        t:none,\&lt;br /&gt;
        setvar:'tx.dos_burst_time_slice=90',\&lt;br /&gt;
        setvar:'tx.dos_counter_threshold=50',\&lt;br /&gt;
        setvar:'tx.dos_block_timeout=600',\&lt;br /&gt;
        nolog,\&lt;br /&gt;
        pass&amp;quot;&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981173&amp;diff=208429</id>
		<title>OWASP ModSec CRS Paranoia Mode Sibling 981173</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981173&amp;diff=208429"/>
				<updated>2016-02-10T08:44:02Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;''This page contains a proposal for a stricter rule-clone for [[OWASP_ModSec_CRS_Paranoia_Mode|ModSecurity CRS Paranoia Mode]].''&lt;br /&gt;
&lt;br /&gt;
== 981173 : SQL Injection Character Anomaly Usage ==&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | '''Original ID (2.2.x)'''&lt;br /&gt;
 | '''Change'''&lt;br /&gt;
 | '''Whitelisting'''&lt;br /&gt;
|-&lt;br /&gt;
 | 981173&lt;br /&gt;
 | Regex counter decreased from 4 to 1.&amp;lt;br&amp;gt;Anomaly scoring increased to critical.&lt;br /&gt;
 | Regex for UUIDs in chained Rule.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
  #&lt;br /&gt;
  # -=[ SQL Injection Character Anomaly Usage ]=-&lt;br /&gt;
  #&lt;br /&gt;
  # This is a paranoid sibling to 2.2.9 Rule 981173.&lt;br /&gt;
  # The regex limit is set to '1' and the anomaly scoring is increased to 'critical'.&lt;br /&gt;
  # For dealing with false positives, UUID format is whitelisted with a chained rule.&lt;br /&gt;
  #&lt;br /&gt;
  SecRule ARGS_NAMES|ARGS|XML:/* &amp;quot;([\~\!\@\#\$\%\^\&amp;amp;\*\(\)\-\+\=\{\}\[\]\|\:\;\&amp;quot;\'\´\’\‘\`\&amp;lt;\&amp;gt;].*?){1,}&amp;quot;\&lt;br /&gt;
        &amp;quot;chain,\&lt;br /&gt;
        phase:request,\&lt;br /&gt;
        rev:'2',\&lt;br /&gt;
        ver:'OWASP_CRS/3.0.0',\&lt;br /&gt;
        maturity:'X',\&lt;br /&gt;
        accuracy:'Y',\&lt;br /&gt;
        t:none,t:urlDecodeUni,\&lt;br /&gt;
        block,\&lt;br /&gt;
        msg:'Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded',\&lt;br /&gt;
        id:'XXXXXX',\&lt;br /&gt;
        tag:'OWASP_CRS/WEB_ATTACK/SQL_INJECTION',\&lt;br /&gt;
        tag:'Paranoia rule on level Z',\&lt;br /&gt;
        logdata:'Matched Data: %{TX.1} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}',\&lt;br /&gt;
        severity:'CRITICAL',\&lt;br /&gt;
        setvar:'tx.msg=%{rule.msg}',\&lt;br /&gt;
        setvar:tx.%{rule.id}-OWASP_CRS/WEB_ATTACK/RESTRICTED_SQLI_CHARS-%{matched_var_name}=%{tx.0}&amp;quot;&lt;br /&gt;
        SecRule MATCHED_VARS &amp;quot;!@rx ^[a-f0-9-]{36}$&amp;quot;\&lt;br /&gt;
                &amp;quot;t:lowercase,\&lt;br /&gt;
                setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
                setvar:tx.sql_injection_score=+1&amp;quot;&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981172&amp;diff=208428</id>
		<title>OWASP ModSec CRS Paranoia Mode Sibling 981172</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981172&amp;diff=208428"/>
				<updated>2016-02-10T08:41:04Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: Created page with &amp;quot;''This page contains a proposal for a stricter rule-clone for ModSecurity CRS Paranoia Mode.''  == 981172 : SQL Injection Character Anomaly...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;''This page contains a proposal for a stricter rule-clone for [[OWASP_ModSec_CRS_Paranoia_Mode|ModSecurity CRS Paranoia Mode]].''&lt;br /&gt;
&lt;br /&gt;
== 981172 : SQL Injection Character Anomaly Usage ==&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | '''Original ID (2.2.x)'''&lt;br /&gt;
 | '''Change'''&lt;br /&gt;
 | '''Whitelisting'''&lt;br /&gt;
|-&lt;br /&gt;
 | 981172&lt;br /&gt;
 | Regex counter decreased from 8 to 2.&amp;lt;br&amp;gt;Anomaly scoring increased to critical.&lt;br /&gt;
 | None&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
  #&lt;br /&gt;
  # -=[ SQL Injection Character Anomaly Usage  ]=-&lt;br /&gt;
  #&lt;br /&gt;
  # This is a paranoid sibling to 2.2.9 Rule 981172.&lt;br /&gt;
  # The regex limit is set to '2' and the anomaly scoring is increased to 'critical'.&lt;br /&gt;
  #&lt;br /&gt;
  SecRule REQUEST_COOKIES|!REQUEST_COOKIES:/__utm/|!REQUEST_COOKIES:/__utm/|REQUEST_COOKIES_NAMES &amp;quot;([\~\!\@\#\$\%\^\&amp;amp;\*\(\)\-\+\=\{\}\[\]\|\:\;\&amp;quot;\'\´\’\‘\`\&amp;lt;\&amp;gt;].*?){2,}&amp;quot;&lt;br /&gt;
        &amp;quot;capture,\&lt;br /&gt;
        phase:request,\&lt;br /&gt;
        rev:'2',\&lt;br /&gt;
        ver:'OWASP_CRS/3.0.0',\&lt;br /&gt;
        maturity:'X',\&lt;br /&gt;
        accuracy:'Y',\&lt;br /&gt;
        t:none,t:urlDecodeUni,\&lt;br /&gt;
        block,\&lt;br /&gt;
        msg:'Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded',\&lt;br /&gt;
        id:'XXXXXX',\&lt;br /&gt;
        tag:'OWASP_CRS/WEB_ATTACK/SQL_INJECTION',\&lt;br /&gt;
        tag:'Paranoia rule on level Z',\&lt;br /&gt;
        logdata:'Matched Data: %{TX.1} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}',\&lt;br /&gt;
        severity:'CRITICAL',\&lt;br /&gt;
        setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
        setvar:tx.sql_injection_score=+1,\&lt;br /&gt;
        setvar:'tx.msg=%{rule.msg}',\&lt;br /&gt;
        setvar:tx.%{rule.id}-OWASP_CRS/WEB_ATTACK/RESTRICTED_SQLI_CHARS-%{matched_var_name}=%{tx.0}&amp;quot;&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode&amp;diff=208420</id>
		<title>OWASP ModSec CRS Paranoia Mode</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode&amp;diff=208420"/>
				<updated>2016-02-10T08:18:59Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: /* Stricter siblings for existing rules */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Abstract==&lt;br /&gt;
&lt;br /&gt;
This is a page about the development of a paranoia mode aka bringing back the rules that used to yield a high number of false positives. This little project is aimed at inclusion into the 3.0.0 release of the OWASP ModSecurity Core Rules, where some rules have been removed in order to reduce the number of false positives with vanilla installations.&lt;br /&gt;
&lt;br /&gt;
FIXME: Detailed description&lt;br /&gt;
&lt;br /&gt;
''Back to the [https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project OWASP ModSecurity Core Rules Set].''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Sub-Project Infos==&lt;br /&gt;
&lt;br /&gt;
* '''Status''': active (January 2016)&lt;br /&gt;
* '''Schedule''': Pull request in &amp;lt;strike&amp;gt;January&amp;lt;/strike&amp;gt;February  2016&lt;br /&gt;
* '''Who''': Christian Folini (dune73), Noël Zindel (zino), Franziska Bühler (franziskabuehler), Manuel Leos (Spartan), Walter Hop (lifeforms)&lt;br /&gt;
* '''Documentation''': Here on the [https://www.owasp.org/index.php/OWASP_ModSec_CRS_Paranoia_Mode OWASP Wiki] / [https://www.netnea.com/cms/2016/02/04/owasp-modsecurity-core-rules-paranoia-mode-mechanics-proposal/ Mechanics Proposal]&lt;br /&gt;
* '''Discussion / Archive''': &amp;lt;tt&amp;gt;owasp-modsecurity-core-rule-set@lists.owasp.org&amp;lt;/tt&amp;gt; / archive: http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/&lt;br /&gt;
* '''Github Link''': https://github.com/SpiderLabs/owasp-modsecurity-crs/tree/v3.0.0-rc1&lt;br /&gt;
* '''Final Pull Request''': FIXME&lt;br /&gt;
&lt;br /&gt;
==Tasks==&lt;br /&gt;
&lt;br /&gt;
===Open Tasks===&lt;br /&gt;
&lt;br /&gt;
Please define state as follows: ''new'', ''assigned'', ''waiting'', ''closed''. When a task it is closed, it is moved to the seperate closed tasks table below.&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''Task'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Who'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | Nail down final list of rules which should be moved / recreated into the paranoia mode&lt;br /&gt;
  | group&lt;br /&gt;
  | assigned&lt;br /&gt;
|-&lt;br /&gt;
  | Write new stricter siblings for existing rules&lt;br /&gt;
  | Noël&lt;br /&gt;
  | assigned&lt;br /&gt;
|-&lt;br /&gt;
  | Define ID-space for strict siblings&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Sort out mechanics of the paranoia mode&lt;br /&gt;
  | Christian&lt;br /&gt;
  | assigned&lt;br /&gt;
|-&lt;br /&gt;
  | Define exact syntax of paranoia mode setup&lt;br /&gt;
  | Christian&lt;br /&gt;
  | waiting&lt;br /&gt;
|-&lt;br /&gt;
  | Sort out name: Is &amp;quot;Paranoia Mode&amp;quot; really the right term?&lt;br /&gt;
  | Christian&lt;br /&gt;
  | waiting&lt;br /&gt;
|-&lt;br /&gt;
  | Write pull request&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Submit pull request&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Draw flowchart&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Write documentation&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Closed Tasks===&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''Task'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Who'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of rules, which triggered false positives in 2.2.X frequently&lt;br /&gt;
  | Christian&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 2.2.x rules, which have disappeared from 3.0.0-rc1&lt;br /&gt;
  | Spartan&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 3.0.0-rc1 rules, which could be accompanied with&amp;lt;br /&amp;gt;stricter siblings in paranoia mode&amp;lt;br /&amp;gt;(same idea of the rule, but harder limit etc.)&lt;br /&gt;
  | Christian&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 3.0.0-rc1 rules, which could be moved to the paranoia mode&lt;br /&gt;
  | Franziska&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of disappeared / missing 2.2.X base_rules, which should be brought back&lt;br /&gt;
  | group&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 2.2.X optional and experimental rules, which should be brought back&lt;br /&gt;
  | group&lt;br /&gt;
  | closed (could be repeated more throughly)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Rules==&lt;br /&gt;
&lt;br /&gt;
===Paranoia Mode Candidates===&lt;br /&gt;
&lt;br /&gt;
The 3.0.0-rc1 has all rules renumbered. Existing numbering was fairly crazy and the new numbering follows the numbering scheme of the rules files (-&amp;gt; 9&amp;lt;2-digit-rulefile&amp;gt;&amp;lt;3-digit-id&amp;gt;)&lt;br /&gt;
A mapping table exists [[https://github.com/SpiderLabs/owasp-modsecurity-crs/blob/v3.0.0-rc1/id_renumbering/IdNumbering.csv IdNumbering.csv]]&lt;br /&gt;
We need to make sure, we do not mess things up, so let's add both IDs to the table, the old one and the new one.&lt;br /&gt;
&lt;br /&gt;
Please set status as follows : ''candidate'', ''cloning-candidate'', ''unsure'', ''dropped''. &lt;br /&gt;
* 'cloning-candidates' are rules, that could be cloned into an even stricter variant with a stricter limit in a higher paranoia setting.&lt;br /&gt;
* If dropped, please provide reasoning in the remarks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''RuleID 2.2.x'''&lt;br /&gt;
  |'''RuleID 3.0.0-rc1'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''msg'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Remarks'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | 900050&lt;br /&gt;
  | 910100&lt;br /&gt;
  | Client IP is from a HIGH Risk Country Location.&lt;br /&gt;
  | unsure&lt;br /&gt;
  | Franziska's candidate: Do we want to exlude countries? But then easy to configure.&lt;br /&gt;
|-&lt;br /&gt;
  | 950001&lt;br /&gt;
  | 942150&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Also Franziska's candidate: @pmf file with very short function names, could match frequently.&lt;br /&gt;
|-&lt;br /&gt;
  | 950109&lt;br /&gt;
  | 920230&lt;br /&gt;
  | Multiple URL Encoding Detected&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 950120&lt;br /&gt;
  | 931130&lt;br /&gt;
  | Possible Remote File Inclusion (RFI) Attack: Off-Domain Reference/Link&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Walter's 2.2.X candidate: many FP; Chrstian: hardly any FPs, #discuss&lt;br /&gt;
|-&lt;br /&gt;
  | 960335&lt;br /&gt;
  | 920380&lt;br /&gt;
  | Too many arguments in request&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Walter's 2.2.X candidate: some FP (phpMyAdmin, large forms), alternatively would recommend raising &amp;lt;code&amp;gt;tx.max_num_args&amp;lt;/code&amp;gt; to 1000&lt;br /&gt;
|-&lt;br /&gt;
  | 950901&lt;br /&gt;
  | 942130&lt;br /&gt;
  | SQL Injection Attack: SQL Tautology Detected.&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Also Franziska's candidate: legitimate sentences could match. Walter's 2.2.x experience: many FP in natural text however the rule seems to have merit&lt;br /&gt;
|-&lt;br /&gt;
  | 950907&lt;br /&gt;
  | 932100&lt;br /&gt;
  | System Command Injection&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Also Franziska's candidate: false positives possible because of @pmf, file with short cmds. Maybe we should split the data file #discuss &lt;br /&gt;
|-&lt;br /&gt;
  | 950916&lt;br /&gt;
  | 921170&lt;br /&gt;
  | HTTP Header Injection Attack via payload (CR/LF detected)&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Franziska's candidate: change action from pass to block and move to paranoia mode.&lt;br /&gt;
|-&lt;br /&gt;
  | 958977&lt;br /&gt;
  | 933110&lt;br /&gt;
  | PHP Injection Attack: Function Name Found&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Franziska's candidate: false positives possible because of @pmf, file with short function names. Maybe we should split the data file #discuss &lt;br /&gt;
|-&lt;br /&gt;
  | 958979&lt;br /&gt;
  | 933120&lt;br /&gt;
  | PHP Injection Attack: Configuration Directive Found&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Franziska's candidate: false positives possible because of @pmf, file with short configuration directives.&lt;br /&gt;
|-&lt;br /&gt;
  | 959070&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 959071&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 959072&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 959073&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 960015&lt;br /&gt;
  | 920300&lt;br /&gt;
  | Request Missing an Accept Header&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Also Franziska's candidate: Not every legitimate client behaves correctly. Walter's experience: many FP (PHP SoapClient)&lt;br /&gt;
|-&lt;br /&gt;
  | 960017&lt;br /&gt;
  | 920350&lt;br /&gt;
  | Host header is a numeric IP address&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Also Franziska's candidate: Not every legitimate client behaves correctly. Walter's experience: low FP (almost all are mass scans) #discuss&lt;br /&gt;
|-&lt;br /&gt;
  | 960024&lt;br /&gt;
  | gone  &lt;br /&gt;
  | Meta-Character Anomaly Detection Alert - Repetative Non-Word Characters&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 960035&lt;br /&gt;
  | 920440&lt;br /&gt;
  | URL file extension is restricted by policy&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 970901&lt;br /&gt;
  | 950100&lt;br /&gt;
  | The Application Returned a 500-Level Status Code&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Franziska's candidate: too strict, too generic, no data leakage happened so far. Walter: it's useful however to prevent attacker from distinguishing between a failed SQLi attempt (403 blocked by ModSec) or a query error due to vulnerable app (500 from application) #discuss&lt;br /&gt;
|-&lt;br /&gt;
  | 973300&lt;br /&gt;
  | gone  &lt;br /&gt;
  | Possible XSS Attack Detected - HTML Tag Handler&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP&lt;br /&gt;
|-&lt;br /&gt;
  | 973332&lt;br /&gt;
  | gone  &lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP&lt;br /&gt;
|-&lt;br /&gt;
  | 973333&lt;br /&gt;
  | gone  &lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981172&lt;br /&gt;
  | gone  &lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: very high FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981173&lt;br /&gt;
  | gone  &lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: very high FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981231&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Comment Sequence Detected.&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: high FP but rule seems useful&lt;br /&gt;
|-&lt;br /&gt;
  | 981240&lt;br /&gt;
  | 942300&lt;br /&gt;
  | Detects MySQL comments, conditions and ch(a)r injections&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981242&lt;br /&gt;
  | 942330&lt;br /&gt;
  | Detects classic SQL injection probings 1/2&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Also Franziska's candidate: one quote character already matches?? Walter: low FP, but seen in cookies injected by some US ISPs; &lt;br /&gt;
|-&lt;br /&gt;
  | 981243&lt;br /&gt;
  | 942370&lt;br /&gt;
  | Detects classic SQL injection probings 2/2&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981244&lt;br /&gt;
  | 942180&lt;br /&gt;
  | Detects basic SQL authentication bypass attempts 1/3&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP, #discuss&lt;br /&gt;
|-&lt;br /&gt;
  | 981245&lt;br /&gt;
  | 942260&lt;br /&gt;
  | Detects basic SQL authentication bypass attempts 2/3&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981246&lt;br /&gt;
  | 942340&lt;br /&gt;
  | Detects basic SQL authentication bypass attempts 3/3&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981248&lt;br /&gt;
  | 942210&lt;br /&gt;
  | Detects chained SQL injection attempts 1/2&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: low FP, #discuss&lt;br /&gt;
|-&lt;br /&gt;
  | 981249&lt;br /&gt;
  | 942310&lt;br /&gt;
  | Detects chained SQL injection attempts 2/2&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP but seen in very specific situations&lt;br /&gt;
|-&lt;br /&gt;
  | 981257&lt;br /&gt;
  | 942200&lt;br /&gt;
  | Detects MySQL comment-/space-obfuscated injections and backtick termination&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981260&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Hex Encoding Identified&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: high FP in long random strings&lt;br /&gt;
|-&lt;br /&gt;
  | 981318&lt;br /&gt;
  | 942110&lt;br /&gt;
  | SQL Injection Attack: Common Injection Testing Detected&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Franziska's candidate: one quote character at the beginning/end really not legitimate? Walter 2.2.X candidate: frequent FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981319&lt;br /&gt;
  | 942120&lt;br /&gt;
  | SQL Injection Attack: SQL Operator Detected&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Also Franziska's candidate: very short operators or strings already match. Walter: some FP (WooCommerce)&lt;br /&gt;
|-&lt;br /&gt;
  | 981049&lt;br /&gt;
  | 912100&lt;br /&gt;
  | Potential Denial of Service (DoS) Attack from ... - # of Request Bursts: ...	   &lt;br /&gt;
  | cloning-candidate	&lt;br /&gt;
  | limit currently at 2; could be set to 1; now, the attacker has to exceed dos_counter_threshold twice. With full reset of counter after first hit. Source: 2.2.X-&amp;gt;experimental rules&lt;br /&gt;
|-&lt;br /&gt;
  | 960901          &lt;br /&gt;
  | 920270			&lt;br /&gt;
  | Invalid character in request&lt;br /&gt;
  | cloning-candidate	&lt;br /&gt;
  | @validateByteRange 1-255; there was a conditional rule with stricter byterange 32-126 in 2.2.X as well&lt;br /&gt;
|-&lt;br /&gt;
  | 970003          &lt;br /&gt;
  | 951100			&lt;br /&gt;
  | none					   					   &lt;br /&gt;
  | cloning-candidate	&lt;br /&gt;
  | rule is only setting tx.sql_error_match. Could also trigger score directly&lt;br /&gt;
|-&lt;br /&gt;
  | 950907          &lt;br /&gt;
  | 932100			&lt;br /&gt;
  | Remote Command Execution (RCE) Attempt					   	   &lt;br /&gt;
  | cloning-candidate	&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 958977          &lt;br /&gt;
  | 933110			&lt;br /&gt;
  | PHP Injection Attack: Function Name Found					    &lt;br /&gt;
  | cloning-candidate&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 958979          &lt;br /&gt;
  | 933120			&lt;br /&gt;
  | PHP Injection Attack: Configuration Directive Found				    &lt;br /&gt;
  | cloning-candidate&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 958980          &lt;br /&gt;
  | 933130			&lt;br /&gt;
  | PHP Injection Attack: Variables Found					   	    &lt;br /&gt;
  | cloning-candidate&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 950001          &lt;br /&gt;
  | 942150			&lt;br /&gt;
  | SQL Injection Attack					   			    &lt;br /&gt;
  | cloning-candidate&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Rules from 2.2.X, missing in 3.0.0-rc1===&lt;br /&gt;
&lt;br /&gt;
It looks as if only the base_rules made it into 3.0.0. In fact there are a few rule ids know from the optional and experimental rule folders in 2.2.X, but it is more likely, these are new 3.0.0 rules reusing old rule ids as the rules (regexes and msg) do not match at all.&lt;br /&gt;
&lt;br /&gt;
When trying to generate the list below, be aware that the rule ids have been renumbered between 3.0.0-dev and 3.0.0-rc1. IdNumbering.csv in your friend.&lt;br /&gt;
&lt;br /&gt;
====Base rules====&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''2.2.X rule id'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''msg'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''remarks'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | 950002&lt;br /&gt;
  | System Command Access&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950006&lt;br /&gt;
  | System Command Injection&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950007&lt;br /&gt;
  | Blind SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950008&lt;br /&gt;
  | Injection of Undocumented ColdFusion Tags&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950010&lt;br /&gt;
  | LDAP Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950011&lt;br /&gt;
  | SSI injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950018&lt;br /&gt;
  | Universal PDF XSS URL Detected.&lt;br /&gt;
  | Walter: medium FP (foo.pdf#javascript)&lt;br /&gt;
|-&lt;br /&gt;
  | 950019&lt;br /&gt;
  | Email Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950908&lt;br /&gt;
  | SQL Injection Attack.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950921&lt;br /&gt;
  | Backdoor access&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950922&lt;br /&gt;
  | Backdoor access&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958000&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958001&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958002&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958003&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958004&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958005&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958006&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958007&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958008&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958009&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958010&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958011&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958012&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958013&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958016&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958017&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958018&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958019&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958020&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958022&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958023&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958024&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958025&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958026&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958027&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958028&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958030&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958031&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958032&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958033&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958034&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958036&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958037&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958038&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958039&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958040&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958041&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958045&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958046&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958047&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958049&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958051&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958052&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958054&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958056&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958057&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958059&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958291&lt;br /&gt;
  | Range: field exists and begins with 0.&lt;br /&gt;
  | Walter: high FP (Chrome PDF viewer) and not useful.&lt;br /&gt;
|-&lt;br /&gt;
  | 958404&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958405&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958406&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958407&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958408&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958409&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958410&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958411&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958412&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958413&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958414&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958415&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958416&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958417&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958418&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958419&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958420&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958421&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958422&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958423&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958976&lt;br /&gt;
  | PHP Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959070&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959071&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959072&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959073&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960014&lt;br /&gt;
  | Proxy access attempt&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960018&lt;br /&gt;
  | Invalid character in request&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960020&lt;br /&gt;
  | Pragma Header requires Cache-Control Header for HTTP/1.1 requests.&lt;br /&gt;
  | Walter: some FP&lt;br /&gt;
|-&lt;br /&gt;
  | 960022&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960024&lt;br /&gt;
  | Meta-Character Anomaly Detection Alert - Repetative Non-Word Characters&lt;br /&gt;
  | Walter: many FP&lt;br /&gt;
|-&lt;br /&gt;
  | 960902&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960913&lt;br /&gt;
  | Invalid request&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970007&lt;br /&gt;
  | Zope Information Leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970008&lt;br /&gt;
  | Cold Fusion Information Leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970010&lt;br /&gt;
  | ISA server existence revealed&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970011&lt;br /&gt;
  | File or Directory Names Leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970012&lt;br /&gt;
  | Microsoft Office document properties leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970016&lt;br /&gt;
  | Cold Fusion source code leakage&lt;br /&gt;
  | Walter: some FP but not using this language&lt;br /&gt;
|-&lt;br /&gt;
  | 970018&lt;br /&gt;
  | IIS installed in default location&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970021&lt;br /&gt;
  | WebLogic information disclosure&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970903&lt;br /&gt;
  | ASP/JSP source code leakage&lt;br /&gt;
  | Walter: some FP but not using this language&lt;br /&gt;
|-&lt;br /&gt;
  | 973300&lt;br /&gt;
  | Possible XSS Attack Detected - HTML Tag Handler&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973301&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973302&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973303&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973304&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973305&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973306&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973307&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973308&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973309&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973310&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973311&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973312&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973313&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973314&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973316&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973325&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973327&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973328&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973329&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973330&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973331&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973332&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973333&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973334&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | Walter: many FP in text&lt;br /&gt;
|-&lt;br /&gt;
  | 973335&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | Walter: many FP in text&lt;br /&gt;
|-&lt;br /&gt;
  | 973347&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981000&lt;br /&gt;
  | Possibly malicious iframe tag in output&lt;br /&gt;
  | Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981001&lt;br /&gt;
  | Possibly malicious iframe tag in output&lt;br /&gt;
  | Walter: medium FP (iframes with display:none)&lt;br /&gt;
|-&lt;br /&gt;
  | 981003&lt;br /&gt;
  | Malicious iframe+javascript tag in output&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981004&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Excessive fromCharCode&lt;br /&gt;
  | Walter: many FP (Wordpress 4.4 inlined emoji javascripts)&lt;br /&gt;
|-&lt;br /&gt;
  | 981005&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Eval+Unescape&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981006&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Unescape&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981007&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Heap Spray&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981018&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981022&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981133&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981134&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981136&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981172&lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | Walter: many FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981173&lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | Walter: many FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981177&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981178&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981231&lt;br /&gt;
  | SQL Comment Sequence Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981260&lt;br /&gt;
  | SQL Hex Encoding Identified&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981300&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981301&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981302&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981303&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981304&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981305&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981306&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981307&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981308&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981309&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981310&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981311&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981312&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981313&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981314&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981315&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981316&lt;br /&gt;
  | SQL SELECT Statement Anomaly Detection Alert&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981317&lt;br /&gt;
  | SQL SELECT Statement Anomaly Detection Alert&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 990012&lt;br /&gt;
  | Rogue web site crawler&lt;br /&gt;
  | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
====Optional, experimental, slr rules====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | 900048&lt;br /&gt;
 | Identifies Reflected XSS (optional_rules)&lt;br /&gt;
 | Walter: could be very interesting candidate but have not used it in production&lt;br /&gt;
|-&lt;br /&gt;
 | 920021, 920022, 920023&lt;br /&gt;
 | Possible Credit Card Track 1 Data Leakage. (experimental_rules)&lt;br /&gt;
 | Walter: could be interesting candidates but have not used it in production&lt;br /&gt;
|-&lt;br /&gt;
 | 981080, 920020, 920006&lt;br /&gt;
 | Detect CC# in output and block transaction (optional_rules)&lt;br /&gt;
 | Walter: could be interesting candidate but have not used it in production&lt;br /&gt;
|-&lt;br /&gt;
 | 900047, 900048, 981180, 981182&lt;br /&gt;
 | Identifies Stored XSS (optional_rules)&lt;br /&gt;
 | Walter: could be somewhat interesting candidate but have not used it in production&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Stricter siblings for existing rules ===&lt;br /&gt;
&lt;br /&gt;
Stricter Siblings are rules that are present in the CRS but could be accompanied by a stricter clone in Paranoia Mode. Adjustments can differ from rule to rule but include higher anomaly ratings or stricter triggers (e.g. regex counters). To prevent masses of false positives, rules can come with additional filters (chained rules) for common use-cases. These can either be included into Paranoia Mode or simply serve as a recommendation.&lt;br /&gt;
&lt;br /&gt;
Note: To avoid a cluttered project main-page, rule proposals are documented in their respective sub-page. When adding new proposals, make sure adding the rules original (2.2.x) ID, a quick description of what changes were made, and, if applicable, which additional filters were added.&lt;br /&gt;
&lt;br /&gt;
'''Possible siblings:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981049|981049 : Potential Denial of Service (DoS)]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981172|981172 : SQL Injection Character Anomaly Usage]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981173|981173 : SQL Injection Character Anomaly Usage]]&lt;br /&gt;
&lt;br /&gt;
==Project Status==&lt;br /&gt;
&lt;br /&gt;
===Project Status January 30, 2016===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
Hello everybody,&lt;br /&gt;
&lt;br /&gt;
It's time to do a status report of our little core rules project.&lt;br /&gt;
&lt;br /&gt;
I am including Franziska Bühler and Walter Hop in this status mail.&lt;br /&gt;
Both are experienced ModSec sysadmins. Franziska contributed to this&lt;br /&gt;
first stage, Walter told me he does not have much time, but he&lt;br /&gt;
was interested in participating at least in the discussions about&lt;br /&gt;
the rules.&lt;br /&gt;
&lt;br /&gt;
All in all, this is taking more time than anticipated. But we&lt;br /&gt;
have also done things very throughly than I thought. Which is&lt;br /&gt;
generally a good thing.&lt;br /&gt;
&lt;br /&gt;
Done so far:&lt;br /&gt;
* Manuel has provided us with a list of rules removed between 2.2.x and 3.0.0rc1&lt;br /&gt;
* I have assembled a list of rules known to trigger false positives frequently in the 2.2.x ruleset, they are thus candidates for the paranoia mode&lt;br /&gt;
* Franziska has looked through the 3.0.0rc1 rules and identified a set of rules which look like good candidates.&lt;br /&gt;
* Noël has sharpened his skills by re-writing 981173 in a way that ignores innocent UUIDs. In my eyes, he found a very elegant solution.&lt;br /&gt;
* With the development of 3.0.0-dev, Chaim unfortunately reused rule ids formerly used with optional and experimental rules. Now this has all been renumbered. I have pointed this out in the mailinglist and had private contact with Chaim where he confirmed the fact - and promised to resolve the issue.&lt;br /&gt;
&lt;br /&gt;
We have not really looked at the disappeared rules and identified those&lt;br /&gt;
who should be brought back and have not been picked so far. This&lt;br /&gt;
includes the 2.2.X base_rules, but also the optional, experimental,&lt;br /&gt;
and huge stock of slr rules. Of these three groups, only the&lt;br /&gt;
anti-ddos rules have made it into 3.0.0. There are probably more&lt;br /&gt;
interesting candidates.&lt;br /&gt;
&lt;br /&gt;
If somebody among you wants to look into these, then that would be&lt;br /&gt;
welcome, but I do not want to have these tasks delay us any further.&lt;br /&gt;
After all, Old rules can also be brought back in subsequent releases&lt;br /&gt;
if we see a benefit.&lt;br /&gt;
&lt;br /&gt;
So the next real tasks are:&lt;br /&gt;
* Looking through the list of candidates and cloning-candidates (the latter are those rules we might accompany with a clone with stricter limits in paranoia mode).&lt;br /&gt;
* Defining the exact working of the paranoia mode.&lt;br /&gt;
&lt;br /&gt;
Please sit down and look through the rule lists in the wiki and add&lt;br /&gt;
remarks with regards to the candidate rules. If you think a rule&lt;br /&gt;
should be included, if you think an individual rule should not be&lt;br /&gt;
included etc.&lt;br /&gt;
&lt;br /&gt;
I am also going to invite the people on the mailinglist to take look at&lt;br /&gt;
the rules as well and add their remarks in the wiki (or respond via mail).&lt;br /&gt;
This should allow us to nail down the list of rules which will&lt;br /&gt;
actually be included in the paranoia mode.&lt;br /&gt;
&lt;br /&gt;
As for defining the exact working of the paranoia mode, I guess I&lt;br /&gt;
need to write down the idea I have in mind and see if it makes sense to&lt;br /&gt;
you.&lt;br /&gt;
&lt;br /&gt;
Thank you for contributing so far! It is a lot of fun to work in a team!&lt;br /&gt;
&lt;br /&gt;
Christian&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode&amp;diff=208419</id>
		<title>OWASP ModSec CRS Paranoia Mode</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode&amp;diff=208419"/>
				<updated>2016-02-10T08:16:52Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: /* Stricter siblings for existing rules */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Abstract==&lt;br /&gt;
&lt;br /&gt;
This is a page about the development of a paranoia mode aka bringing back the rules that used to yield a high number of false positives. This little project is aimed at inclusion into the 3.0.0 release of the OWASP ModSecurity Core Rules, where some rules have been removed in order to reduce the number of false positives with vanilla installations.&lt;br /&gt;
&lt;br /&gt;
FIXME: Detailed description&lt;br /&gt;
&lt;br /&gt;
''Back to the [https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project OWASP ModSecurity Core Rules Set].''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Sub-Project Infos==&lt;br /&gt;
&lt;br /&gt;
* '''Status''': active (January 2016)&lt;br /&gt;
* '''Schedule''': Pull request in &amp;lt;strike&amp;gt;January&amp;lt;/strike&amp;gt;February  2016&lt;br /&gt;
* '''Who''': Christian Folini (dune73), Noël Zindel (zino), Franziska Bühler (franziskabuehler), Manuel Leos (Spartan), Walter Hop (lifeforms)&lt;br /&gt;
* '''Documentation''': Here on the [https://www.owasp.org/index.php/OWASP_ModSec_CRS_Paranoia_Mode OWASP Wiki] / [https://www.netnea.com/cms/2016/02/04/owasp-modsecurity-core-rules-paranoia-mode-mechanics-proposal/ Mechanics Proposal]&lt;br /&gt;
* '''Discussion / Archive''': &amp;lt;tt&amp;gt;owasp-modsecurity-core-rule-set@lists.owasp.org&amp;lt;/tt&amp;gt; / archive: http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/&lt;br /&gt;
* '''Github Link''': https://github.com/SpiderLabs/owasp-modsecurity-crs/tree/v3.0.0-rc1&lt;br /&gt;
* '''Final Pull Request''': FIXME&lt;br /&gt;
&lt;br /&gt;
==Tasks==&lt;br /&gt;
&lt;br /&gt;
===Open Tasks===&lt;br /&gt;
&lt;br /&gt;
Please define state as follows: ''new'', ''assigned'', ''waiting'', ''closed''. When a task it is closed, it is moved to the seperate closed tasks table below.&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''Task'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Who'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | Nail down final list of rules which should be moved / recreated into the paranoia mode&lt;br /&gt;
  | group&lt;br /&gt;
  | assigned&lt;br /&gt;
|-&lt;br /&gt;
  | Write new stricter siblings for existing rules&lt;br /&gt;
  | Noël&lt;br /&gt;
  | assigned&lt;br /&gt;
|-&lt;br /&gt;
  | Define ID-space for strict siblings&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Sort out mechanics of the paranoia mode&lt;br /&gt;
  | Christian&lt;br /&gt;
  | assigned&lt;br /&gt;
|-&lt;br /&gt;
  | Define exact syntax of paranoia mode setup&lt;br /&gt;
  | Christian&lt;br /&gt;
  | waiting&lt;br /&gt;
|-&lt;br /&gt;
  | Sort out name: Is &amp;quot;Paranoia Mode&amp;quot; really the right term?&lt;br /&gt;
  | Christian&lt;br /&gt;
  | waiting&lt;br /&gt;
|-&lt;br /&gt;
  | Write pull request&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Submit pull request&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Draw flowchart&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Write documentation&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Closed Tasks===&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''Task'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Who'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of rules, which triggered false positives in 2.2.X frequently&lt;br /&gt;
  | Christian&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 2.2.x rules, which have disappeared from 3.0.0-rc1&lt;br /&gt;
  | Spartan&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 3.0.0-rc1 rules, which could be accompanied with&amp;lt;br /&amp;gt;stricter siblings in paranoia mode&amp;lt;br /&amp;gt;(same idea of the rule, but harder limit etc.)&lt;br /&gt;
  | Christian&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 3.0.0-rc1 rules, which could be moved to the paranoia mode&lt;br /&gt;
  | Franziska&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of disappeared / missing 2.2.X base_rules, which should be brought back&lt;br /&gt;
  | group&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 2.2.X optional and experimental rules, which should be brought back&lt;br /&gt;
  | group&lt;br /&gt;
  | closed (could be repeated more throughly)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Rules==&lt;br /&gt;
&lt;br /&gt;
===Paranoia Mode Candidates===&lt;br /&gt;
&lt;br /&gt;
The 3.0.0-rc1 has all rules renumbered. Existing numbering was fairly crazy and the new numbering follows the numbering scheme of the rules files (-&amp;gt; 9&amp;lt;2-digit-rulefile&amp;gt;&amp;lt;3-digit-id&amp;gt;)&lt;br /&gt;
A mapping table exists [[https://github.com/SpiderLabs/owasp-modsecurity-crs/blob/v3.0.0-rc1/id_renumbering/IdNumbering.csv IdNumbering.csv]]&lt;br /&gt;
We need to make sure, we do not mess things up, so let's add both IDs to the table, the old one and the new one.&lt;br /&gt;
&lt;br /&gt;
Please set status as follows : ''candidate'', ''cloning-candidate'', ''unsure'', ''dropped''. &lt;br /&gt;
* 'cloning-candidates' are rules, that could be cloned into an even stricter variant with a stricter limit in a higher paranoia setting.&lt;br /&gt;
* If dropped, please provide reasoning in the remarks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''RuleID 2.2.x'''&lt;br /&gt;
  |'''RuleID 3.0.0-rc1'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''msg'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Remarks'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | 900050&lt;br /&gt;
  | 910100&lt;br /&gt;
  | Client IP is from a HIGH Risk Country Location.&lt;br /&gt;
  | unsure&lt;br /&gt;
  | Franziska's candidate: Do we want to exlude countries? But then easy to configure.&lt;br /&gt;
|-&lt;br /&gt;
  | 950001&lt;br /&gt;
  | 942150&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Also Franziska's candidate: @pmf file with very short function names, could match frequently.&lt;br /&gt;
|-&lt;br /&gt;
  | 950109&lt;br /&gt;
  | 920230&lt;br /&gt;
  | Multiple URL Encoding Detected&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 950120&lt;br /&gt;
  | 931130&lt;br /&gt;
  | Possible Remote File Inclusion (RFI) Attack: Off-Domain Reference/Link&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Walter's 2.2.X candidate: many FP; Chrstian: hardly any FPs, #discuss&lt;br /&gt;
|-&lt;br /&gt;
  | 960335&lt;br /&gt;
  | 920380&lt;br /&gt;
  | Too many arguments in request&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Walter's 2.2.X candidate: some FP (phpMyAdmin, large forms), alternatively would recommend raising &amp;lt;code&amp;gt;tx.max_num_args&amp;lt;/code&amp;gt; to 1000&lt;br /&gt;
|-&lt;br /&gt;
  | 950901&lt;br /&gt;
  | 942130&lt;br /&gt;
  | SQL Injection Attack: SQL Tautology Detected.&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Also Franziska's candidate: legitimate sentences could match. Walter's 2.2.x experience: many FP in natural text however the rule seems to have merit&lt;br /&gt;
|-&lt;br /&gt;
  | 950907&lt;br /&gt;
  | 932100&lt;br /&gt;
  | System Command Injection&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Also Franziska's candidate: false positives possible because of @pmf, file with short cmds. Maybe we should split the data file #discuss &lt;br /&gt;
|-&lt;br /&gt;
  | 950916&lt;br /&gt;
  | 921170&lt;br /&gt;
  | HTTP Header Injection Attack via payload (CR/LF detected)&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Franziska's candidate: change action from pass to block and move to paranoia mode.&lt;br /&gt;
|-&lt;br /&gt;
  | 958977&lt;br /&gt;
  | 933110&lt;br /&gt;
  | PHP Injection Attack: Function Name Found&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Franziska's candidate: false positives possible because of @pmf, file with short function names. Maybe we should split the data file #discuss &lt;br /&gt;
|-&lt;br /&gt;
  | 958979&lt;br /&gt;
  | 933120&lt;br /&gt;
  | PHP Injection Attack: Configuration Directive Found&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Franziska's candidate: false positives possible because of @pmf, file with short configuration directives.&lt;br /&gt;
|-&lt;br /&gt;
  | 959070&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 959071&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 959072&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 959073&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 960015&lt;br /&gt;
  | 920300&lt;br /&gt;
  | Request Missing an Accept Header&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Also Franziska's candidate: Not every legitimate client behaves correctly. Walter's experience: many FP (PHP SoapClient)&lt;br /&gt;
|-&lt;br /&gt;
  | 960017&lt;br /&gt;
  | 920350&lt;br /&gt;
  | Host header is a numeric IP address&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Also Franziska's candidate: Not every legitimate client behaves correctly. Walter's experience: low FP (almost all are mass scans) #discuss&lt;br /&gt;
|-&lt;br /&gt;
  | 960024&lt;br /&gt;
  | gone  &lt;br /&gt;
  | Meta-Character Anomaly Detection Alert - Repetative Non-Word Characters&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 960035&lt;br /&gt;
  | 920440&lt;br /&gt;
  | URL file extension is restricted by policy&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 970901&lt;br /&gt;
  | 950100&lt;br /&gt;
  | The Application Returned a 500-Level Status Code&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Franziska's candidate: too strict, too generic, no data leakage happened so far. Walter: it's useful however to prevent attacker from distinguishing between a failed SQLi attempt (403 blocked by ModSec) or a query error due to vulnerable app (500 from application) #discuss&lt;br /&gt;
|-&lt;br /&gt;
  | 973300&lt;br /&gt;
  | gone  &lt;br /&gt;
  | Possible XSS Attack Detected - HTML Tag Handler&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP&lt;br /&gt;
|-&lt;br /&gt;
  | 973332&lt;br /&gt;
  | gone  &lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP&lt;br /&gt;
|-&lt;br /&gt;
  | 973333&lt;br /&gt;
  | gone  &lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981172&lt;br /&gt;
  | gone  &lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: very high FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981173&lt;br /&gt;
  | gone  &lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: very high FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981231&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Comment Sequence Detected.&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: high FP but rule seems useful&lt;br /&gt;
|-&lt;br /&gt;
  | 981240&lt;br /&gt;
  | 942300&lt;br /&gt;
  | Detects MySQL comments, conditions and ch(a)r injections&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981242&lt;br /&gt;
  | 942330&lt;br /&gt;
  | Detects classic SQL injection probings 1/2&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Also Franziska's candidate: one quote character already matches?? Walter: low FP, but seen in cookies injected by some US ISPs; &lt;br /&gt;
|-&lt;br /&gt;
  | 981243&lt;br /&gt;
  | 942370&lt;br /&gt;
  | Detects classic SQL injection probings 2/2&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981244&lt;br /&gt;
  | 942180&lt;br /&gt;
  | Detects basic SQL authentication bypass attempts 1/3&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP, #discuss&lt;br /&gt;
|-&lt;br /&gt;
  | 981245&lt;br /&gt;
  | 942260&lt;br /&gt;
  | Detects basic SQL authentication bypass attempts 2/3&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981246&lt;br /&gt;
  | 942340&lt;br /&gt;
  | Detects basic SQL authentication bypass attempts 3/3&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981248&lt;br /&gt;
  | 942210&lt;br /&gt;
  | Detects chained SQL injection attempts 1/2&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: low FP, #discuss&lt;br /&gt;
|-&lt;br /&gt;
  | 981249&lt;br /&gt;
  | 942310&lt;br /&gt;
  | Detects chained SQL injection attempts 2/2&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP but seen in very specific situations&lt;br /&gt;
|-&lt;br /&gt;
  | 981257&lt;br /&gt;
  | 942200&lt;br /&gt;
  | Detects MySQL comment-/space-obfuscated injections and backtick termination&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981260&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Hex Encoding Identified&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: high FP in long random strings&lt;br /&gt;
|-&lt;br /&gt;
  | 981318&lt;br /&gt;
  | 942110&lt;br /&gt;
  | SQL Injection Attack: Common Injection Testing Detected&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Franziska's candidate: one quote character at the beginning/end really not legitimate? Walter 2.2.X candidate: frequent FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981319&lt;br /&gt;
  | 942120&lt;br /&gt;
  | SQL Injection Attack: SQL Operator Detected&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Also Franziska's candidate: very short operators or strings already match. Walter: some FP (WooCommerce)&lt;br /&gt;
|-&lt;br /&gt;
  | 981049&lt;br /&gt;
  | 912100&lt;br /&gt;
  | Potential Denial of Service (DoS) Attack from ... - # of Request Bursts: ...	   &lt;br /&gt;
  | cloning-candidate	&lt;br /&gt;
  | limit currently at 2; could be set to 1; now, the attacker has to exceed dos_counter_threshold twice. With full reset of counter after first hit. Source: 2.2.X-&amp;gt;experimental rules&lt;br /&gt;
|-&lt;br /&gt;
  | 960901          &lt;br /&gt;
  | 920270			&lt;br /&gt;
  | Invalid character in request&lt;br /&gt;
  | cloning-candidate	&lt;br /&gt;
  | @validateByteRange 1-255; there was a conditional rule with stricter byterange 32-126 in 2.2.X as well&lt;br /&gt;
|-&lt;br /&gt;
  | 970003          &lt;br /&gt;
  | 951100			&lt;br /&gt;
  | none					   					   &lt;br /&gt;
  | cloning-candidate	&lt;br /&gt;
  | rule is only setting tx.sql_error_match. Could also trigger score directly&lt;br /&gt;
|-&lt;br /&gt;
  | 950907          &lt;br /&gt;
  | 932100			&lt;br /&gt;
  | Remote Command Execution (RCE) Attempt					   	   &lt;br /&gt;
  | cloning-candidate	&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 958977          &lt;br /&gt;
  | 933110			&lt;br /&gt;
  | PHP Injection Attack: Function Name Found					    &lt;br /&gt;
  | cloning-candidate&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 958979          &lt;br /&gt;
  | 933120			&lt;br /&gt;
  | PHP Injection Attack: Configuration Directive Found				    &lt;br /&gt;
  | cloning-candidate&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 958980          &lt;br /&gt;
  | 933130			&lt;br /&gt;
  | PHP Injection Attack: Variables Found					   	    &lt;br /&gt;
  | cloning-candidate&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 950001          &lt;br /&gt;
  | 942150			&lt;br /&gt;
  | SQL Injection Attack					   			    &lt;br /&gt;
  | cloning-candidate&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Rules from 2.2.X, missing in 3.0.0-rc1===&lt;br /&gt;
&lt;br /&gt;
It looks as if only the base_rules made it into 3.0.0. In fact there are a few rule ids know from the optional and experimental rule folders in 2.2.X, but it is more likely, these are new 3.0.0 rules reusing old rule ids as the rules (regexes and msg) do not match at all.&lt;br /&gt;
&lt;br /&gt;
When trying to generate the list below, be aware that the rule ids have been renumbered between 3.0.0-dev and 3.0.0-rc1. IdNumbering.csv in your friend.&lt;br /&gt;
&lt;br /&gt;
====Base rules====&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''2.2.X rule id'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''msg'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''remarks'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | 950002&lt;br /&gt;
  | System Command Access&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950006&lt;br /&gt;
  | System Command Injection&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950007&lt;br /&gt;
  | Blind SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950008&lt;br /&gt;
  | Injection of Undocumented ColdFusion Tags&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950010&lt;br /&gt;
  | LDAP Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950011&lt;br /&gt;
  | SSI injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950018&lt;br /&gt;
  | Universal PDF XSS URL Detected.&lt;br /&gt;
  | Walter: medium FP (foo.pdf#javascript)&lt;br /&gt;
|-&lt;br /&gt;
  | 950019&lt;br /&gt;
  | Email Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950908&lt;br /&gt;
  | SQL Injection Attack.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950921&lt;br /&gt;
  | Backdoor access&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950922&lt;br /&gt;
  | Backdoor access&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958000&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958001&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958002&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958003&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958004&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958005&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958006&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958007&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958008&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958009&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958010&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958011&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958012&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958013&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958016&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958017&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958018&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958019&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958020&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958022&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958023&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958024&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958025&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958026&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958027&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958028&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958030&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958031&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958032&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958033&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958034&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958036&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958037&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958038&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958039&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958040&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958041&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958045&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958046&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958047&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958049&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958051&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958052&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958054&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958056&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958057&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958059&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958291&lt;br /&gt;
  | Range: field exists and begins with 0.&lt;br /&gt;
  | Walter: high FP (Chrome PDF viewer) and not useful.&lt;br /&gt;
|-&lt;br /&gt;
  | 958404&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958405&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958406&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958407&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958408&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958409&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958410&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958411&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958412&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958413&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958414&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958415&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958416&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958417&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958418&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958419&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958420&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958421&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958422&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958423&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958976&lt;br /&gt;
  | PHP Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959070&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959071&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959072&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959073&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960014&lt;br /&gt;
  | Proxy access attempt&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960018&lt;br /&gt;
  | Invalid character in request&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960020&lt;br /&gt;
  | Pragma Header requires Cache-Control Header for HTTP/1.1 requests.&lt;br /&gt;
  | Walter: some FP&lt;br /&gt;
|-&lt;br /&gt;
  | 960022&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960024&lt;br /&gt;
  | Meta-Character Anomaly Detection Alert - Repetative Non-Word Characters&lt;br /&gt;
  | Walter: many FP&lt;br /&gt;
|-&lt;br /&gt;
  | 960902&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960913&lt;br /&gt;
  | Invalid request&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970007&lt;br /&gt;
  | Zope Information Leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970008&lt;br /&gt;
  | Cold Fusion Information Leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970010&lt;br /&gt;
  | ISA server existence revealed&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970011&lt;br /&gt;
  | File or Directory Names Leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970012&lt;br /&gt;
  | Microsoft Office document properties leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970016&lt;br /&gt;
  | Cold Fusion source code leakage&lt;br /&gt;
  | Walter: some FP but not using this language&lt;br /&gt;
|-&lt;br /&gt;
  | 970018&lt;br /&gt;
  | IIS installed in default location&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970021&lt;br /&gt;
  | WebLogic information disclosure&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970903&lt;br /&gt;
  | ASP/JSP source code leakage&lt;br /&gt;
  | Walter: some FP but not using this language&lt;br /&gt;
|-&lt;br /&gt;
  | 973300&lt;br /&gt;
  | Possible XSS Attack Detected - HTML Tag Handler&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973301&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973302&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973303&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973304&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973305&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973306&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973307&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973308&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973309&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973310&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973311&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973312&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973313&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973314&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973316&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973325&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973327&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973328&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973329&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973330&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973331&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973332&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973333&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973334&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | Walter: many FP in text&lt;br /&gt;
|-&lt;br /&gt;
  | 973335&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | Walter: many FP in text&lt;br /&gt;
|-&lt;br /&gt;
  | 973347&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981000&lt;br /&gt;
  | Possibly malicious iframe tag in output&lt;br /&gt;
  | Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981001&lt;br /&gt;
  | Possibly malicious iframe tag in output&lt;br /&gt;
  | Walter: medium FP (iframes with display:none)&lt;br /&gt;
|-&lt;br /&gt;
  | 981003&lt;br /&gt;
  | Malicious iframe+javascript tag in output&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981004&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Excessive fromCharCode&lt;br /&gt;
  | Walter: many FP (Wordpress 4.4 inlined emoji javascripts)&lt;br /&gt;
|-&lt;br /&gt;
  | 981005&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Eval+Unescape&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981006&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Unescape&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981007&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Heap Spray&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981018&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981022&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981133&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981134&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981136&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981172&lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | Walter: many FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981173&lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | Walter: many FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981177&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981178&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981231&lt;br /&gt;
  | SQL Comment Sequence Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981260&lt;br /&gt;
  | SQL Hex Encoding Identified&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981300&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981301&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981302&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981303&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981304&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981305&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981306&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981307&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981308&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981309&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981310&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981311&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981312&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981313&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981314&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981315&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981316&lt;br /&gt;
  | SQL SELECT Statement Anomaly Detection Alert&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981317&lt;br /&gt;
  | SQL SELECT Statement Anomaly Detection Alert&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 990012&lt;br /&gt;
  | Rogue web site crawler&lt;br /&gt;
  | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
====Optional, experimental, slr rules====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | 900048&lt;br /&gt;
 | Identifies Reflected XSS (optional_rules)&lt;br /&gt;
 | Walter: could be very interesting candidate but have not used it in production&lt;br /&gt;
|-&lt;br /&gt;
 | 920021, 920022, 920023&lt;br /&gt;
 | Possible Credit Card Track 1 Data Leakage. (experimental_rules)&lt;br /&gt;
 | Walter: could be interesting candidates but have not used it in production&lt;br /&gt;
|-&lt;br /&gt;
 | 981080, 920020, 920006&lt;br /&gt;
 | Detect CC# in output and block transaction (optional_rules)&lt;br /&gt;
 | Walter: could be interesting candidate but have not used it in production&lt;br /&gt;
|-&lt;br /&gt;
 | 900047, 900048, 981180, 981182&lt;br /&gt;
 | Identifies Stored XSS (optional_rules)&lt;br /&gt;
 | Walter: could be somewhat interesting candidate but have not used it in production&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Stricter siblings for existing rules ===&lt;br /&gt;
&lt;br /&gt;
Stricter Siblings are rules that are present in the CRS but could be accompanied by a stricter clone in Paranoia Mode. Adjustments can differ from rule to rule but include higher anomaly ratings or stricter triggers (e.g. regex counters). To prevent masses of false positives, rules can come with additional filters (chained rules) for common use-cases. These can either be included into Paranoia Mode or simply serve as a recommendation.&lt;br /&gt;
&lt;br /&gt;
Note: To avoid a cluttered project main-page, rule proposals are documented in their respective sub-page. When adding new proposals, make sure adding the rules original (2.2.x) ID, a quick description of what changes were made, and, if applicable, which additional filters were added.&lt;br /&gt;
&lt;br /&gt;
'''Possible siblings:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981049|981049 : SQL Injection Character Anomaly Usage]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981172|981172 : SQL Injection Character Anomaly Usage]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981173|981173 : SQL Injection Character Anomaly Usage]]&lt;br /&gt;
&lt;br /&gt;
==Project Status==&lt;br /&gt;
&lt;br /&gt;
===Project Status January 30, 2016===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
Hello everybody,&lt;br /&gt;
&lt;br /&gt;
It's time to do a status report of our little core rules project.&lt;br /&gt;
&lt;br /&gt;
I am including Franziska Bühler and Walter Hop in this status mail.&lt;br /&gt;
Both are experienced ModSec sysadmins. Franziska contributed to this&lt;br /&gt;
first stage, Walter told me he does not have much time, but he&lt;br /&gt;
was interested in participating at least in the discussions about&lt;br /&gt;
the rules.&lt;br /&gt;
&lt;br /&gt;
All in all, this is taking more time than anticipated. But we&lt;br /&gt;
have also done things very throughly than I thought. Which is&lt;br /&gt;
generally a good thing.&lt;br /&gt;
&lt;br /&gt;
Done so far:&lt;br /&gt;
* Manuel has provided us with a list of rules removed between 2.2.x and 3.0.0rc1&lt;br /&gt;
* I have assembled a list of rules known to trigger false positives frequently in the 2.2.x ruleset, they are thus candidates for the paranoia mode&lt;br /&gt;
* Franziska has looked through the 3.0.0rc1 rules and identified a set of rules which look like good candidates.&lt;br /&gt;
* Noël has sharpened his skills by re-writing 981173 in a way that ignores innocent UUIDs. In my eyes, he found a very elegant solution.&lt;br /&gt;
* With the development of 3.0.0-dev, Chaim unfortunately reused rule ids formerly used with optional and experimental rules. Now this has all been renumbered. I have pointed this out in the mailinglist and had private contact with Chaim where he confirmed the fact - and promised to resolve the issue.&lt;br /&gt;
&lt;br /&gt;
We have not really looked at the disappeared rules and identified those&lt;br /&gt;
who should be brought back and have not been picked so far. This&lt;br /&gt;
includes the 2.2.X base_rules, but also the optional, experimental,&lt;br /&gt;
and huge stock of slr rules. Of these three groups, only the&lt;br /&gt;
anti-ddos rules have made it into 3.0.0. There are probably more&lt;br /&gt;
interesting candidates.&lt;br /&gt;
&lt;br /&gt;
If somebody among you wants to look into these, then that would be&lt;br /&gt;
welcome, but I do not want to have these tasks delay us any further.&lt;br /&gt;
After all, Old rules can also be brought back in subsequent releases&lt;br /&gt;
if we see a benefit.&lt;br /&gt;
&lt;br /&gt;
So the next real tasks are:&lt;br /&gt;
* Looking through the list of candidates and cloning-candidates (the latter are those rules we might accompany with a clone with stricter limits in paranoia mode).&lt;br /&gt;
* Defining the exact working of the paranoia mode.&lt;br /&gt;
&lt;br /&gt;
Please sit down and look through the rule lists in the wiki and add&lt;br /&gt;
remarks with regards to the candidate rules. If you think a rule&lt;br /&gt;
should be included, if you think an individual rule should not be&lt;br /&gt;
included etc.&lt;br /&gt;
&lt;br /&gt;
I am also going to invite the people on the mailinglist to take look at&lt;br /&gt;
the rules as well and add their remarks in the wiki (or respond via mail).&lt;br /&gt;
This should allow us to nail down the list of rules which will&lt;br /&gt;
actually be included in the paranoia mode.&lt;br /&gt;
&lt;br /&gt;
As for defining the exact working of the paranoia mode, I guess I&lt;br /&gt;
need to write down the idea I have in mind and see if it makes sense to&lt;br /&gt;
you.&lt;br /&gt;
&lt;br /&gt;
Thank you for contributing so far! It is a lot of fun to work in a team!&lt;br /&gt;
&lt;br /&gt;
Christian&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode&amp;diff=208418</id>
		<title>OWASP ModSec CRS Paranoia Mode</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode&amp;diff=208418"/>
				<updated>2016-02-10T08:16:21Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: /* Stricter siblings for existing rules */ added two more cloning candidates&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Abstract==&lt;br /&gt;
&lt;br /&gt;
This is a page about the development of a paranoia mode aka bringing back the rules that used to yield a high number of false positives. This little project is aimed at inclusion into the 3.0.0 release of the OWASP ModSecurity Core Rules, where some rules have been removed in order to reduce the number of false positives with vanilla installations.&lt;br /&gt;
&lt;br /&gt;
FIXME: Detailed description&lt;br /&gt;
&lt;br /&gt;
''Back to the [https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project OWASP ModSecurity Core Rules Set].''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Sub-Project Infos==&lt;br /&gt;
&lt;br /&gt;
* '''Status''': active (January 2016)&lt;br /&gt;
* '''Schedule''': Pull request in &amp;lt;strike&amp;gt;January&amp;lt;/strike&amp;gt;February  2016&lt;br /&gt;
* '''Who''': Christian Folini (dune73), Noël Zindel (zino), Franziska Bühler (franziskabuehler), Manuel Leos (Spartan), Walter Hop (lifeforms)&lt;br /&gt;
* '''Documentation''': Here on the [https://www.owasp.org/index.php/OWASP_ModSec_CRS_Paranoia_Mode OWASP Wiki] / [https://www.netnea.com/cms/2016/02/04/owasp-modsecurity-core-rules-paranoia-mode-mechanics-proposal/ Mechanics Proposal]&lt;br /&gt;
* '''Discussion / Archive''': &amp;lt;tt&amp;gt;owasp-modsecurity-core-rule-set@lists.owasp.org&amp;lt;/tt&amp;gt; / archive: http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/&lt;br /&gt;
* '''Github Link''': https://github.com/SpiderLabs/owasp-modsecurity-crs/tree/v3.0.0-rc1&lt;br /&gt;
* '''Final Pull Request''': FIXME&lt;br /&gt;
&lt;br /&gt;
==Tasks==&lt;br /&gt;
&lt;br /&gt;
===Open Tasks===&lt;br /&gt;
&lt;br /&gt;
Please define state as follows: ''new'', ''assigned'', ''waiting'', ''closed''. When a task it is closed, it is moved to the seperate closed tasks table below.&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''Task'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Who'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | Nail down final list of rules which should be moved / recreated into the paranoia mode&lt;br /&gt;
  | group&lt;br /&gt;
  | assigned&lt;br /&gt;
|-&lt;br /&gt;
  | Write new stricter siblings for existing rules&lt;br /&gt;
  | Noël&lt;br /&gt;
  | assigned&lt;br /&gt;
|-&lt;br /&gt;
  | Define ID-space for strict siblings&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Sort out mechanics of the paranoia mode&lt;br /&gt;
  | Christian&lt;br /&gt;
  | assigned&lt;br /&gt;
|-&lt;br /&gt;
  | Define exact syntax of paranoia mode setup&lt;br /&gt;
  | Christian&lt;br /&gt;
  | waiting&lt;br /&gt;
|-&lt;br /&gt;
  | Sort out name: Is &amp;quot;Paranoia Mode&amp;quot; really the right term?&lt;br /&gt;
  | Christian&lt;br /&gt;
  | waiting&lt;br /&gt;
|-&lt;br /&gt;
  | Write pull request&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Submit pull request&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Draw flowchart&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Write documentation&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Closed Tasks===&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''Task'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Who'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of rules, which triggered false positives in 2.2.X frequently&lt;br /&gt;
  | Christian&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 2.2.x rules, which have disappeared from 3.0.0-rc1&lt;br /&gt;
  | Spartan&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 3.0.0-rc1 rules, which could be accompanied with&amp;lt;br /&amp;gt;stricter siblings in paranoia mode&amp;lt;br /&amp;gt;(same idea of the rule, but harder limit etc.)&lt;br /&gt;
  | Christian&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 3.0.0-rc1 rules, which could be moved to the paranoia mode&lt;br /&gt;
  | Franziska&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of disappeared / missing 2.2.X base_rules, which should be brought back&lt;br /&gt;
  | group&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 2.2.X optional and experimental rules, which should be brought back&lt;br /&gt;
  | group&lt;br /&gt;
  | closed (could be repeated more throughly)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Rules==&lt;br /&gt;
&lt;br /&gt;
===Paranoia Mode Candidates===&lt;br /&gt;
&lt;br /&gt;
The 3.0.0-rc1 has all rules renumbered. Existing numbering was fairly crazy and the new numbering follows the numbering scheme of the rules files (-&amp;gt; 9&amp;lt;2-digit-rulefile&amp;gt;&amp;lt;3-digit-id&amp;gt;)&lt;br /&gt;
A mapping table exists [[https://github.com/SpiderLabs/owasp-modsecurity-crs/blob/v3.0.0-rc1/id_renumbering/IdNumbering.csv IdNumbering.csv]]&lt;br /&gt;
We need to make sure, we do not mess things up, so let's add both IDs to the table, the old one and the new one.&lt;br /&gt;
&lt;br /&gt;
Please set status as follows : ''candidate'', ''cloning-candidate'', ''unsure'', ''dropped''. &lt;br /&gt;
* 'cloning-candidates' are rules, that could be cloned into an even stricter variant with a stricter limit in a higher paranoia setting.&lt;br /&gt;
* If dropped, please provide reasoning in the remarks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''RuleID 2.2.x'''&lt;br /&gt;
  |'''RuleID 3.0.0-rc1'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''msg'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Remarks'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | 900050&lt;br /&gt;
  | 910100&lt;br /&gt;
  | Client IP is from a HIGH Risk Country Location.&lt;br /&gt;
  | unsure&lt;br /&gt;
  | Franziska's candidate: Do we want to exlude countries? But then easy to configure.&lt;br /&gt;
|-&lt;br /&gt;
  | 950001&lt;br /&gt;
  | 942150&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Also Franziska's candidate: @pmf file with very short function names, could match frequently.&lt;br /&gt;
|-&lt;br /&gt;
  | 950109&lt;br /&gt;
  | 920230&lt;br /&gt;
  | Multiple URL Encoding Detected&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 950120&lt;br /&gt;
  | 931130&lt;br /&gt;
  | Possible Remote File Inclusion (RFI) Attack: Off-Domain Reference/Link&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Walter's 2.2.X candidate: many FP; Chrstian: hardly any FPs, #discuss&lt;br /&gt;
|-&lt;br /&gt;
  | 960335&lt;br /&gt;
  | 920380&lt;br /&gt;
  | Too many arguments in request&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Walter's 2.2.X candidate: some FP (phpMyAdmin, large forms), alternatively would recommend raising &amp;lt;code&amp;gt;tx.max_num_args&amp;lt;/code&amp;gt; to 1000&lt;br /&gt;
|-&lt;br /&gt;
  | 950901&lt;br /&gt;
  | 942130&lt;br /&gt;
  | SQL Injection Attack: SQL Tautology Detected.&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Also Franziska's candidate: legitimate sentences could match. Walter's 2.2.x experience: many FP in natural text however the rule seems to have merit&lt;br /&gt;
|-&lt;br /&gt;
  | 950907&lt;br /&gt;
  | 932100&lt;br /&gt;
  | System Command Injection&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Also Franziska's candidate: false positives possible because of @pmf, file with short cmds. Maybe we should split the data file #discuss &lt;br /&gt;
|-&lt;br /&gt;
  | 950916&lt;br /&gt;
  | 921170&lt;br /&gt;
  | HTTP Header Injection Attack via payload (CR/LF detected)&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Franziska's candidate: change action from pass to block and move to paranoia mode.&lt;br /&gt;
|-&lt;br /&gt;
  | 958977&lt;br /&gt;
  | 933110&lt;br /&gt;
  | PHP Injection Attack: Function Name Found&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Franziska's candidate: false positives possible because of @pmf, file with short function names. Maybe we should split the data file #discuss &lt;br /&gt;
|-&lt;br /&gt;
  | 958979&lt;br /&gt;
  | 933120&lt;br /&gt;
  | PHP Injection Attack: Configuration Directive Found&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Franziska's candidate: false positives possible because of @pmf, file with short configuration directives.&lt;br /&gt;
|-&lt;br /&gt;
  | 959070&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 959071&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 959072&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 959073&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 960015&lt;br /&gt;
  | 920300&lt;br /&gt;
  | Request Missing an Accept Header&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Also Franziska's candidate: Not every legitimate client behaves correctly. Walter's experience: many FP (PHP SoapClient)&lt;br /&gt;
|-&lt;br /&gt;
  | 960017&lt;br /&gt;
  | 920350&lt;br /&gt;
  | Host header is a numeric IP address&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Also Franziska's candidate: Not every legitimate client behaves correctly. Walter's experience: low FP (almost all are mass scans) #discuss&lt;br /&gt;
|-&lt;br /&gt;
  | 960024&lt;br /&gt;
  | gone  &lt;br /&gt;
  | Meta-Character Anomaly Detection Alert - Repetative Non-Word Characters&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 960035&lt;br /&gt;
  | 920440&lt;br /&gt;
  | URL file extension is restricted by policy&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 970901&lt;br /&gt;
  | 950100&lt;br /&gt;
  | The Application Returned a 500-Level Status Code&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Franziska's candidate: too strict, too generic, no data leakage happened so far. Walter: it's useful however to prevent attacker from distinguishing between a failed SQLi attempt (403 blocked by ModSec) or a query error due to vulnerable app (500 from application) #discuss&lt;br /&gt;
|-&lt;br /&gt;
  | 973300&lt;br /&gt;
  | gone  &lt;br /&gt;
  | Possible XSS Attack Detected - HTML Tag Handler&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP&lt;br /&gt;
|-&lt;br /&gt;
  | 973332&lt;br /&gt;
  | gone  &lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP&lt;br /&gt;
|-&lt;br /&gt;
  | 973333&lt;br /&gt;
  | gone  &lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981172&lt;br /&gt;
  | gone  &lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: very high FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981173&lt;br /&gt;
  | gone  &lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: very high FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981231&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Comment Sequence Detected.&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: high FP but rule seems useful&lt;br /&gt;
|-&lt;br /&gt;
  | 981240&lt;br /&gt;
  | 942300&lt;br /&gt;
  | Detects MySQL comments, conditions and ch(a)r injections&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981242&lt;br /&gt;
  | 942330&lt;br /&gt;
  | Detects classic SQL injection probings 1/2&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Also Franziska's candidate: one quote character already matches?? Walter: low FP, but seen in cookies injected by some US ISPs; &lt;br /&gt;
|-&lt;br /&gt;
  | 981243&lt;br /&gt;
  | 942370&lt;br /&gt;
  | Detects classic SQL injection probings 2/2&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981244&lt;br /&gt;
  | 942180&lt;br /&gt;
  | Detects basic SQL authentication bypass attempts 1/3&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP, #discuss&lt;br /&gt;
|-&lt;br /&gt;
  | 981245&lt;br /&gt;
  | 942260&lt;br /&gt;
  | Detects basic SQL authentication bypass attempts 2/3&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981246&lt;br /&gt;
  | 942340&lt;br /&gt;
  | Detects basic SQL authentication bypass attempts 3/3&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981248&lt;br /&gt;
  | 942210&lt;br /&gt;
  | Detects chained SQL injection attempts 1/2&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: low FP, #discuss&lt;br /&gt;
|-&lt;br /&gt;
  | 981249&lt;br /&gt;
  | 942310&lt;br /&gt;
  | Detects chained SQL injection attempts 2/2&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP but seen in very specific situations&lt;br /&gt;
|-&lt;br /&gt;
  | 981257&lt;br /&gt;
  | 942200&lt;br /&gt;
  | Detects MySQL comment-/space-obfuscated injections and backtick termination&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981260&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Hex Encoding Identified&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: high FP in long random strings&lt;br /&gt;
|-&lt;br /&gt;
  | 981318&lt;br /&gt;
  | 942110&lt;br /&gt;
  | SQL Injection Attack: Common Injection Testing Detected&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Franziska's candidate: one quote character at the beginning/end really not legitimate? Walter 2.2.X candidate: frequent FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981319&lt;br /&gt;
  | 942120&lt;br /&gt;
  | SQL Injection Attack: SQL Operator Detected&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Also Franziska's candidate: very short operators or strings already match. Walter: some FP (WooCommerce)&lt;br /&gt;
|-&lt;br /&gt;
  | 981049&lt;br /&gt;
  | 912100&lt;br /&gt;
  | Potential Denial of Service (DoS) Attack from ... - # of Request Bursts: ...	   &lt;br /&gt;
  | cloning-candidate	&lt;br /&gt;
  | limit currently at 2; could be set to 1; now, the attacker has to exceed dos_counter_threshold twice. With full reset of counter after first hit. Source: 2.2.X-&amp;gt;experimental rules&lt;br /&gt;
|-&lt;br /&gt;
  | 960901          &lt;br /&gt;
  | 920270			&lt;br /&gt;
  | Invalid character in request&lt;br /&gt;
  | cloning-candidate	&lt;br /&gt;
  | @validateByteRange 1-255; there was a conditional rule with stricter byterange 32-126 in 2.2.X as well&lt;br /&gt;
|-&lt;br /&gt;
  | 970003          &lt;br /&gt;
  | 951100			&lt;br /&gt;
  | none					   					   &lt;br /&gt;
  | cloning-candidate	&lt;br /&gt;
  | rule is only setting tx.sql_error_match. Could also trigger score directly&lt;br /&gt;
|-&lt;br /&gt;
  | 950907          &lt;br /&gt;
  | 932100			&lt;br /&gt;
  | Remote Command Execution (RCE) Attempt					   	   &lt;br /&gt;
  | cloning-candidate	&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 958977          &lt;br /&gt;
  | 933110			&lt;br /&gt;
  | PHP Injection Attack: Function Name Found					    &lt;br /&gt;
  | cloning-candidate&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 958979          &lt;br /&gt;
  | 933120			&lt;br /&gt;
  | PHP Injection Attack: Configuration Directive Found				    &lt;br /&gt;
  | cloning-candidate&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 958980          &lt;br /&gt;
  | 933130			&lt;br /&gt;
  | PHP Injection Attack: Variables Found					   	    &lt;br /&gt;
  | cloning-candidate&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 950001          &lt;br /&gt;
  | 942150			&lt;br /&gt;
  | SQL Injection Attack					   			    &lt;br /&gt;
  | cloning-candidate&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Rules from 2.2.X, missing in 3.0.0-rc1===&lt;br /&gt;
&lt;br /&gt;
It looks as if only the base_rules made it into 3.0.0. In fact there are a few rule ids know from the optional and experimental rule folders in 2.2.X, but it is more likely, these are new 3.0.0 rules reusing old rule ids as the rules (regexes and msg) do not match at all.&lt;br /&gt;
&lt;br /&gt;
When trying to generate the list below, be aware that the rule ids have been renumbered between 3.0.0-dev and 3.0.0-rc1. IdNumbering.csv in your friend.&lt;br /&gt;
&lt;br /&gt;
====Base rules====&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''2.2.X rule id'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''msg'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''remarks'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | 950002&lt;br /&gt;
  | System Command Access&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950006&lt;br /&gt;
  | System Command Injection&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950007&lt;br /&gt;
  | Blind SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950008&lt;br /&gt;
  | Injection of Undocumented ColdFusion Tags&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950010&lt;br /&gt;
  | LDAP Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950011&lt;br /&gt;
  | SSI injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950018&lt;br /&gt;
  | Universal PDF XSS URL Detected.&lt;br /&gt;
  | Walter: medium FP (foo.pdf#javascript)&lt;br /&gt;
|-&lt;br /&gt;
  | 950019&lt;br /&gt;
  | Email Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950908&lt;br /&gt;
  | SQL Injection Attack.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950921&lt;br /&gt;
  | Backdoor access&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950922&lt;br /&gt;
  | Backdoor access&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958000&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958001&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958002&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958003&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958004&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958005&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958006&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958007&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958008&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958009&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958010&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958011&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958012&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958013&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958016&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958017&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958018&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958019&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958020&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958022&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958023&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958024&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958025&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958026&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958027&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958028&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958030&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958031&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958032&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958033&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958034&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958036&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958037&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958038&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958039&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958040&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958041&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958045&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958046&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958047&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958049&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958051&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958052&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958054&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958056&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958057&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958059&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958291&lt;br /&gt;
  | Range: field exists and begins with 0.&lt;br /&gt;
  | Walter: high FP (Chrome PDF viewer) and not useful.&lt;br /&gt;
|-&lt;br /&gt;
  | 958404&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958405&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958406&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958407&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958408&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958409&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958410&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958411&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958412&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958413&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958414&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958415&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958416&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958417&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958418&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958419&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958420&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958421&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958422&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958423&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958976&lt;br /&gt;
  | PHP Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959070&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959071&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959072&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959073&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960014&lt;br /&gt;
  | Proxy access attempt&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960018&lt;br /&gt;
  | Invalid character in request&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960020&lt;br /&gt;
  | Pragma Header requires Cache-Control Header for HTTP/1.1 requests.&lt;br /&gt;
  | Walter: some FP&lt;br /&gt;
|-&lt;br /&gt;
  | 960022&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960024&lt;br /&gt;
  | Meta-Character Anomaly Detection Alert - Repetative Non-Word Characters&lt;br /&gt;
  | Walter: many FP&lt;br /&gt;
|-&lt;br /&gt;
  | 960902&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960913&lt;br /&gt;
  | Invalid request&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970007&lt;br /&gt;
  | Zope Information Leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970008&lt;br /&gt;
  | Cold Fusion Information Leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970010&lt;br /&gt;
  | ISA server existence revealed&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970011&lt;br /&gt;
  | File or Directory Names Leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970012&lt;br /&gt;
  | Microsoft Office document properties leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970016&lt;br /&gt;
  | Cold Fusion source code leakage&lt;br /&gt;
  | Walter: some FP but not using this language&lt;br /&gt;
|-&lt;br /&gt;
  | 970018&lt;br /&gt;
  | IIS installed in default location&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970021&lt;br /&gt;
  | WebLogic information disclosure&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970903&lt;br /&gt;
  | ASP/JSP source code leakage&lt;br /&gt;
  | Walter: some FP but not using this language&lt;br /&gt;
|-&lt;br /&gt;
  | 973300&lt;br /&gt;
  | Possible XSS Attack Detected - HTML Tag Handler&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973301&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973302&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973303&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973304&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973305&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973306&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973307&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973308&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973309&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973310&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973311&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973312&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973313&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973314&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973316&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973325&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973327&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973328&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973329&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973330&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973331&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973332&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973333&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973334&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | Walter: many FP in text&lt;br /&gt;
|-&lt;br /&gt;
  | 973335&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | Walter: many FP in text&lt;br /&gt;
|-&lt;br /&gt;
  | 973347&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981000&lt;br /&gt;
  | Possibly malicious iframe tag in output&lt;br /&gt;
  | Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981001&lt;br /&gt;
  | Possibly malicious iframe tag in output&lt;br /&gt;
  | Walter: medium FP (iframes with display:none)&lt;br /&gt;
|-&lt;br /&gt;
  | 981003&lt;br /&gt;
  | Malicious iframe+javascript tag in output&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981004&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Excessive fromCharCode&lt;br /&gt;
  | Walter: many FP (Wordpress 4.4 inlined emoji javascripts)&lt;br /&gt;
|-&lt;br /&gt;
  | 981005&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Eval+Unescape&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981006&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Unescape&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981007&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Heap Spray&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981018&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981022&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981133&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981134&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981136&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981172&lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | Walter: many FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981173&lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | Walter: many FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981177&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981178&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981231&lt;br /&gt;
  | SQL Comment Sequence Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981260&lt;br /&gt;
  | SQL Hex Encoding Identified&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981300&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981301&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981302&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981303&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981304&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981305&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981306&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981307&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981308&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981309&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981310&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981311&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981312&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981313&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981314&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981315&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981316&lt;br /&gt;
  | SQL SELECT Statement Anomaly Detection Alert&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981317&lt;br /&gt;
  | SQL SELECT Statement Anomaly Detection Alert&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 990012&lt;br /&gt;
  | Rogue web site crawler&lt;br /&gt;
  | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
====Optional, experimental, slr rules====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | 900048&lt;br /&gt;
 | Identifies Reflected XSS (optional_rules)&lt;br /&gt;
 | Walter: could be very interesting candidate but have not used it in production&lt;br /&gt;
|-&lt;br /&gt;
 | 920021, 920022, 920023&lt;br /&gt;
 | Possible Credit Card Track 1 Data Leakage. (experimental_rules)&lt;br /&gt;
 | Walter: could be interesting candidates but have not used it in production&lt;br /&gt;
|-&lt;br /&gt;
 | 981080, 920020, 920006&lt;br /&gt;
 | Detect CC# in output and block transaction (optional_rules)&lt;br /&gt;
 | Walter: could be interesting candidate but have not used it in production&lt;br /&gt;
|-&lt;br /&gt;
 | 900047, 900048, 981180, 981182&lt;br /&gt;
 | Identifies Stored XSS (optional_rules)&lt;br /&gt;
 | Walter: could be somewhat interesting candidate but have not used it in production&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Stricter siblings for existing rules ===&lt;br /&gt;
&lt;br /&gt;
Stricter Siblings are rules that are present in the CRS but could be accompanied by a stricter clone in Paranoia Mode. Adjustments can differ from rule to rule but include higher anomaly ratings or stricter triggers (e.g. regex counters). To prevent masses of false positives, rules can come with additional filters (chained rules) for common use-cases. These can either be included into Paranoia Mode or simply serve as a recommendation.&lt;br /&gt;
&lt;br /&gt;
Note: To avoid a cluttered project main-page, rule proposals are documented in their respective sub-page. When adding new proposals, make sure adding the rules original (2.2.x) ID, a quick description of what changes were made, and, if applicable, which additional filters were added.&lt;br /&gt;
&lt;br /&gt;
'''Possible siblings:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981049|981049 : SQL Injection Character Anomaly Usage]]&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981172|981172 : SQL Injection Character Anomaly Usage]]&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981173|981173 : SQL Injection Character Anomaly Usage]]&lt;br /&gt;
&lt;br /&gt;
==Project Status==&lt;br /&gt;
&lt;br /&gt;
===Project Status January 30, 2016===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
Hello everybody,&lt;br /&gt;
&lt;br /&gt;
It's time to do a status report of our little core rules project.&lt;br /&gt;
&lt;br /&gt;
I am including Franziska Bühler and Walter Hop in this status mail.&lt;br /&gt;
Both are experienced ModSec sysadmins. Franziska contributed to this&lt;br /&gt;
first stage, Walter told me he does not have much time, but he&lt;br /&gt;
was interested in participating at least in the discussions about&lt;br /&gt;
the rules.&lt;br /&gt;
&lt;br /&gt;
All in all, this is taking more time than anticipated. But we&lt;br /&gt;
have also done things very throughly than I thought. Which is&lt;br /&gt;
generally a good thing.&lt;br /&gt;
&lt;br /&gt;
Done so far:&lt;br /&gt;
* Manuel has provided us with a list of rules removed between 2.2.x and 3.0.0rc1&lt;br /&gt;
* I have assembled a list of rules known to trigger false positives frequently in the 2.2.x ruleset, they are thus candidates for the paranoia mode&lt;br /&gt;
* Franziska has looked through the 3.0.0rc1 rules and identified a set of rules which look like good candidates.&lt;br /&gt;
* Noël has sharpened his skills by re-writing 981173 in a way that ignores innocent UUIDs. In my eyes, he found a very elegant solution.&lt;br /&gt;
* With the development of 3.0.0-dev, Chaim unfortunately reused rule ids formerly used with optional and experimental rules. Now this has all been renumbered. I have pointed this out in the mailinglist and had private contact with Chaim where he confirmed the fact - and promised to resolve the issue.&lt;br /&gt;
&lt;br /&gt;
We have not really looked at the disappeared rules and identified those&lt;br /&gt;
who should be brought back and have not been picked so far. This&lt;br /&gt;
includes the 2.2.X base_rules, but also the optional, experimental,&lt;br /&gt;
and huge stock of slr rules. Of these three groups, only the&lt;br /&gt;
anti-ddos rules have made it into 3.0.0. There are probably more&lt;br /&gt;
interesting candidates.&lt;br /&gt;
&lt;br /&gt;
If somebody among you wants to look into these, then that would be&lt;br /&gt;
welcome, but I do not want to have these tasks delay us any further.&lt;br /&gt;
After all, Old rules can also be brought back in subsequent releases&lt;br /&gt;
if we see a benefit.&lt;br /&gt;
&lt;br /&gt;
So the next real tasks are:&lt;br /&gt;
* Looking through the list of candidates and cloning-candidates (the latter are those rules we might accompany with a clone with stricter limits in paranoia mode).&lt;br /&gt;
* Defining the exact working of the paranoia mode.&lt;br /&gt;
&lt;br /&gt;
Please sit down and look through the rule lists in the wiki and add&lt;br /&gt;
remarks with regards to the candidate rules. If you think a rule&lt;br /&gt;
should be included, if you think an individual rule should not be&lt;br /&gt;
included etc.&lt;br /&gt;
&lt;br /&gt;
I am also going to invite the people on the mailinglist to take look at&lt;br /&gt;
the rules as well and add their remarks in the wiki (or respond via mail).&lt;br /&gt;
This should allow us to nail down the list of rules which will&lt;br /&gt;
actually be included in the paranoia mode.&lt;br /&gt;
&lt;br /&gt;
As for defining the exact working of the paranoia mode, I guess I&lt;br /&gt;
need to write down the idea I have in mind and see if it makes sense to&lt;br /&gt;
you.&lt;br /&gt;
&lt;br /&gt;
Thank you for contributing so far! It is a lot of fun to work in a team!&lt;br /&gt;
&lt;br /&gt;
Christian&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981173&amp;diff=208417</id>
		<title>OWASP ModSec CRS Paranoia Mode Sibling 981173</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981173&amp;diff=208417"/>
				<updated>2016-02-10T08:05:52Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: /* 981173 : SQL Injection Character Anomaly Usage */ - table added for clearness&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;''This page contains a proposal for a stricter rule-clone for [[OWASP_ModSec_CRS_Paranoia_Mode|ModSecurity CRS Paranoia Mode]].''&lt;br /&gt;
== 981173 : SQL Injection Character Anomaly Usage ==&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | '''Original ID (2.2.x)'''&lt;br /&gt;
 | '''Change'''&lt;br /&gt;
 | '''Whitelisting'''&lt;br /&gt;
|-&lt;br /&gt;
 | 981173&lt;br /&gt;
 | Regex counter decreased from 4 to 1.&amp;lt;br&amp;gt;Anomaly scoring increased to critical.&lt;br /&gt;
 | Regex for UUIDs in chained Rule.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
  #&lt;br /&gt;
  # -=[ SQL Injection Character Anomaly Usage ]=-&lt;br /&gt;
  #&lt;br /&gt;
  # This is a paranoid sibling to 2.2.9 Rule 981173.&lt;br /&gt;
  # The regex limit is set to '1' and the anomaly scoring is increased to 'critical'.&lt;br /&gt;
  # For dealing with false positives, UUID format is whitelisted with a chained rule.&lt;br /&gt;
  #&lt;br /&gt;
  SecRule ARGS_NAMES|ARGS|XML:/* &amp;quot;([\~\!\@\#\$\%\^\&amp;amp;\*\(\)\-\+\=\{\}\[\]\|\:\;\&amp;quot;\'\´\’\‘\`\&amp;lt;\&amp;gt;].*?){1,}&amp;quot;\&lt;br /&gt;
        &amp;quot;chain,\&lt;br /&gt;
        phase:request,\&lt;br /&gt;
        rev:'2',\&lt;br /&gt;
        ver:'OWASP_CRS/3.0.0',\&lt;br /&gt;
        maturity:'X',\&lt;br /&gt;
        accuracy:'Y',\&lt;br /&gt;
        t:none,t:urlDecodeUni,\&lt;br /&gt;
        block,\&lt;br /&gt;
        msg:'Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded',\&lt;br /&gt;
        id:'XXXXXX',\&lt;br /&gt;
        tag:'OWASP_CRS/WEB_ATTACK/SQL_INJECTION',\&lt;br /&gt;
        tag:'Paranoia rule on level 40',\&lt;br /&gt;
        logdata:'Matched Data: %{TX.1} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}',\&lt;br /&gt;
        severity:'CRITICAL',\&lt;br /&gt;
        setvar:'tx.msg=%{rule.msg}',\&lt;br /&gt;
        setvar:tx.%{rule.id}-OWASP_CRS/WEB_ATTACK/RESTRICTED_SQLI_CHARS-%{matched_var_name}=%{tx.0}&amp;quot;&lt;br /&gt;
        SecRule MATCHED_VARS &amp;quot;!@rx ^[a-f0-9-]{36}$&amp;quot;\&lt;br /&gt;
                &amp;quot;t:lowercase,\&lt;br /&gt;
                setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
                setvar:tx.sql_injection_score=+1&amp;quot;&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981173&amp;diff=208416</id>
		<title>OWASP ModSec CRS Paranoia Mode Sibling 981173</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981173&amp;diff=208416"/>
				<updated>2016-02-10T05:33:23Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;''This page contains a proposal for a stricter rule-clone for [[OWASP_ModSec_CRS_Paranoia_Mode|ModSecurity CRS Paranoia Mode]].''&lt;br /&gt;
==== 981173 : SQL Injection Character Anomaly Usage ====&lt;br /&gt;
&lt;br /&gt;
Original ID (2.2.X): 981173&amp;lt;br&amp;gt;&lt;br /&gt;
Change: Regex counter decreased to '1', anomaly score set to 'critical', paranoia tag added&amp;lt;br&amp;gt;&lt;br /&gt;
FP Filter: UUIDs&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  #&lt;br /&gt;
  # -=[ SQL Injection Character Anomaly Usage ]=-&lt;br /&gt;
  #&lt;br /&gt;
  # This is a paranoid sibling to 2.2.9 Rule 981173.&lt;br /&gt;
  # The regex limit is set to {1,}, adjust to your own needs.&lt;br /&gt;
  # For dealing with false positives caused by uuids, the rule is now chained.&lt;br /&gt;
  # Also the anomaly score is now set to critical.&lt;br /&gt;
  #&lt;br /&gt;
  SecRule ARGS_NAMES|ARGS|XML:/* &amp;quot;([\~\!\@\#\$\%\^\&amp;amp;\*\(\)\-\+\=\{\}\[\]\|\:\;\&amp;quot;\'\´\’\‘\`\&amp;lt;\&amp;gt;].*?){1,}&amp;quot;\&lt;br /&gt;
        &amp;quot;chain,\&lt;br /&gt;
        phase:request,\&lt;br /&gt;
        rev:'2',\&lt;br /&gt;
        ver:'OWASP_CRS/3.0.0',\&lt;br /&gt;
        maturity:'X',\&lt;br /&gt;
        accuracy:'Y',\&lt;br /&gt;
        t:none,t:urlDecodeUni,\&lt;br /&gt;
        block,\&lt;br /&gt;
        msg:'Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded',\&lt;br /&gt;
        id:'XXXXXX',\&lt;br /&gt;
        tag:'OWASP_CRS/WEB_ATTACK/SQL_INJECTION',\&lt;br /&gt;
        tag:'Paranoia rule on level 40',\&lt;br /&gt;
        logdata:'Matched Data: %{TX.1} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}',\&lt;br /&gt;
        severity:'CRITICAL',\&lt;br /&gt;
        setvar:'tx.msg=%{rule.msg}',\&lt;br /&gt;
        setvar:tx.%{rule.id}-OWASP_CRS/WEB_ATTACK/RESTRICTED_SQLI_CHARS-%{matched_var_name}=%{tx.0}&amp;quot;&lt;br /&gt;
        SecRule MATCHED_VARS &amp;quot;!@rx ^[a-f0-9-]{36}$&amp;quot;\&lt;br /&gt;
                &amp;quot;t:lowercase,\&lt;br /&gt;
                setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
                setvar:tx.sql_injection_score=+1&amp;quot;&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981173&amp;diff=208415</id>
		<title>OWASP ModSec CRS Paranoia Mode Sibling 981173</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981173&amp;diff=208415"/>
				<updated>2016-02-10T05:25:15Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: Created page with &amp;quot;==== 981173 : SQL Injection Character Anomaly Usage ====  Original ID (2.2.X): 981173&amp;lt;br&amp;gt; Change: Regex counter decreased to '1', anomaly score set to 'critical', paranoia tag...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== 981173 : SQL Injection Character Anomaly Usage ====&lt;br /&gt;
&lt;br /&gt;
Original ID (2.2.X): 981173&amp;lt;br&amp;gt;&lt;br /&gt;
Change: Regex counter decreased to '1', anomaly score set to 'critical', paranoia tag added&amp;lt;br&amp;gt;&lt;br /&gt;
FP Filter: UUIDs&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  #&lt;br /&gt;
  # -=[ SQL Injection Character Anomaly Usage ]=-&lt;br /&gt;
  #&lt;br /&gt;
  # This is a paranoid sibling to 2.2.9 Rule 981173.&lt;br /&gt;
  # The regex limit is set to {1,}, adjust to your own needs.&lt;br /&gt;
  # For dealing with false positives caused by uuids, the rule is now chained.&lt;br /&gt;
  # Also the anomaly score is now set to critical.&lt;br /&gt;
  #&lt;br /&gt;
  SecRule ARGS_NAMES|ARGS|XML:/* &amp;quot;([\~\!\@\#\$\%\^\&amp;amp;\*\(\)\-\+\=\{\}\[\]\|\:\;\&amp;quot;\'\´\’\‘\`\&amp;lt;\&amp;gt;].*?){1,}&amp;quot;\&lt;br /&gt;
        &amp;quot;chain,\&lt;br /&gt;
        phase:request,\&lt;br /&gt;
        rev:'2',\&lt;br /&gt;
        ver:'OWASP_CRS/3.0.0',\&lt;br /&gt;
        maturity:'X',\&lt;br /&gt;
        accuracy:'Y',\&lt;br /&gt;
        t:none,t:urlDecodeUni,\&lt;br /&gt;
        block,\&lt;br /&gt;
        msg:'Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded',\&lt;br /&gt;
        id:'XXXXXX',\&lt;br /&gt;
        tag:'OWASP_CRS/WEB_ATTACK/SQL_INJECTION',\&lt;br /&gt;
        tag:'Paranoia rule on level 40',\&lt;br /&gt;
        logdata:'Matched Data: %{TX.1} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}',\&lt;br /&gt;
        severity:'CRITICAL',\&lt;br /&gt;
        setvar:'tx.msg=%{rule.msg}',\&lt;br /&gt;
        setvar:tx.%{rule.id}-OWASP_CRS/WEB_ATTACK/RESTRICTED_SQLI_CHARS-%{matched_var_name}=%{tx.0}&amp;quot;&lt;br /&gt;
        SecRule MATCHED_VARS &amp;quot;!@rx ^[a-f0-9-]{36}$&amp;quot;\&lt;br /&gt;
                &amp;quot;t:lowercase,\&lt;br /&gt;
                setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
                setvar:tx.sql_injection_score=+1&amp;quot;&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode&amp;diff=208414</id>
		<title>OWASP ModSec CRS Paranoia Mode</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode&amp;diff=208414"/>
				<updated>2016-02-10T05:23:43Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: /* Stricter siblings for existing rules */ - Rewrote description, moved siblings to sub-pages&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Abstract==&lt;br /&gt;
&lt;br /&gt;
This is a page about the development of a paranoia mode aka bringing back the rules that used to yield a high number of false positives. This little project is aimed at inclusion into the 3.0.0 release of the OWASP ModSecurity Core Rules, where some rules have been removed in order to reduce the number of false positives with vanilla installations.&lt;br /&gt;
&lt;br /&gt;
FIXME: Detailed description&lt;br /&gt;
&lt;br /&gt;
''Back to the [https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project OWASP ModSecurity Core Rules Set].''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Sub-Project Infos==&lt;br /&gt;
&lt;br /&gt;
* '''Status''': active (January 2016)&lt;br /&gt;
* '''Schedule''': Pull request in &amp;lt;strike&amp;gt;January&amp;lt;/strike&amp;gt;February  2016&lt;br /&gt;
* '''Who''': Christian Folini (dune73), Noël Zindel (zino), Franziska Bühler (franziskabuehler), Manuel Leos (Spartan), Walter Hop (lifeforms)&lt;br /&gt;
* '''Documentation''': Here on the [https://www.owasp.org/index.php/OWASP_ModSec_CRS_Paranoia_Mode OWASP Wiki] / [https://www.netnea.com/cms/2016/02/04/owasp-modsecurity-core-rules-paranoia-mode-mechanics-proposal/ Mechanics Proposal]&lt;br /&gt;
* '''Discussion / Archive''': &amp;lt;tt&amp;gt;owasp-modsecurity-core-rule-set@lists.owasp.org&amp;lt;/tt&amp;gt; / archive: http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/&lt;br /&gt;
* '''Github Link''': https://github.com/SpiderLabs/owasp-modsecurity-crs/tree/v3.0.0-rc1&lt;br /&gt;
* '''Final Pull Request''': FIXME&lt;br /&gt;
&lt;br /&gt;
==Tasks==&lt;br /&gt;
&lt;br /&gt;
===Open Tasks===&lt;br /&gt;
&lt;br /&gt;
Please define state as follows: ''new'', ''assigned'', ''waiting'', ''closed''. When a task it is closed, it is moved to the seperate closed tasks table below.&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''Task'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Who'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | Nail down final list of rules which should be moved / recreated into the paranoia mode&lt;br /&gt;
  | group&lt;br /&gt;
  | assigned&lt;br /&gt;
|-&lt;br /&gt;
  | Write new stricter siblings for existing rules&lt;br /&gt;
  | Noël&lt;br /&gt;
  | assigned&lt;br /&gt;
|-&lt;br /&gt;
  | Define ID-space for strict siblings&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Sort out mechanics of the paranoia mode&lt;br /&gt;
  | Christian&lt;br /&gt;
  | assigned&lt;br /&gt;
|-&lt;br /&gt;
  | Define exact syntax of paranoia mode setup&lt;br /&gt;
  | Christian&lt;br /&gt;
  | waiting&lt;br /&gt;
|-&lt;br /&gt;
  | Sort out name: Is &amp;quot;Paranoia Mode&amp;quot; really the right term?&lt;br /&gt;
  | Christian&lt;br /&gt;
  | waiting&lt;br /&gt;
|-&lt;br /&gt;
  | Write pull request&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Submit pull request&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Draw flowchart&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Write documentation&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Closed Tasks===&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''Task'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Who'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of rules, which triggered false positives in 2.2.X frequently&lt;br /&gt;
  | Christian&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 2.2.x rules, which have disappeared from 3.0.0-rc1&lt;br /&gt;
  | Spartan&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 3.0.0-rc1 rules, which could be accompanied with&amp;lt;br /&amp;gt;stricter siblings in paranoia mode&amp;lt;br /&amp;gt;(same idea of the rule, but harder limit etc.)&lt;br /&gt;
  | Christian&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 3.0.0-rc1 rules, which could be moved to the paranoia mode&lt;br /&gt;
  | Franziska&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of disappeared / missing 2.2.X base_rules, which should be brought back&lt;br /&gt;
  | group&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 2.2.X optional and experimental rules, which should be brought back&lt;br /&gt;
  | group&lt;br /&gt;
  | closed (could be repeated more throughly)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Rules==&lt;br /&gt;
&lt;br /&gt;
===Paranoia Mode Candidates===&lt;br /&gt;
&lt;br /&gt;
The 3.0.0-rc1 has all rules renumbered. Existing numbering was fairly crazy and the new numbering follows the numbering scheme of the rules files (-&amp;gt; 9&amp;lt;2-digit-rulefile&amp;gt;&amp;lt;3-digit-id&amp;gt;)&lt;br /&gt;
A mapping table exists [[https://github.com/SpiderLabs/owasp-modsecurity-crs/blob/v3.0.0-rc1/id_renumbering/IdNumbering.csv IdNumbering.csv]]&lt;br /&gt;
We need to make sure, we do not mess things up, so let's add both IDs to the table, the old one and the new one.&lt;br /&gt;
&lt;br /&gt;
Please set status as follows : ''candidate'', ''cloning-candidate'', ''unsure'', ''dropped''. &lt;br /&gt;
* 'cloning-candidates' are rules, that could be cloned into an even stricter variant with a stricter limit in a higher paranoia setting.&lt;br /&gt;
* If dropped, please provide reasoning in the remarks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''RuleID 2.2.x'''&lt;br /&gt;
  |'''RuleID 3.0.0-rc1'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''msg'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Remarks'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | 900050&lt;br /&gt;
  | 910100&lt;br /&gt;
  | Client IP is from a HIGH Risk Country Location.&lt;br /&gt;
  | unsure&lt;br /&gt;
  | Franziska's candidate: Do we want to exlude countries? But then easy to configure.&lt;br /&gt;
|-&lt;br /&gt;
  | 950001&lt;br /&gt;
  | 942150&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Also Franziska's candidate: @pmf file with very short function names, could match frequently.&lt;br /&gt;
|-&lt;br /&gt;
  | 950109&lt;br /&gt;
  | 920230&lt;br /&gt;
  | Multiple URL Encoding Detected&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 950120&lt;br /&gt;
  | 931130&lt;br /&gt;
  | Possible Remote File Inclusion (RFI) Attack: Off-Domain Reference/Link&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Walter's 2.2.X candidate: many FP; Chrstian: hardly any FPs, #discuss&lt;br /&gt;
|-&lt;br /&gt;
  | 960335&lt;br /&gt;
  | 920380&lt;br /&gt;
  | Too many arguments in request&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Walter's 2.2.X candidate: some FP (phpMyAdmin, large forms), alternatively would recommend raising &amp;lt;code&amp;gt;tx.max_num_args&amp;lt;/code&amp;gt; to 1000&lt;br /&gt;
|-&lt;br /&gt;
  | 950901&lt;br /&gt;
  | 942130&lt;br /&gt;
  | SQL Injection Attack: SQL Tautology Detected.&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Also Franziska's candidate: legitimate sentences could match. Walter's 2.2.x experience: many FP in natural text however the rule seems to have merit&lt;br /&gt;
|-&lt;br /&gt;
  | 950907&lt;br /&gt;
  | 932100&lt;br /&gt;
  | System Command Injection&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Also Franziska's candidate: false positives possible because of @pmf, file with short cmds. Maybe we should split the data file #discuss &lt;br /&gt;
|-&lt;br /&gt;
  | 950916&lt;br /&gt;
  | 921170&lt;br /&gt;
  | HTTP Header Injection Attack via payload (CR/LF detected)&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Franziska's candidate: change action from pass to block and move to paranoia mode.&lt;br /&gt;
|-&lt;br /&gt;
  | 958977&lt;br /&gt;
  | 933110&lt;br /&gt;
  | PHP Injection Attack: Function Name Found&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Franziska's candidate: false positives possible because of @pmf, file with short function names. Maybe we should split the data file #discuss &lt;br /&gt;
|-&lt;br /&gt;
  | 958979&lt;br /&gt;
  | 933120&lt;br /&gt;
  | PHP Injection Attack: Configuration Directive Found&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Franziska's candidate: false positives possible because of @pmf, file with short configuration directives.&lt;br /&gt;
|-&lt;br /&gt;
  | 959070&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 959071&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 959072&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 959073&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 960015&lt;br /&gt;
  | 920300&lt;br /&gt;
  | Request Missing an Accept Header&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Also Franziska's candidate: Not every legitimate client behaves correctly. Walter's experience: many FP (PHP SoapClient)&lt;br /&gt;
|-&lt;br /&gt;
  | 960017&lt;br /&gt;
  | 920350&lt;br /&gt;
  | Host header is a numeric IP address&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Also Franziska's candidate: Not every legitimate client behaves correctly. Walter's experience: low FP (almost all are mass scans) #discuss&lt;br /&gt;
|-&lt;br /&gt;
  | 960024&lt;br /&gt;
  | gone  &lt;br /&gt;
  | Meta-Character Anomaly Detection Alert - Repetative Non-Word Characters&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 960035&lt;br /&gt;
  | 920440&lt;br /&gt;
  | URL file extension is restricted by policy&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 970901&lt;br /&gt;
  | 950100&lt;br /&gt;
  | The Application Returned a 500-Level Status Code&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Franziska's candidate: too strict, too generic, no data leakage happened so far. Walter: it's useful however to prevent attacker from distinguishing between a failed SQLi attempt (403 blocked by ModSec) or a query error due to vulnerable app (500 from application) #discuss&lt;br /&gt;
|-&lt;br /&gt;
  | 973300&lt;br /&gt;
  | gone  &lt;br /&gt;
  | Possible XSS Attack Detected - HTML Tag Handler&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP&lt;br /&gt;
|-&lt;br /&gt;
  | 973332&lt;br /&gt;
  | gone  &lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP&lt;br /&gt;
|-&lt;br /&gt;
  | 973333&lt;br /&gt;
  | gone  &lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981172&lt;br /&gt;
  | gone  &lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: very high FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981173&lt;br /&gt;
  | gone  &lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: very high FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981231&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Comment Sequence Detected.&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: high FP but rule seems useful&lt;br /&gt;
|-&lt;br /&gt;
  | 981240&lt;br /&gt;
  | 942300&lt;br /&gt;
  | Detects MySQL comments, conditions and ch(a)r injections&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981242&lt;br /&gt;
  | 942330&lt;br /&gt;
  | Detects classic SQL injection probings 1/2&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Also Franziska's candidate: one quote character already matches?? Walter: low FP, but seen in cookies injected by some US ISPs; &lt;br /&gt;
|-&lt;br /&gt;
  | 981243&lt;br /&gt;
  | 942370&lt;br /&gt;
  | Detects classic SQL injection probings 2/2&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981244&lt;br /&gt;
  | 942180&lt;br /&gt;
  | Detects basic SQL authentication bypass attempts 1/3&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP, #discuss&lt;br /&gt;
|-&lt;br /&gt;
  | 981245&lt;br /&gt;
  | 942260&lt;br /&gt;
  | Detects basic SQL authentication bypass attempts 2/3&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981246&lt;br /&gt;
  | 942340&lt;br /&gt;
  | Detects basic SQL authentication bypass attempts 3/3&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981248&lt;br /&gt;
  | 942210&lt;br /&gt;
  | Detects chained SQL injection attempts 1/2&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: low FP, #discuss&lt;br /&gt;
|-&lt;br /&gt;
  | 981249&lt;br /&gt;
  | 942310&lt;br /&gt;
  | Detects chained SQL injection attempts 2/2&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP but seen in very specific situations&lt;br /&gt;
|-&lt;br /&gt;
  | 981257&lt;br /&gt;
  | 942200&lt;br /&gt;
  | Detects MySQL comment-/space-obfuscated injections and backtick termination&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981260&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Hex Encoding Identified&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: high FP in long random strings&lt;br /&gt;
|-&lt;br /&gt;
  | 981318&lt;br /&gt;
  | 942110&lt;br /&gt;
  | SQL Injection Attack: Common Injection Testing Detected&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Franziska's candidate: one quote character at the beginning/end really not legitimate? Walter 2.2.X candidate: frequent FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981319&lt;br /&gt;
  | 942120&lt;br /&gt;
  | SQL Injection Attack: SQL Operator Detected&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Also Franziska's candidate: very short operators or strings already match. Walter: some FP (WooCommerce)&lt;br /&gt;
|-&lt;br /&gt;
  | 981049&lt;br /&gt;
  | 912100&lt;br /&gt;
  | Potential Denial of Service (DoS) Attack from ... - # of Request Bursts: ...	   &lt;br /&gt;
  | cloning-candidate	&lt;br /&gt;
  | limit currently at 2; could be set to 1; now, the attacker has to exceed dos_counter_threshold twice. With full reset of counter after first hit. Source: 2.2.X-&amp;gt;experimental rules&lt;br /&gt;
|-&lt;br /&gt;
  | 960901          &lt;br /&gt;
  | 920270			&lt;br /&gt;
  | Invalid character in request&lt;br /&gt;
  | cloning-candidate	&lt;br /&gt;
  | @validateByteRange 1-255; there was a conditional rule with stricter byterange 32-126 in 2.2.X as well&lt;br /&gt;
|-&lt;br /&gt;
  | 970003          &lt;br /&gt;
  | 951100			&lt;br /&gt;
  | none					   					   &lt;br /&gt;
  | cloning-candidate	&lt;br /&gt;
  | rule is only setting tx.sql_error_match. Could also trigger score directly&lt;br /&gt;
|-&lt;br /&gt;
  | 950907          &lt;br /&gt;
  | 932100			&lt;br /&gt;
  | Remote Command Execution (RCE) Attempt					   	   &lt;br /&gt;
  | cloning-candidate	&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 958977          &lt;br /&gt;
  | 933110			&lt;br /&gt;
  | PHP Injection Attack: Function Name Found					    &lt;br /&gt;
  | cloning-candidate&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 958979          &lt;br /&gt;
  | 933120			&lt;br /&gt;
  | PHP Injection Attack: Configuration Directive Found				    &lt;br /&gt;
  | cloning-candidate&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 958980          &lt;br /&gt;
  | 933130			&lt;br /&gt;
  | PHP Injection Attack: Variables Found					   	    &lt;br /&gt;
  | cloning-candidate&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 950001          &lt;br /&gt;
  | 942150			&lt;br /&gt;
  | SQL Injection Attack					   			    &lt;br /&gt;
  | cloning-candidate&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Rules from 2.2.X, missing in 3.0.0-rc1===&lt;br /&gt;
&lt;br /&gt;
It looks as if only the base_rules made it into 3.0.0. In fact there are a few rule ids know from the optional and experimental rule folders in 2.2.X, but it is more likely, these are new 3.0.0 rules reusing old rule ids as the rules (regexes and msg) do not match at all.&lt;br /&gt;
&lt;br /&gt;
When trying to generate the list below, be aware that the rule ids have been renumbered between 3.0.0-dev and 3.0.0-rc1. IdNumbering.csv in your friend.&lt;br /&gt;
&lt;br /&gt;
====Base rules====&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''2.2.X rule id'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''msg'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''remarks'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | 950002&lt;br /&gt;
  | System Command Access&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950006&lt;br /&gt;
  | System Command Injection&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950007&lt;br /&gt;
  | Blind SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950008&lt;br /&gt;
  | Injection of Undocumented ColdFusion Tags&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950010&lt;br /&gt;
  | LDAP Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950011&lt;br /&gt;
  | SSI injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950018&lt;br /&gt;
  | Universal PDF XSS URL Detected.&lt;br /&gt;
  | Walter: medium FP (foo.pdf#javascript)&lt;br /&gt;
|-&lt;br /&gt;
  | 950019&lt;br /&gt;
  | Email Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950908&lt;br /&gt;
  | SQL Injection Attack.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950921&lt;br /&gt;
  | Backdoor access&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950922&lt;br /&gt;
  | Backdoor access&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958000&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958001&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958002&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958003&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958004&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958005&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958006&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958007&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958008&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958009&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958010&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958011&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958012&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958013&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958016&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958017&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958018&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958019&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958020&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958022&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958023&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958024&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958025&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958026&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958027&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958028&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958030&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958031&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958032&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958033&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958034&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958036&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958037&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958038&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958039&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958040&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958041&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958045&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958046&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958047&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958049&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958051&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958052&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958054&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958056&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958057&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958059&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958291&lt;br /&gt;
  | Range: field exists and begins with 0.&lt;br /&gt;
  | Walter: high FP (Chrome PDF viewer) and not useful.&lt;br /&gt;
|-&lt;br /&gt;
  | 958404&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958405&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958406&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958407&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958408&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958409&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958410&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958411&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958412&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958413&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958414&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958415&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958416&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958417&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958418&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958419&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958420&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958421&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958422&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958423&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958976&lt;br /&gt;
  | PHP Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959070&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959071&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959072&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959073&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960014&lt;br /&gt;
  | Proxy access attempt&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960018&lt;br /&gt;
  | Invalid character in request&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960020&lt;br /&gt;
  | Pragma Header requires Cache-Control Header for HTTP/1.1 requests.&lt;br /&gt;
  | Walter: some FP&lt;br /&gt;
|-&lt;br /&gt;
  | 960022&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960024&lt;br /&gt;
  | Meta-Character Anomaly Detection Alert - Repetative Non-Word Characters&lt;br /&gt;
  | Walter: many FP&lt;br /&gt;
|-&lt;br /&gt;
  | 960902&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960913&lt;br /&gt;
  | Invalid request&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970007&lt;br /&gt;
  | Zope Information Leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970008&lt;br /&gt;
  | Cold Fusion Information Leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970010&lt;br /&gt;
  | ISA server existence revealed&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970011&lt;br /&gt;
  | File or Directory Names Leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970012&lt;br /&gt;
  | Microsoft Office document properties leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970016&lt;br /&gt;
  | Cold Fusion source code leakage&lt;br /&gt;
  | Walter: some FP but not using this language&lt;br /&gt;
|-&lt;br /&gt;
  | 970018&lt;br /&gt;
  | IIS installed in default location&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970021&lt;br /&gt;
  | WebLogic information disclosure&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970903&lt;br /&gt;
  | ASP/JSP source code leakage&lt;br /&gt;
  | Walter: some FP but not using this language&lt;br /&gt;
|-&lt;br /&gt;
  | 973300&lt;br /&gt;
  | Possible XSS Attack Detected - HTML Tag Handler&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973301&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973302&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973303&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973304&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973305&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973306&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973307&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973308&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973309&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973310&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973311&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973312&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973313&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973314&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973316&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973325&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973327&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973328&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973329&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973330&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973331&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973332&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973333&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973334&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | Walter: many FP in text&lt;br /&gt;
|-&lt;br /&gt;
  | 973335&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | Walter: many FP in text&lt;br /&gt;
|-&lt;br /&gt;
  | 973347&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981000&lt;br /&gt;
  | Possibly malicious iframe tag in output&lt;br /&gt;
  | Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981001&lt;br /&gt;
  | Possibly malicious iframe tag in output&lt;br /&gt;
  | Walter: medium FP (iframes with display:none)&lt;br /&gt;
|-&lt;br /&gt;
  | 981003&lt;br /&gt;
  | Malicious iframe+javascript tag in output&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981004&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Excessive fromCharCode&lt;br /&gt;
  | Walter: many FP (Wordpress 4.4 inlined emoji javascripts)&lt;br /&gt;
|-&lt;br /&gt;
  | 981005&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Eval+Unescape&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981006&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Unescape&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981007&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Heap Spray&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981018&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981022&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981133&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981134&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981136&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981172&lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | Walter: many FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981173&lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | Walter: many FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981177&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981178&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981231&lt;br /&gt;
  | SQL Comment Sequence Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981260&lt;br /&gt;
  | SQL Hex Encoding Identified&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981300&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981301&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981302&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981303&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981304&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981305&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981306&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981307&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981308&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981309&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981310&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981311&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981312&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981313&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981314&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981315&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981316&lt;br /&gt;
  | SQL SELECT Statement Anomaly Detection Alert&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981317&lt;br /&gt;
  | SQL SELECT Statement Anomaly Detection Alert&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 990012&lt;br /&gt;
  | Rogue web site crawler&lt;br /&gt;
  | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
====Optional, experimental, slr rules====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | 900048&lt;br /&gt;
 | Identifies Reflected XSS (optional_rules)&lt;br /&gt;
 | Walter: could be very interesting candidate but have not used it in production&lt;br /&gt;
|-&lt;br /&gt;
 | 920021, 920022, 920023&lt;br /&gt;
 | Possible Credit Card Track 1 Data Leakage. (experimental_rules)&lt;br /&gt;
 | Walter: could be interesting candidates but have not used it in production&lt;br /&gt;
|-&lt;br /&gt;
 | 981080, 920020, 920006&lt;br /&gt;
 | Detect CC# in output and block transaction (optional_rules)&lt;br /&gt;
 | Walter: could be interesting candidate but have not used it in production&lt;br /&gt;
|-&lt;br /&gt;
 | 900047, 900048, 981180, 981182&lt;br /&gt;
 | Identifies Stored XSS (optional_rules)&lt;br /&gt;
 | Walter: could be somewhat interesting candidate but have not used it in production&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Stricter siblings for existing rules ===&lt;br /&gt;
&lt;br /&gt;
Stricter Siblings are rules that are present in the CRS but could be accompanied by a stricter clone in Paranoia Mode. Adjustments can differ from rule to rule but include higher anomaly ratings or stricter triggers (e.g. regex counters). To prevent masses of false positives, rules can come with additional filters (chained rules) for common use-cases. These can either be included into Paranoia Mode or simply serve as a recommendation.&lt;br /&gt;
&lt;br /&gt;
Note: To avoid a cluttered project main-page, rule proposals are documented in their respective sub-page. When adding new proposals, make sure adding the rules original (2.2.x) ID, a quick description of what changes were made, and, if applicable, which additional filters were added.&lt;br /&gt;
&lt;br /&gt;
'''Possible siblings:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981173|981173 : SQL Injection Character Anomaly Usage]]&lt;br /&gt;
&lt;br /&gt;
==Project Status==&lt;br /&gt;
&lt;br /&gt;
===Project Status January 30, 2016===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
Hello everybody,&lt;br /&gt;
&lt;br /&gt;
It's time to do a status report of our little core rules project.&lt;br /&gt;
&lt;br /&gt;
I am including Franziska Bühler and Walter Hop in this status mail.&lt;br /&gt;
Both are experienced ModSec sysadmins. Franziska contributed to this&lt;br /&gt;
first stage, Walter told me he does not have much time, but he&lt;br /&gt;
was interested in participating at least in the discussions about&lt;br /&gt;
the rules.&lt;br /&gt;
&lt;br /&gt;
All in all, this is taking more time than anticipated. But we&lt;br /&gt;
have also done things very throughly than I thought. Which is&lt;br /&gt;
generally a good thing.&lt;br /&gt;
&lt;br /&gt;
Done so far:&lt;br /&gt;
* Manuel has provided us with a list of rules removed between 2.2.x and 3.0.0rc1&lt;br /&gt;
* I have assembled a list of rules known to trigger false positives frequently in the 2.2.x ruleset, they are thus candidates for the paranoia mode&lt;br /&gt;
* Franziska has looked through the 3.0.0rc1 rules and identified a set of rules which look like good candidates.&lt;br /&gt;
* Noël has sharpened his skills by re-writing 981173 in a way that ignores innocent UUIDs. In my eyes, he found a very elegant solution.&lt;br /&gt;
* With the development of 3.0.0-dev, Chaim unfortunately reused rule ids formerly used with optional and experimental rules. Now this has all been renumbered. I have pointed this out in the mailinglist and had private contact with Chaim where he confirmed the fact - and promised to resolve the issue.&lt;br /&gt;
&lt;br /&gt;
We have not really looked at the disappeared rules and identified those&lt;br /&gt;
who should be brought back and have not been picked so far. This&lt;br /&gt;
includes the 2.2.X base_rules, but also the optional, experimental,&lt;br /&gt;
and huge stock of slr rules. Of these three groups, only the&lt;br /&gt;
anti-ddos rules have made it into 3.0.0. There are probably more&lt;br /&gt;
interesting candidates.&lt;br /&gt;
&lt;br /&gt;
If somebody among you wants to look into these, then that would be&lt;br /&gt;
welcome, but I do not want to have these tasks delay us any further.&lt;br /&gt;
After all, Old rules can also be brought back in subsequent releases&lt;br /&gt;
if we see a benefit.&lt;br /&gt;
&lt;br /&gt;
So the next real tasks are:&lt;br /&gt;
* Looking through the list of candidates and cloning-candidates (the latter are those rules we might accompany with a clone with stricter limits in paranoia mode).&lt;br /&gt;
* Defining the exact working of the paranoia mode.&lt;br /&gt;
&lt;br /&gt;
Please sit down and look through the rule lists in the wiki and add&lt;br /&gt;
remarks with regards to the candidate rules. If you think a rule&lt;br /&gt;
should be included, if you think an individual rule should not be&lt;br /&gt;
included etc.&lt;br /&gt;
&lt;br /&gt;
I am also going to invite the people on the mailinglist to take look at&lt;br /&gt;
the rules as well and add their remarks in the wiki (or respond via mail).&lt;br /&gt;
This should allow us to nail down the list of rules which will&lt;br /&gt;
actually be included in the paranoia mode.&lt;br /&gt;
&lt;br /&gt;
As for defining the exact working of the paranoia mode, I guess I&lt;br /&gt;
need to write down the idea I have in mind and see if it makes sense to&lt;br /&gt;
you.&lt;br /&gt;
&lt;br /&gt;
Thank you for contributing so far! It is a lot of fun to work in a team!&lt;br /&gt;
&lt;br /&gt;
Christian&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode&amp;diff=208044</id>
		<title>OWASP ModSec CRS Paranoia Mode</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode&amp;diff=208044"/>
				<updated>2016-02-03T14:39:40Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: /* 981173 : SQL Injection Character Anomaly Usage */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Abstract==&lt;br /&gt;
&lt;br /&gt;
This is a page about the development of a paranoia mode aka bringing back the rules that used to yield a high number of false positives. This little project is aimed at inclusion into the 3.0.0 release of the OWASP ModSecurity Core Rules, where some rules have been removed in order to reduce the number of false positives with vanilla installations.&lt;br /&gt;
&lt;br /&gt;
FIXME: Detailed description&lt;br /&gt;
&lt;br /&gt;
''Back to the [https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project OWASP ModSecurity Core Rules Set].''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Sub-Project Infos==&lt;br /&gt;
&lt;br /&gt;
* '''Status''': active (January 2016)&lt;br /&gt;
* '''Schedule''': Pull request in &amp;lt;strike&amp;gt;January&amp;lt;/strike&amp;gt;February  2016&lt;br /&gt;
* '''Who''': Christian Folini (dune73), Noël Zindel (zino), Franziska Bühler (franziskabuehler), Manuel Leos (Spartan), Walter Hop (lifeforms)&lt;br /&gt;
* '''Documentation''': Here on the [https://www.owasp.org/index.php/OWASP_ModSec_CRS_Paranoia_Mode OWASP Wiki]&lt;br /&gt;
* '''Discussion / Archive''': &amp;lt;tt&amp;gt;owasp-modsecurity-core-rule-set@lists.owasp.org&amp;lt;/tt&amp;gt; / archive: http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/&lt;br /&gt;
* '''Github Link''': https://github.com/SpiderLabs/owasp-modsecurity-crs/tree/v3.0.0-rc1&lt;br /&gt;
* '''Final Pull Request''': FIXME&lt;br /&gt;
&lt;br /&gt;
==Tasks==&lt;br /&gt;
&lt;br /&gt;
===Open Tasks===&lt;br /&gt;
&lt;br /&gt;
Please define state as follows: ''new'', ''assigned'', ''waiting'', ''closed''. When a task it is closed, it is moved to the seperate closed tasks table below.&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''Task'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Who'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | Nail down final list of rules which should be moved / recreated into the paranoia mode&lt;br /&gt;
  | group&lt;br /&gt;
  | assigned&lt;br /&gt;
|-&lt;br /&gt;
  | Write new stricter siblings for existing rules&lt;br /&gt;
  | Noël&lt;br /&gt;
  | assigned&lt;br /&gt;
|-&lt;br /&gt;
  | Define ID-space for strict siblings&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Sort out mechanics of the paranoia mode&lt;br /&gt;
  | Christian&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Define exact syntax of paranoia mode setup&lt;br /&gt;
  | Christian&lt;br /&gt;
  | waiting&lt;br /&gt;
|-&lt;br /&gt;
  | Sort out name: Is &amp;quot;Paranoia Mode&amp;quot; really the right term?&lt;br /&gt;
  | Christian&lt;br /&gt;
  | waiting&lt;br /&gt;
|-&lt;br /&gt;
  | Write pull request&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Submit pull request&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Draw flowchart&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Write documentation&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Closed Tasks===&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''Task'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Who'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of rules, which triggered false positives in 2.2.X frequently&lt;br /&gt;
  | Christian&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 2.2.x rules, which have disappeared from 3.0.0-rc1&lt;br /&gt;
  | Spartan&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 3.0.0-rc1 rules, which could be accompanied with&amp;lt;br /&amp;gt;stricter siblings in paranoia mode&amp;lt;br /&amp;gt;(same idea of the rule, but harder limit etc.)&lt;br /&gt;
  | Christian&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 3.0.0-rc1 rules, which could be moved to the paranoia mode&lt;br /&gt;
  | Franziska&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of disappeared / missing 2.2.X base_rules, which should be brought back&lt;br /&gt;
  | group&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 2.2.X optional and experimental rules, which should be brought back&lt;br /&gt;
  | group&lt;br /&gt;
  | closed (could be repeated more throughly)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Rules==&lt;br /&gt;
&lt;br /&gt;
===Paranoia Mode Candidates===&lt;br /&gt;
&lt;br /&gt;
The 3.0.0-rc1 has all rules renumbered. Existing numbering was fairly crazy and the new numbering follows the numbering scheme of the rules files (-&amp;gt; 9&amp;lt;2-digit-rulefile&amp;gt;&amp;lt;3-digit-id&amp;gt;)&lt;br /&gt;
A mapping table exists [[https://github.com/SpiderLabs/owasp-modsecurity-crs/blob/v3.0.0-rc1/id_renumbering/IdNumbering.csv IdNumbering.csv]]&lt;br /&gt;
We need to make sure, we do not mess things up, so let's add both IDs to the table, the old one and the new one.&lt;br /&gt;
&lt;br /&gt;
Please set status as follows : ''candidate'', ''cloning-candidate'', ''unsure'', ''dropped''. &lt;br /&gt;
* 'cloning-candidates' are rules, that could be cloned into an even stricter variant with a stricter limit in a higher paranoia setting.&lt;br /&gt;
* If dropped, please provide reasoning in the remarks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''RuleID 2.2.x'''&lt;br /&gt;
  |'''RuleID 3.0.0-rc1'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''msg'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Remarks'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | 900050&lt;br /&gt;
  | 910100&lt;br /&gt;
  | Client IP is from a HIGH Risk Country Location.&lt;br /&gt;
  | unsure&lt;br /&gt;
  | Franziska's candidate: Do we want to exlude countries? But then easy to configure.&lt;br /&gt;
|-&lt;br /&gt;
  | 950001&lt;br /&gt;
  | 942150&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Also Franziska's candidate: @pmf file with very short function names, could match frequently.&lt;br /&gt;
|-&lt;br /&gt;
  | 950109&lt;br /&gt;
  | 920230&lt;br /&gt;
  | Multiple URL Encoding Detected&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 950120&lt;br /&gt;
  | 931130&lt;br /&gt;
  | Possible Remote File Inclusion (RFI) Attack: Off-Domain Reference/Link&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Walter's 2.2.X candidate: many FP; Chrstian: hardly any FPs, #discuss&lt;br /&gt;
|-&lt;br /&gt;
  | 960335&lt;br /&gt;
  | 920380&lt;br /&gt;
  | Too many arguments in request&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Walter's 2.2.X candidate: some FP (phpMyAdmin, large forms), alternatively would recommend raising &amp;lt;code&amp;gt;tx.max_num_args&amp;lt;/code&amp;gt; to 1000&lt;br /&gt;
|-&lt;br /&gt;
  | 950901&lt;br /&gt;
  | 942130&lt;br /&gt;
  | SQL Injection Attack: SQL Tautology Detected.&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Also Franziska's candidate: legitimate sentences could match. Walter's 2.2.x experience: many FP in natural text however the rule seems to have merit&lt;br /&gt;
|-&lt;br /&gt;
  | 950907&lt;br /&gt;
  | 932100&lt;br /&gt;
  | System Command Injection&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Also Franziska's candidate: false positives possible because of @pmf, file with short cmds. Maybe we should split the data file #discuss &lt;br /&gt;
|-&lt;br /&gt;
  | 950916&lt;br /&gt;
  | 921170&lt;br /&gt;
  | HTTP Header Injection Attack via payload (CR/LF detected)&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Franziska's candidate: change action from pass to block and move to paranoia mode.&lt;br /&gt;
|-&lt;br /&gt;
  | 958977&lt;br /&gt;
  | 933110&lt;br /&gt;
  | PHP Injection Attack: Function Name Found&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Franziska's candidate: false positives possible because of @pmf, file with short function names. Maybe we should split the data file #discuss &lt;br /&gt;
|-&lt;br /&gt;
  | 958979&lt;br /&gt;
  | 933120&lt;br /&gt;
  | PHP Injection Attack: Configuration Directive Found&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Franziska's candidate: false positives possible because of @pmf, file with short configuration directives.&lt;br /&gt;
|-&lt;br /&gt;
  | 959070&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 959071&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 959072&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 959073&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 960015&lt;br /&gt;
  | 920300&lt;br /&gt;
  | Request Missing an Accept Header&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Also Franziska's candidate: Not every legitimate client behaves correctly. Walter's experience: many FP (PHP SoapClient)&lt;br /&gt;
|-&lt;br /&gt;
  | 960017&lt;br /&gt;
  | 920350&lt;br /&gt;
  | Host header is a numeric IP address&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Also Franziska's candidate: Not every legitimate client behaves correctly. Walter's experience: low FP (almost all are mass scans) #discuss&lt;br /&gt;
|-&lt;br /&gt;
  | 960024&lt;br /&gt;
  | gone  &lt;br /&gt;
  | Meta-Character Anomaly Detection Alert - Repetative Non-Word Characters&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 960035&lt;br /&gt;
  | 920440&lt;br /&gt;
  | URL file extension is restricted by policy&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 970901&lt;br /&gt;
  | 950100&lt;br /&gt;
  | The Application Returned a 500-Level Status Code&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Franziska's candidate: too strict, too generic, no data leakage happened so far. Walter: it's useful however to prevent attacker from distinguishing between a failed SQLi attempt (403 blocked by ModSec) or a query error due to vulnerable app (500 from application) #discuss&lt;br /&gt;
|-&lt;br /&gt;
  | 973300&lt;br /&gt;
  | gone  &lt;br /&gt;
  | Possible XSS Attack Detected - HTML Tag Handler&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP&lt;br /&gt;
|-&lt;br /&gt;
  | 973332&lt;br /&gt;
  | gone  &lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP&lt;br /&gt;
|-&lt;br /&gt;
  | 973333&lt;br /&gt;
  | gone  &lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981172&lt;br /&gt;
  | gone  &lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: very high FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981173&lt;br /&gt;
  | gone  &lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: very high FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981231&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Comment Sequence Detected.&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: high FP but rule seems useful&lt;br /&gt;
|-&lt;br /&gt;
  | 981240&lt;br /&gt;
  | 942300&lt;br /&gt;
  | Detects MySQL comments, conditions and ch(a)r injections&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981242&lt;br /&gt;
  | 942330&lt;br /&gt;
  | Detects classic SQL injection probings 1/2&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Also Franziska's candidate: one quote character already matches?? Walter: low FP, but seen in cookies injected by some US ISPs; &lt;br /&gt;
|-&lt;br /&gt;
  | 981243&lt;br /&gt;
  | 942370&lt;br /&gt;
  | Detects classic SQL injection probings 2/2&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981244&lt;br /&gt;
  | 942180&lt;br /&gt;
  | Detects basic SQL authentication bypass attempts 1/3&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP, #discuss&lt;br /&gt;
|-&lt;br /&gt;
  | 981245&lt;br /&gt;
  | 942260&lt;br /&gt;
  | Detects basic SQL authentication bypass attempts 2/3&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981246&lt;br /&gt;
  | 942340&lt;br /&gt;
  | Detects basic SQL authentication bypass attempts 3/3&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981248&lt;br /&gt;
  | 942210&lt;br /&gt;
  | Detects chained SQL injection attempts 1/2&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: low FP, #discuss&lt;br /&gt;
|-&lt;br /&gt;
  | 981249&lt;br /&gt;
  | 942310&lt;br /&gt;
  | Detects chained SQL injection attempts 2/2&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP but seen in very specific situations&lt;br /&gt;
|-&lt;br /&gt;
  | 981257&lt;br /&gt;
  | 942200&lt;br /&gt;
  | Detects MySQL comment-/space-obfuscated injections and backtick termination&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981260&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Hex Encoding Identified&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: high FP in long random strings&lt;br /&gt;
|-&lt;br /&gt;
  | 981318&lt;br /&gt;
  | 942110&lt;br /&gt;
  | SQL Injection Attack: Common Injection Testing Detected&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Franziska's candidate: one quote character at the beginning/end really not legitimate? Walter 2.2.X candidate: frequent FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981319&lt;br /&gt;
  | 942120&lt;br /&gt;
  | SQL Injection Attack: SQL Operator Detected&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Also Franziska's candidate: very short operators or strings already match. Walter: some FP (WooCommerce)&lt;br /&gt;
|-&lt;br /&gt;
  | 981049&lt;br /&gt;
  | 912100&lt;br /&gt;
  | Potential Denial of Service (DoS) Attack from ... - # of Request Bursts: ...	   &lt;br /&gt;
  | cloning-candidate	&lt;br /&gt;
  | limit currently at 2; could be set to 1; now, the attacker has to exceed dos_counter_threshold twice. With full reset of counter after first hit. Source: 2.2.X-&amp;gt;experimental rules&lt;br /&gt;
|-&lt;br /&gt;
  | 960901          &lt;br /&gt;
  | 920270			&lt;br /&gt;
  | Invalid character in request&lt;br /&gt;
  | cloning-candidate	&lt;br /&gt;
  | @validateByteRange 1-255; there was a conditional rule with stricter byterange 32-126 in 2.2.X as well&lt;br /&gt;
|-&lt;br /&gt;
  | 970003          &lt;br /&gt;
  | 951100			&lt;br /&gt;
  | none					   					   &lt;br /&gt;
  | cloning-candidate	&lt;br /&gt;
  | rule is only setting tx.sql_error_match. Could also trigger score directly&lt;br /&gt;
|-&lt;br /&gt;
  | 950907          &lt;br /&gt;
  | 932100			&lt;br /&gt;
  | Remote Command Execution (RCE) Attempt					   	   &lt;br /&gt;
  | cloning-candidate	&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 958977          &lt;br /&gt;
  | 933110			&lt;br /&gt;
  | PHP Injection Attack: Function Name Found					    &lt;br /&gt;
  | cloning-candidate&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 958979          &lt;br /&gt;
  | 933120			&lt;br /&gt;
  | PHP Injection Attack: Configuration Directive Found				    &lt;br /&gt;
  | cloning-candidate&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 958980          &lt;br /&gt;
  | 933130			&lt;br /&gt;
  | PHP Injection Attack: Variables Found					   	    &lt;br /&gt;
  | cloning-candidate&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 950001          &lt;br /&gt;
  | 942150			&lt;br /&gt;
  | SQL Injection Attack					   			    &lt;br /&gt;
  | cloning-candidate&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Rules from 2.2.X, missing in 3.0.0-rc1===&lt;br /&gt;
&lt;br /&gt;
It looks as if only the base_rules made it into 3.0.0. In fact there are a few rule ids know from the optional and experimental rule folders in 2.2.X, but it is more likely, these are new 3.0.0 rules reusing old rule ids as the rules (regexes and msg) do not match at all.&lt;br /&gt;
&lt;br /&gt;
When trying to generate the list below, be aware that the rule ids have been renumbered between 3.0.0-dev and 3.0.0-rc1. IdNumbering.csv in your friend.&lt;br /&gt;
&lt;br /&gt;
====Base rules====&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''2.2.X rule id'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''msg'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''remarks'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | 950002&lt;br /&gt;
  | System Command Access&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950006&lt;br /&gt;
  | System Command Injection&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950007&lt;br /&gt;
  | Blind SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950008&lt;br /&gt;
  | Injection of Undocumented ColdFusion Tags&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950010&lt;br /&gt;
  | LDAP Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950011&lt;br /&gt;
  | SSI injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950018&lt;br /&gt;
  | Universal PDF XSS URL Detected.&lt;br /&gt;
  | Walter: medium FP (foo.pdf#javascript)&lt;br /&gt;
|-&lt;br /&gt;
  | 950019&lt;br /&gt;
  | Email Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950908&lt;br /&gt;
  | SQL Injection Attack.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950921&lt;br /&gt;
  | Backdoor access&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950922&lt;br /&gt;
  | Backdoor access&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958000&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958001&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958002&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958003&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958004&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958005&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958006&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958007&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958008&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958009&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958010&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958011&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958012&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958013&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958016&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958017&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958018&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958019&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958020&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958022&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958023&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958024&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958025&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958026&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958027&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958028&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958030&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958031&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958032&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958033&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958034&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958036&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958037&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958038&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958039&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958040&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958041&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958045&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958046&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958047&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958049&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958051&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958052&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958054&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958056&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958057&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958059&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958291&lt;br /&gt;
  | Range: field exists and begins with 0.&lt;br /&gt;
  | Walter: high FP (Chrome PDF viewer) and not useful.&lt;br /&gt;
|-&lt;br /&gt;
  | 958404&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958405&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958406&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958407&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958408&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958409&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958410&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958411&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958412&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958413&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958414&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958415&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958416&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958417&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958418&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958419&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958420&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958421&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958422&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958423&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958976&lt;br /&gt;
  | PHP Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959070&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959071&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959072&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959073&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960014&lt;br /&gt;
  | Proxy access attempt&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960018&lt;br /&gt;
  | Invalid character in request&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960020&lt;br /&gt;
  | Pragma Header requires Cache-Control Header for HTTP/1.1 requests.&lt;br /&gt;
  | Walter: some FP&lt;br /&gt;
|-&lt;br /&gt;
  | 960022&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960024&lt;br /&gt;
  | Meta-Character Anomaly Detection Alert - Repetative Non-Word Characters&lt;br /&gt;
  | Walter: many FP&lt;br /&gt;
|-&lt;br /&gt;
  | 960902&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960913&lt;br /&gt;
  | Invalid request&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970007&lt;br /&gt;
  | Zope Information Leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970008&lt;br /&gt;
  | Cold Fusion Information Leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970010&lt;br /&gt;
  | ISA server existence revealed&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970011&lt;br /&gt;
  | File or Directory Names Leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970012&lt;br /&gt;
  | Microsoft Office document properties leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970016&lt;br /&gt;
  | Cold Fusion source code leakage&lt;br /&gt;
  | Walter: some FP but not using this language&lt;br /&gt;
|-&lt;br /&gt;
  | 970018&lt;br /&gt;
  | IIS installed in default location&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970021&lt;br /&gt;
  | WebLogic information disclosure&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970903&lt;br /&gt;
  | ASP/JSP source code leakage&lt;br /&gt;
  | Walter: some FP but not using this language&lt;br /&gt;
|-&lt;br /&gt;
  | 973300&lt;br /&gt;
  | Possible XSS Attack Detected - HTML Tag Handler&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973301&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973302&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973303&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973304&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973305&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973306&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973307&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973308&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973309&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973310&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973311&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973312&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973313&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973314&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973316&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973325&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973327&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973328&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973329&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973330&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973331&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973332&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973333&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973334&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | Walter: many FP in text&lt;br /&gt;
|-&lt;br /&gt;
  | 973335&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | Walter: many FP in text&lt;br /&gt;
|-&lt;br /&gt;
  | 973347&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981000&lt;br /&gt;
  | Possibly malicious iframe tag in output&lt;br /&gt;
  | Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981001&lt;br /&gt;
  | Possibly malicious iframe tag in output&lt;br /&gt;
  | Walter: medium FP (iframes with display:none)&lt;br /&gt;
|-&lt;br /&gt;
  | 981003&lt;br /&gt;
  | Malicious iframe+javascript tag in output&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981004&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Excessive fromCharCode&lt;br /&gt;
  | Walter: many FP (Wordpress 4.4 inlined emoji javascripts)&lt;br /&gt;
|-&lt;br /&gt;
  | 981005&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Eval+Unescape&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981006&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Unescape&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981007&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Heap Spray&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981018&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981022&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981133&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981134&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981136&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981172&lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | Walter: many FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981173&lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | Walter: many FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981177&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981178&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981231&lt;br /&gt;
  | SQL Comment Sequence Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981260&lt;br /&gt;
  | SQL Hex Encoding Identified&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981300&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981301&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981302&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981303&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981304&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981305&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981306&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981307&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981308&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981309&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981310&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981311&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981312&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981313&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981314&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981315&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981316&lt;br /&gt;
  | SQL SELECT Statement Anomaly Detection Alert&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981317&lt;br /&gt;
  | SQL SELECT Statement Anomaly Detection Alert&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 990012&lt;br /&gt;
  | Rogue web site crawler&lt;br /&gt;
  | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
====Optional, experimental, slr rules====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | 900048&lt;br /&gt;
 | Identifies Reflected XSS (optional_rules)&lt;br /&gt;
 | Walter: could be very interesting candidate but have not used it in production&lt;br /&gt;
|-&lt;br /&gt;
 | 920021, 920022, 920023&lt;br /&gt;
 | Possible Credit Card Track 1 Data Leakage. (experimental_rules)&lt;br /&gt;
 | Walter: could be interesting candidates but have not used it in production&lt;br /&gt;
|-&lt;br /&gt;
 | 981080, 920020, 920006&lt;br /&gt;
 | Detect CC# in output and block transaction (optional_rules)&lt;br /&gt;
 | Walter: could be interesting candidate but have not used it in production&lt;br /&gt;
|-&lt;br /&gt;
 | 900047, 900048, 981180, 981182&lt;br /&gt;
 | Identifies Stored XSS (optional_rules)&lt;br /&gt;
 | Walter: could be somewhat interesting candidate but have not used it in production&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Stricter siblings for existing rules ===&lt;br /&gt;
&lt;br /&gt;
The siblings detection rates and the anomaly ratings are drastically adjusted. To prevent loads of false positives, the rules can be filtered for common FP cases through chaining.&lt;br /&gt;
&lt;br /&gt;
==== 981173 : SQL Injection Character Anomaly Usage ====&lt;br /&gt;
&lt;br /&gt;
Original ID (2.2.X): 981173&amp;lt;br&amp;gt;&lt;br /&gt;
Change: Regex counter decreased to '1', anomaly score set to 'critical', paranoia tag added&amp;lt;br&amp;gt;&lt;br /&gt;
FP Filter: UUIDs&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  #&lt;br /&gt;
  # -=[ SQL Injection Character Anomaly Usage ]=-&lt;br /&gt;
  #&lt;br /&gt;
  # This is a paranoid sibling to 2.2.9 Rule 981173.&lt;br /&gt;
  # The regex limit is set to {1,}, adjust to your own needs.&lt;br /&gt;
  # For dealing with false positives caused by uuids, the rule is now chained.&lt;br /&gt;
  # Also the anomaly score is now set to critical.&lt;br /&gt;
  #&lt;br /&gt;
  SecRule ARGS_NAMES|ARGS|XML:/* &amp;quot;([\~\!\@\#\$\%\^\&amp;amp;\*\(\)\-\+\=\{\}\[\]\|\:\;\&amp;quot;\'\´\’\‘\`\&amp;lt;\&amp;gt;].*?){1,}&amp;quot;\&lt;br /&gt;
        &amp;quot;chain,\&lt;br /&gt;
        phase:request,\&lt;br /&gt;
        rev:'2',\&lt;br /&gt;
        ver:'OWASP_CRS/3.0.0',\&lt;br /&gt;
        maturity:'X',\&lt;br /&gt;
        accuracy:'Y',\&lt;br /&gt;
        t:none,t:urlDecodeUni,\&lt;br /&gt;
        block,\&lt;br /&gt;
        msg:'Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded',\&lt;br /&gt;
        id:'XXXXXX',\&lt;br /&gt;
        tag:'OWASP_CRS/WEB_ATTACK/SQL_INJECTION',\&lt;br /&gt;
        tag:'Paranoia rule on level 40',\&lt;br /&gt;
        logdata:'Matched Data: %{TX.1} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}',\&lt;br /&gt;
        severity:'CRITICAL',\&lt;br /&gt;
        setvar:'tx.msg=%{rule.msg}',\&lt;br /&gt;
        setvar:tx.%{rule.id}-OWASP_CRS/WEB_ATTACK/RESTRICTED_SQLI_CHARS-%{matched_var_name}=%{tx.0}&amp;quot;&lt;br /&gt;
        SecRule MATCHED_VARS &amp;quot;!@rx ^[a-f0-9-]{36}$&amp;quot;\&lt;br /&gt;
                &amp;quot;t:lowercase,\&lt;br /&gt;
                setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
                setvar:tx.sql_injection_score=+1&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Project Status==&lt;br /&gt;
&lt;br /&gt;
===Project Status January 30, 2016===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
Hello everybody,&lt;br /&gt;
&lt;br /&gt;
It's time to do a status report of our little core rules project.&lt;br /&gt;
&lt;br /&gt;
I am including Franziska Bühler and Walter Hop in this status mail.&lt;br /&gt;
Both are experienced ModSec sysadmins. Franziska contributed to this&lt;br /&gt;
first stage, Walter told me he does not have much time, but he&lt;br /&gt;
was interested in participating at least in the discussions about&lt;br /&gt;
the rules.&lt;br /&gt;
&lt;br /&gt;
All in all, this is taking more time than anticipated. But we&lt;br /&gt;
have also done things very throughly than I thought. Which is&lt;br /&gt;
generally a good thing.&lt;br /&gt;
&lt;br /&gt;
Done so far:&lt;br /&gt;
* Manuel has provided us with a list of rules removed between 2.2.x and 3.0.0rc1&lt;br /&gt;
* I have assembled a list of rules known to trigger false positives frequently in the 2.2.x ruleset, they are thus candidates for the paranoia mode&lt;br /&gt;
* Franziska has looked through the 3.0.0rc1 rules and identified a set of rules which look like good candidates.&lt;br /&gt;
* Noël has sharpened his skills by re-writing 981173 in a way that ignores innocent UUIDs. In my eyes, he found a very elegant solution.&lt;br /&gt;
* With the development of 3.0.0-dev, Chaim unfortunately reused rule ids formerly used with optional and experimental rules. Now this has all been renumbered. I have pointed this out in the mailinglist and had private contact with Chaim where he confirmed the fact - and promised to resolve the issue.&lt;br /&gt;
&lt;br /&gt;
We have not really looked at the disappeared rules and identified those&lt;br /&gt;
who should be brought back and have not been picked so far. This&lt;br /&gt;
includes the 2.2.X base_rules, but also the optional, experimental,&lt;br /&gt;
and huge stock of slr rules. Of these three groups, only the&lt;br /&gt;
anti-ddos rules have made it into 3.0.0. There are probably more&lt;br /&gt;
interesting candidates.&lt;br /&gt;
&lt;br /&gt;
If somebody among you wants to look into these, then that would be&lt;br /&gt;
welcome, but I do not want to have these tasks delay us any further.&lt;br /&gt;
After all, Old rules can also be brought back in subsequent releases&lt;br /&gt;
if we see a benefit.&lt;br /&gt;
&lt;br /&gt;
So the next real tasks are:&lt;br /&gt;
* Looking through the list of candidates and cloning-candidates (the latter are those rules we might accompany with a clone with stricter limits in paranoia mode).&lt;br /&gt;
* Defining the exact working of the paranoia mode.&lt;br /&gt;
&lt;br /&gt;
Please sit down and look through the rule lists in the wiki and add&lt;br /&gt;
remarks with regards to the candidate rules. If you think a rule&lt;br /&gt;
should be included, if you think an individual rule should not be&lt;br /&gt;
included etc.&lt;br /&gt;
&lt;br /&gt;
I am also going to invite the people on the mailinglist to take look at&lt;br /&gt;
the rules as well and add their remarks in the wiki (or respond via mail).&lt;br /&gt;
This should allow us to nail down the list of rules which will&lt;br /&gt;
actually be included in the paranoia mode.&lt;br /&gt;
&lt;br /&gt;
As for defining the exact working of the paranoia mode, I guess I&lt;br /&gt;
need to write down the idea I have in mind and see if it makes sense to&lt;br /&gt;
you.&lt;br /&gt;
&lt;br /&gt;
Thank you for contributing so far! It is a lot of fun to work in a team!&lt;br /&gt;
&lt;br /&gt;
Christian&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode&amp;diff=208043</id>
		<title>OWASP ModSec CRS Paranoia Mode</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode&amp;diff=208043"/>
				<updated>2016-02-03T12:26:35Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: /* 981173 : SQL Injection Character Anomaly Usage */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Abstract==&lt;br /&gt;
&lt;br /&gt;
This is a page about the development of a paranoia mode aka bringing back the rules that used to yield a high number of false positives. This little project is aimed at inclusion into the 3.0.0 release of the OWASP ModSecurity Core Rules, where some rules have been removed in order to reduce the number of false positives with vanilla installations.&lt;br /&gt;
&lt;br /&gt;
FIXME: Detailed description&lt;br /&gt;
&lt;br /&gt;
''Back to the [https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project OWASP ModSecurity Core Rules Set].''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Sub-Project Infos==&lt;br /&gt;
&lt;br /&gt;
* '''Status''': active (January 2016)&lt;br /&gt;
* '''Schedule''': Pull request in &amp;lt;strike&amp;gt;January&amp;lt;/strike&amp;gt;February  2016&lt;br /&gt;
* '''Who''': Christian Folini (dune73), Noël Zindel (zino), Franziska Bühler (franziskabuehler), Manuel Leos (Spartan), Walter Hop (lifeforms)&lt;br /&gt;
* '''Documentation''': Here on the [https://www.owasp.org/index.php/OWASP_ModSec_CRS_Paranoia_Mode OWASP Wiki]&lt;br /&gt;
* '''Discussion / Archive''': &amp;lt;tt&amp;gt;owasp-modsecurity-core-rule-set@lists.owasp.org&amp;lt;/tt&amp;gt; / archive: http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/&lt;br /&gt;
* '''Github Link''': https://github.com/SpiderLabs/owasp-modsecurity-crs/tree/v3.0.0-rc1&lt;br /&gt;
* '''Final Pull Request''': FIXME&lt;br /&gt;
&lt;br /&gt;
==Tasks==&lt;br /&gt;
&lt;br /&gt;
===Open Tasks===&lt;br /&gt;
&lt;br /&gt;
Please define state as follows: ''new'', ''assigned'', ''waiting'', ''closed''. When a task it is closed, it is moved to the seperate closed tasks table below.&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''Task'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Who'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | Nail down final list of rules which should be moved / recreated into the paranoia mode&lt;br /&gt;
  | group&lt;br /&gt;
  | assigned&lt;br /&gt;
|-&lt;br /&gt;
  | Write new stricter siblings for existing rules&lt;br /&gt;
  | Noël&lt;br /&gt;
  | assigned&lt;br /&gt;
|-&lt;br /&gt;
  | Define ID-space for strict siblings&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Sort out mechanics of the paranoia mode&lt;br /&gt;
  | Christian&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Define exact syntax of paranoia mode setup&lt;br /&gt;
  | Christian&lt;br /&gt;
  | waiting&lt;br /&gt;
|-&lt;br /&gt;
  | Sort out name: Is &amp;quot;Paranoia Mode&amp;quot; really the right term?&lt;br /&gt;
  | Christian&lt;br /&gt;
  | waiting&lt;br /&gt;
|-&lt;br /&gt;
  | Write pull request&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Submit pull request&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Draw flowchart&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Write documentation&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Closed Tasks===&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''Task'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Who'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of rules, which triggered false positives in 2.2.X frequently&lt;br /&gt;
  | Christian&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 2.2.x rules, which have disappeared from 3.0.0-rc1&lt;br /&gt;
  | Spartan&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 3.0.0-rc1 rules, which could be accompanied with&amp;lt;br /&amp;gt;stricter siblings in paranoia mode&amp;lt;br /&amp;gt;(same idea of the rule, but harder limit etc.)&lt;br /&gt;
  | Christian&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 3.0.0-rc1 rules, which could be moved to the paranoia mode&lt;br /&gt;
  | Franziska&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of disappeared / missing 2.2.X base_rules, which should be brought back&lt;br /&gt;
  | group&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 2.2.X optional and experimental rules, which should be brought back&lt;br /&gt;
  | group&lt;br /&gt;
  | closed (could be repeated more throughly)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Rules==&lt;br /&gt;
&lt;br /&gt;
===Paranoia Mode Candidates===&lt;br /&gt;
&lt;br /&gt;
The 3.0.0-rc1 has all rules renumbered. Existing numbering was fairly crazy and the new numbering follows the numbering scheme of the rules files (-&amp;gt; 9&amp;lt;2-digit-rulefile&amp;gt;&amp;lt;3-digit-id&amp;gt;)&lt;br /&gt;
A mapping table exists [[https://github.com/SpiderLabs/owasp-modsecurity-crs/blob/v3.0.0-rc1/id_renumbering/IdNumbering.csv IdNumbering.csv]]&lt;br /&gt;
We need to make sure, we do not mess things up, so let's add both IDs to the table, the old one and the new one.&lt;br /&gt;
&lt;br /&gt;
Please set status as follows : ''candidate'', ''cloning-candidate'', ''unsure'', ''dropped''. &lt;br /&gt;
* 'cloning-candidates' are rules, that could be cloned into an even stricter variant with a stricter limit in a higher paranoia setting.&lt;br /&gt;
* If dropped, please provide reasoning in the remarks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''RuleID 2.2.x'''&lt;br /&gt;
  |'''RuleID 3.0.0-rc1'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''msg'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Remarks'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | 900050&lt;br /&gt;
  | 910100&lt;br /&gt;
  | Client IP is from a HIGH Risk Country Location.&lt;br /&gt;
  | unsure&lt;br /&gt;
  | Franziska's candidate: Do we want to exlude countries? But then easy to configure.&lt;br /&gt;
|-&lt;br /&gt;
  | 950001&lt;br /&gt;
  | 942150&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Also Franziska's candidate: @pmf file with very short function names, could match frequently.&lt;br /&gt;
|-&lt;br /&gt;
  | 950109&lt;br /&gt;
  | 920230&lt;br /&gt;
  | Multiple URL Encoding Detected&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 950120&lt;br /&gt;
  | 931130&lt;br /&gt;
  | Possible Remote File Inclusion (RFI) Attack: Off-Domain Reference/Link&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Walter's 2.2.X candidate: many FP; Chrstian: hardly any FPs, #discuss&lt;br /&gt;
|-&lt;br /&gt;
  | 960335&lt;br /&gt;
  | 920380&lt;br /&gt;
  | Too many arguments in request&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Walter's 2.2.X candidate: some FP (phpMyAdmin, large forms), alternatively would recommend raising &amp;lt;code&amp;gt;tx.max_num_args&amp;lt;/code&amp;gt; to 1000&lt;br /&gt;
|-&lt;br /&gt;
  | 950901&lt;br /&gt;
  | 942130&lt;br /&gt;
  | SQL Injection Attack: SQL Tautology Detected.&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Also Franziska's candidate: legitimate sentences could match. Walter's 2.2.x experience: many FP in natural text however the rule seems to have merit&lt;br /&gt;
|-&lt;br /&gt;
  | 950907&lt;br /&gt;
  | 932100&lt;br /&gt;
  | System Command Injection&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Also Franziska's candidate: false positives possible because of @pmf, file with short cmds. Maybe we should split the data file #discuss &lt;br /&gt;
|-&lt;br /&gt;
  | 950916&lt;br /&gt;
  | 921170&lt;br /&gt;
  | HTTP Header Injection Attack via payload (CR/LF detected)&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Franziska's candidate: change action from pass to block and move to paranoia mode.&lt;br /&gt;
|-&lt;br /&gt;
  | 958977&lt;br /&gt;
  | 933110&lt;br /&gt;
  | PHP Injection Attack: Function Name Found&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Franziska's candidate: false positives possible because of @pmf, file with short function names. Maybe we should split the data file #discuss &lt;br /&gt;
|-&lt;br /&gt;
  | 958979&lt;br /&gt;
  | 933120&lt;br /&gt;
  | PHP Injection Attack: Configuration Directive Found&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Franziska's candidate: false positives possible because of @pmf, file with short configuration directives.&lt;br /&gt;
|-&lt;br /&gt;
  | 959070&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 959071&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 959072&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 959073&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 960015&lt;br /&gt;
  | 920300&lt;br /&gt;
  | Request Missing an Accept Header&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Also Franziska's candidate: Not every legitimate client behaves correctly. Walter's experience: many FP (PHP SoapClient)&lt;br /&gt;
|-&lt;br /&gt;
  | 960017&lt;br /&gt;
  | 920350&lt;br /&gt;
  | Host header is a numeric IP address&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Also Franziska's candidate: Not every legitimate client behaves correctly. Walter's experience: low FP (almost all are mass scans) #discuss&lt;br /&gt;
|-&lt;br /&gt;
  | 960024&lt;br /&gt;
  | gone  &lt;br /&gt;
  | Meta-Character Anomaly Detection Alert - Repetative Non-Word Characters&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 960035&lt;br /&gt;
  | 920440&lt;br /&gt;
  | URL file extension is restricted by policy&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 970901&lt;br /&gt;
  | 950100&lt;br /&gt;
  | The Application Returned a 500-Level Status Code&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Franziska's candidate: too strict, too generic, no data leakage happened so far. Walter: it's useful however to prevent attacker from distinguishing between a failed SQLi attempt (403 blocked by ModSec) or a query error due to vulnerable app (500 from application) #discuss&lt;br /&gt;
|-&lt;br /&gt;
  | 973300&lt;br /&gt;
  | gone  &lt;br /&gt;
  | Possible XSS Attack Detected - HTML Tag Handler&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP&lt;br /&gt;
|-&lt;br /&gt;
  | 973332&lt;br /&gt;
  | gone  &lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP&lt;br /&gt;
|-&lt;br /&gt;
  | 973333&lt;br /&gt;
  | gone  &lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981172&lt;br /&gt;
  | gone  &lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: very high FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981173&lt;br /&gt;
  | gone  &lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: very high FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981231&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Comment Sequence Detected.&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: high FP but rule seems useful&lt;br /&gt;
|-&lt;br /&gt;
  | 981240&lt;br /&gt;
  | 942300&lt;br /&gt;
  | Detects MySQL comments, conditions and ch(a)r injections&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981242&lt;br /&gt;
  | 942330&lt;br /&gt;
  | Detects classic SQL injection probings 1/2&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Also Franziska's candidate: one quote character already matches?? Walter: low FP, but seen in cookies injected by some US ISPs; &lt;br /&gt;
|-&lt;br /&gt;
  | 981243&lt;br /&gt;
  | 942370&lt;br /&gt;
  | Detects classic SQL injection probings 2/2&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981244&lt;br /&gt;
  | 942180&lt;br /&gt;
  | Detects basic SQL authentication bypass attempts 1/3&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP, #discuss&lt;br /&gt;
|-&lt;br /&gt;
  | 981245&lt;br /&gt;
  | 942260&lt;br /&gt;
  | Detects basic SQL authentication bypass attempts 2/3&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981246&lt;br /&gt;
  | 942340&lt;br /&gt;
  | Detects basic SQL authentication bypass attempts 3/3&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981248&lt;br /&gt;
  | 942210&lt;br /&gt;
  | Detects chained SQL injection attempts 1/2&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: low FP, #discuss&lt;br /&gt;
|-&lt;br /&gt;
  | 981249&lt;br /&gt;
  | 942310&lt;br /&gt;
  | Detects chained SQL injection attempts 2/2&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP but seen in very specific situations&lt;br /&gt;
|-&lt;br /&gt;
  | 981257&lt;br /&gt;
  | 942200&lt;br /&gt;
  | Detects MySQL comment-/space-obfuscated injections and backtick termination&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981260&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Hex Encoding Identified&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: high FP in long random strings&lt;br /&gt;
|-&lt;br /&gt;
  | 981318&lt;br /&gt;
  | 942110&lt;br /&gt;
  | SQL Injection Attack: Common Injection Testing Detected&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Franziska's candidate: one quote character at the beginning/end really not legitimate? Walter 2.2.X candidate: frequent FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981319&lt;br /&gt;
  | 942120&lt;br /&gt;
  | SQL Injection Attack: SQL Operator Detected&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Also Franziska's candidate: very short operators or strings already match. Walter: some FP (WooCommerce)&lt;br /&gt;
|-&lt;br /&gt;
  | 981049&lt;br /&gt;
  | 912100&lt;br /&gt;
  | Potential Denial of Service (DoS) Attack from ... - # of Request Bursts: ...	   &lt;br /&gt;
  | cloning-candidate	&lt;br /&gt;
  | limit currently at 2; could be set to 1; now, the attacker has to exceed dos_counter_threshold twice. With full reset of counter after first hit. Source: 2.2.X-&amp;gt;experimental rules&lt;br /&gt;
|-&lt;br /&gt;
  | 960901          &lt;br /&gt;
  | 920270			&lt;br /&gt;
  | Invalid character in request&lt;br /&gt;
  | cloning-candidate	&lt;br /&gt;
  | @validateByteRange 1-255; there was a conditional rule with stricter byterange 32-126 in 2.2.X as well&lt;br /&gt;
|-&lt;br /&gt;
  | 970003          &lt;br /&gt;
  | 951100			&lt;br /&gt;
  | none					   					   &lt;br /&gt;
  | cloning-candidate	&lt;br /&gt;
  | rule is only setting tx.sql_error_match. Could also trigger score directly&lt;br /&gt;
|-&lt;br /&gt;
  | 950907          &lt;br /&gt;
  | 932100			&lt;br /&gt;
  | Remote Command Execution (RCE) Attempt					   	   &lt;br /&gt;
  | cloning-candidate	&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 958977          &lt;br /&gt;
  | 933110			&lt;br /&gt;
  | PHP Injection Attack: Function Name Found					    &lt;br /&gt;
  | cloning-candidate&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 958979          &lt;br /&gt;
  | 933120			&lt;br /&gt;
  | PHP Injection Attack: Configuration Directive Found				    &lt;br /&gt;
  | cloning-candidate&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 958980          &lt;br /&gt;
  | 933130			&lt;br /&gt;
  | PHP Injection Attack: Variables Found					   	    &lt;br /&gt;
  | cloning-candidate&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 950001          &lt;br /&gt;
  | 942150			&lt;br /&gt;
  | SQL Injection Attack					   			    &lt;br /&gt;
  | cloning-candidate&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Rules from 2.2.X, missing in 3.0.0-rc1===&lt;br /&gt;
&lt;br /&gt;
It looks as if only the base_rules made it into 3.0.0. In fact there are a few rule ids know from the optional and experimental rule folders in 2.2.X, but it is more likely, these are new 3.0.0 rules reusing old rule ids as the rules (regexes and msg) do not match at all.&lt;br /&gt;
&lt;br /&gt;
When trying to generate the list below, be aware that the rule ids have been renumbered between 3.0.0-dev and 3.0.0-rc1. IdNumbering.csv in your friend.&lt;br /&gt;
&lt;br /&gt;
====Base rules====&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''2.2.X rule id'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''msg'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''remarks'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | 950002&lt;br /&gt;
  | System Command Access&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950006&lt;br /&gt;
  | System Command Injection&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950007&lt;br /&gt;
  | Blind SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950008&lt;br /&gt;
  | Injection of Undocumented ColdFusion Tags&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950010&lt;br /&gt;
  | LDAP Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950011&lt;br /&gt;
  | SSI injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950018&lt;br /&gt;
  | Universal PDF XSS URL Detected.&lt;br /&gt;
  | Walter: medium FP (foo.pdf#javascript)&lt;br /&gt;
|-&lt;br /&gt;
  | 950019&lt;br /&gt;
  | Email Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950908&lt;br /&gt;
  | SQL Injection Attack.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950921&lt;br /&gt;
  | Backdoor access&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950922&lt;br /&gt;
  | Backdoor access&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958000&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958001&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958002&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958003&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958004&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958005&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958006&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958007&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958008&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958009&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958010&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958011&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958012&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958013&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958016&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958017&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958018&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958019&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958020&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958022&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958023&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958024&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958025&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958026&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958027&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958028&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958030&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958031&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958032&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958033&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958034&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958036&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958037&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958038&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958039&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958040&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958041&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958045&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958046&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958047&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958049&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958051&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958052&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958054&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958056&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958057&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958059&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958291&lt;br /&gt;
  | Range: field exists and begins with 0.&lt;br /&gt;
  | Walter: high FP (Chrome PDF viewer) and not useful.&lt;br /&gt;
|-&lt;br /&gt;
  | 958404&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958405&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958406&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958407&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958408&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958409&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958410&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958411&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958412&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958413&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958414&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958415&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958416&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958417&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958418&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958419&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958420&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958421&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958422&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958423&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958976&lt;br /&gt;
  | PHP Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959070&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959071&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959072&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959073&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960014&lt;br /&gt;
  | Proxy access attempt&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960018&lt;br /&gt;
  | Invalid character in request&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960020&lt;br /&gt;
  | Pragma Header requires Cache-Control Header for HTTP/1.1 requests.&lt;br /&gt;
  | Walter: some FP&lt;br /&gt;
|-&lt;br /&gt;
  | 960022&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960024&lt;br /&gt;
  | Meta-Character Anomaly Detection Alert - Repetative Non-Word Characters&lt;br /&gt;
  | Walter: many FP&lt;br /&gt;
|-&lt;br /&gt;
  | 960902&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960913&lt;br /&gt;
  | Invalid request&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970007&lt;br /&gt;
  | Zope Information Leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970008&lt;br /&gt;
  | Cold Fusion Information Leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970010&lt;br /&gt;
  | ISA server existence revealed&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970011&lt;br /&gt;
  | File or Directory Names Leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970012&lt;br /&gt;
  | Microsoft Office document properties leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970016&lt;br /&gt;
  | Cold Fusion source code leakage&lt;br /&gt;
  | Walter: some FP but not using this language&lt;br /&gt;
|-&lt;br /&gt;
  | 970018&lt;br /&gt;
  | IIS installed in default location&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970021&lt;br /&gt;
  | WebLogic information disclosure&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970903&lt;br /&gt;
  | ASP/JSP source code leakage&lt;br /&gt;
  | Walter: some FP but not using this language&lt;br /&gt;
|-&lt;br /&gt;
  | 973300&lt;br /&gt;
  | Possible XSS Attack Detected - HTML Tag Handler&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973301&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973302&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973303&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973304&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973305&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973306&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973307&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973308&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973309&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973310&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973311&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973312&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973313&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973314&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973316&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973325&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973327&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973328&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973329&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973330&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973331&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973332&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973333&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973334&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | Walter: many FP in text&lt;br /&gt;
|-&lt;br /&gt;
  | 973335&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | Walter: many FP in text&lt;br /&gt;
|-&lt;br /&gt;
  | 973347&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981000&lt;br /&gt;
  | Possibly malicious iframe tag in output&lt;br /&gt;
  | Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981001&lt;br /&gt;
  | Possibly malicious iframe tag in output&lt;br /&gt;
  | Walter: medium FP (iframes with display:none)&lt;br /&gt;
|-&lt;br /&gt;
  | 981003&lt;br /&gt;
  | Malicious iframe+javascript tag in output&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981004&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Excessive fromCharCode&lt;br /&gt;
  | Walter: many FP (Wordpress 4.4 inlined emoji javascripts)&lt;br /&gt;
|-&lt;br /&gt;
  | 981005&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Eval+Unescape&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981006&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Unescape&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981007&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Heap Spray&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981018&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981022&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981133&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981134&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981136&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981172&lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | Walter: many FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981173&lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | Walter: many FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981177&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981178&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981231&lt;br /&gt;
  | SQL Comment Sequence Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981260&lt;br /&gt;
  | SQL Hex Encoding Identified&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981300&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981301&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981302&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981303&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981304&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981305&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981306&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981307&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981308&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981309&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981310&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981311&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981312&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981313&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981314&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981315&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981316&lt;br /&gt;
  | SQL SELECT Statement Anomaly Detection Alert&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981317&lt;br /&gt;
  | SQL SELECT Statement Anomaly Detection Alert&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 990012&lt;br /&gt;
  | Rogue web site crawler&lt;br /&gt;
  | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
====Optional, experimental, slr rules====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | 900048&lt;br /&gt;
 | Identifies Reflected XSS (optional_rules)&lt;br /&gt;
 | Walter: could be very interesting candidate but have not used it in production&lt;br /&gt;
|-&lt;br /&gt;
 | 920021, 920022, 920023&lt;br /&gt;
 | Possible Credit Card Track 1 Data Leakage. (experimental_rules)&lt;br /&gt;
 | Walter: could be interesting candidates but have not used it in production&lt;br /&gt;
|-&lt;br /&gt;
 | 981080, 920020, 920006&lt;br /&gt;
 | Detect CC# in output and block transaction (optional_rules)&lt;br /&gt;
 | Walter: could be interesting candidate but have not used it in production&lt;br /&gt;
|-&lt;br /&gt;
 | 900047, 900048, 981180, 981182&lt;br /&gt;
 | Identifies Stored XSS (optional_rules)&lt;br /&gt;
 | Walter: could be somewhat interesting candidate but have not used it in production&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Stricter siblings for existing rules ===&lt;br /&gt;
&lt;br /&gt;
The siblings detection rates and the anomaly ratings are drastically adjusted. To prevent loads of false positives, the rules can be filtered for common FP cases through chaining.&lt;br /&gt;
&lt;br /&gt;
==== 981173 : SQL Injection Character Anomaly Usage ====&lt;br /&gt;
&lt;br /&gt;
Original ID (2.2.X): 981173&amp;lt;br&amp;gt;&lt;br /&gt;
Change: Regex counter decreased to '1', anomaly score set to 'critical'&amp;lt;br&amp;gt;&lt;br /&gt;
FP Filter: UUIDs&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  #&lt;br /&gt;
  # -=[ SQL Injection Character Anomaly Usage ]=-&lt;br /&gt;
  #&lt;br /&gt;
  # This is a paranoid sibling to 2.2.9 Rule 981173.&lt;br /&gt;
  # The regex limit is set to {1,}, adjust to your own needs.&lt;br /&gt;
  # For dealing with false positives caused by uuids, the rule is now chained.&lt;br /&gt;
  # Also the anomaly score is now set to critical.&lt;br /&gt;
  #&lt;br /&gt;
  SecRule ARGS_NAMES|ARGS|XML:/* &amp;quot;([\~\!\@\#\$\%\^\&amp;amp;\*\(\)\-\+\=\{\}\[\]\|\:\;\&amp;quot;\'\´\’\‘\`\&amp;lt;\&amp;gt;].*?){1,}&amp;quot;\&lt;br /&gt;
        &amp;quot;chain,\&lt;br /&gt;
        phase:request,\&lt;br /&gt;
        rev:'2',\&lt;br /&gt;
        ver:'OWASP_CRS/3.0.0',\&lt;br /&gt;
        maturity:'X',\&lt;br /&gt;
        accuracy:'Y',\&lt;br /&gt;
        t:none,t:urlDecodeUni,\&lt;br /&gt;
        block,\&lt;br /&gt;
        msg:'Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded',\&lt;br /&gt;
        id:'XXXXXX',\&lt;br /&gt;
        tag:'OWASP_CRS/WEB_ATTACK/SQL_INJECTION',\&lt;br /&gt;
        tag:'Paranoia level 40',\&lt;br /&gt;
        logdata:'Matched Data: %{TX.1} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}',\&lt;br /&gt;
        severity:'CRITICAL',\&lt;br /&gt;
        setvar:'tx.msg=%{rule.msg}',\&lt;br /&gt;
        setvar:tx.%{rule.id}-OWASP_CRS/WEB_ATTACK/RESTRICTED_SQLI_CHARS-%{matched_var_name}=%{tx.0}&amp;quot;&lt;br /&gt;
        SecRule MATCHED_VARS &amp;quot;!@rx ^[a-f0-9-]{36}$&amp;quot;\&lt;br /&gt;
                &amp;quot;t:lowercase,\&lt;br /&gt;
                setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
                setvar:tx.sql_injection_score=+1&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Project Status==&lt;br /&gt;
&lt;br /&gt;
===Project Status January 30, 2016===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
Hello everybody,&lt;br /&gt;
&lt;br /&gt;
It's time to do a status report of our little core rules project.&lt;br /&gt;
&lt;br /&gt;
I am including Franziska Bühler and Walter Hop in this status mail.&lt;br /&gt;
Both are experienced ModSec sysadmins. Franziska contributed to this&lt;br /&gt;
first stage, Walter told me he does not have much time, but he&lt;br /&gt;
was interested in participating at least in the discussions about&lt;br /&gt;
the rules.&lt;br /&gt;
&lt;br /&gt;
All in all, this is taking more time than anticipated. But we&lt;br /&gt;
have also done things very throughly than I thought. Which is&lt;br /&gt;
generally a good thing.&lt;br /&gt;
&lt;br /&gt;
Done so far:&lt;br /&gt;
* Manuel has provided us with a list of rules removed between 2.2.x and 3.0.0rc1&lt;br /&gt;
* I have assembled a list of rules known to trigger false positives frequently in the 2.2.x ruleset, they are thus candidates for the paranoia mode&lt;br /&gt;
* Franziska has looked through the 3.0.0rc1 rules and identified a set of rules which look like good candidates.&lt;br /&gt;
* Noël has sharpened his skills by re-writing 981173 in a way that ignores innocent UUIDs. In my eyes, he found a very elegant solution.&lt;br /&gt;
* With the development of 3.0.0-dev, Chaim unfortunately reused rule ids formerly used with optional and experimental rules. Now this has all been renumbered. I have pointed this out in the mailinglist and had private contact with Chaim where he confirmed the fact - and promised to resolve the issue.&lt;br /&gt;
&lt;br /&gt;
We have not really looked at the disappeared rules and identified those&lt;br /&gt;
who should be brought back and have not been picked so far. This&lt;br /&gt;
includes the 2.2.X base_rules, but also the optional, experimental,&lt;br /&gt;
and huge stock of slr rules. Of these three groups, only the&lt;br /&gt;
anti-ddos rules have made it into 3.0.0. There are probably more&lt;br /&gt;
interesting candidates.&lt;br /&gt;
&lt;br /&gt;
If somebody among you wants to look into these, then that would be&lt;br /&gt;
welcome, but I do not want to have these tasks delay us any further.&lt;br /&gt;
After all, Old rules can also be brought back in subsequent releases&lt;br /&gt;
if we see a benefit.&lt;br /&gt;
&lt;br /&gt;
So the next real tasks are:&lt;br /&gt;
* Looking through the list of candidates and cloning-candidates (the latter are those rules we might accompany with a clone with stricter limits in paranoia mode).&lt;br /&gt;
* Defining the exact working of the paranoia mode.&lt;br /&gt;
&lt;br /&gt;
Please sit down and look through the rule lists in the wiki and add&lt;br /&gt;
remarks with regards to the candidate rules. If you think a rule&lt;br /&gt;
should be included, if you think an individual rule should not be&lt;br /&gt;
included etc.&lt;br /&gt;
&lt;br /&gt;
I am also going to invite the people on the mailinglist to take look at&lt;br /&gt;
the rules as well and add their remarks in the wiki (or respond via mail).&lt;br /&gt;
This should allow us to nail down the list of rules which will&lt;br /&gt;
actually be included in the paranoia mode.&lt;br /&gt;
&lt;br /&gt;
As for defining the exact working of the paranoia mode, I guess I&lt;br /&gt;
need to write down the idea I have in mind and see if it makes sense to&lt;br /&gt;
you.&lt;br /&gt;
&lt;br /&gt;
Thank you for contributing so far! It is a lot of fun to work in a team!&lt;br /&gt;
&lt;br /&gt;
Christian&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode&amp;diff=207615</id>
		<title>OWASP ModSec CRS Paranoia Mode</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode&amp;diff=207615"/>
				<updated>2016-01-28T17:48:15Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: /* 981173 : SQL Injection Character Anomaly Usage */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Abstract==&lt;br /&gt;
&lt;br /&gt;
This is a page about the development of a paranoia mode aka bringing back the rules that used to yield a high number of false positives. This little project is aimed at inclusion into the 3.0.0 release of the OWASP ModSecurity Core Rules, where some rules have been removed in order to reduce the number of false positives with vanilla installations.&lt;br /&gt;
&lt;br /&gt;
FIXME: Detailed description&lt;br /&gt;
&lt;br /&gt;
''Back to the [https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project OWASP ModSecurity Core Rules Set].''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Sub-Project Infos==&lt;br /&gt;
&lt;br /&gt;
* '''Status''': active (January 2016)&lt;br /&gt;
* '''Schedule''': Pull request in January 2016&lt;br /&gt;
* '''Who''': Christian Folini (dune73), Noël Zindel (zino), Franziska Bühler (franziskabuehler), Manuel Leos (Spartan), FIXME&lt;br /&gt;
* '''Documentation''': Here on the [https://www.owasp.org/index.php/OWASP_ModSec_CRS_Paranoia_Mode OWASP Wiki]&lt;br /&gt;
* '''Discussion / Archive''': &amp;lt;tt&amp;gt;owasp-modsecurity-core-rule-set@lists.owasp.org&amp;lt;/tt&amp;gt; / archive: http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/&lt;br /&gt;
* '''Github Link''': https://github.com/SpiderLabs/owasp-modsecurity-crs/tree/v3.0.0-rc1&lt;br /&gt;
* '''Final Pull Request''': FIXME&lt;br /&gt;
&lt;br /&gt;
==Tasks==&lt;br /&gt;
&lt;br /&gt;
===Open Tasks===&lt;br /&gt;
&lt;br /&gt;
Please define state as follows: ''new'', ''assigned'', ''waiting'', ''closed''. When a task it is closed, it is moved to the seperate closed tasks table below.&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''Task'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Who'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of disappeared / missing 2.2.X base_rules, which should be brought back&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 2.2.X optional and experimental rules, which should be brought back&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 3.0.0-rc1 rules, which could be moved to the paranoia mode&lt;br /&gt;
  | Franziska&lt;br /&gt;
  | assigned&lt;br /&gt;
|-&lt;br /&gt;
  | Nail down final list of rules which should be moved / recreated into the paranoia mode&lt;br /&gt;
  | group&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Write new stricter siblings for existing rules&lt;br /&gt;
  | Noël&lt;br /&gt;
  | assigned&lt;br /&gt;
|-&lt;br /&gt;
  | Define ID-space for strict siblings&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Sort out mechanics of the paranoia mode&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Define exact syntax of paranoia mode setup&lt;br /&gt;
  | Christian&lt;br /&gt;
  | waiting&lt;br /&gt;
|-&lt;br /&gt;
  | Sort out name: Is &amp;quot;Paranoia Mode&amp;quot; really the right term?&lt;br /&gt;
  | Christian&lt;br /&gt;
  | waiting&lt;br /&gt;
|-&lt;br /&gt;
  | Write pull request&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Submit pull request&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Draw flowchart&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Write documentation&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Closed Tasks===&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''Task'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Who'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of rules, which triggered false positives in 2.2.X frequently&lt;br /&gt;
  | Christian&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 2.2.x rules, which have disappeared from 3.0.0-rc1&lt;br /&gt;
  | Spartan&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 3.0.0-rc1 rules, which could be accompanied with&amp;lt;br /&amp;gt;stricter siblings in paranoia mode&amp;lt;br /&amp;gt;(same idea of the rule, but harder limit etc.)&lt;br /&gt;
  | Christian&lt;br /&gt;
  | closed&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Rules==&lt;br /&gt;
&lt;br /&gt;
===Paranoia Mode Candidates===&lt;br /&gt;
&lt;br /&gt;
The 3.0.0-rc1 has all rules renumbered. Existing numbering was fairly crazy and the new numbering follows the numbering scheme of the rules files (-&amp;gt; 9&amp;lt;2-digit-rulefile&amp;gt;&amp;lt;3-digit-id&amp;gt;)&lt;br /&gt;
A mapping table exists [[https://github.com/SpiderLabs/owasp-modsecurity-crs/blob/v3.0.0-rc1/id_renumbering/IdNumbering.csv IdNumbering.csv]]&lt;br /&gt;
We need to make sure, we do not mess things up, so let's add both IDs to the table, the old one and the new one.&lt;br /&gt;
&lt;br /&gt;
Please set status as follows : ''candidate'', ''cloning-candidate'', ''unsure'', ''dropped''. &lt;br /&gt;
* 'cloning-candidates' are rules, that could be cloned into an even stricter variant with a stricter limit in a higher paranoia setting.&lt;br /&gt;
* If dropped, please provide reasoning in the remarks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''RuleID 2.2.x'''&lt;br /&gt;
  |'''RuleID 3.0.0-rc1'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''msg'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Remarks'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | 950001&lt;br /&gt;
  | 942150&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 950109&lt;br /&gt;
  | 920230&lt;br /&gt;
  | Multiple URL Encoding Detected&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 950901&lt;br /&gt;
  | 942130&lt;br /&gt;
  | SQL Injection Attack: SQL Tautology Detected.&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 950907&lt;br /&gt;
  | 932100&lt;br /&gt;
  | System Command Injection&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 959070&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 959071&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 959072&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 959073&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 960015&lt;br /&gt;
  | 920300&lt;br /&gt;
  | Request Missing an Accept Header&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 960017&lt;br /&gt;
  | 920350&lt;br /&gt;
  | Host header is a numeric IP address&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 960024&lt;br /&gt;
  | gone  &lt;br /&gt;
  | Meta-Character Anomaly Detection Alert - Repetative Non-Word Characters&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 960035&lt;br /&gt;
  | 920440&lt;br /&gt;
  | URL file extension is restricted by policy&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 973300&lt;br /&gt;
  | gone  &lt;br /&gt;
  | Possible XSS Attack Detected - HTML Tag Handler&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 973332&lt;br /&gt;
  | gone  &lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 973333&lt;br /&gt;
  | gone  &lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 981172&lt;br /&gt;
  | gone  &lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 981173&lt;br /&gt;
  | gone  &lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 981231&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Comment Sequence Detected.&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 981240&lt;br /&gt;
  | 942300&lt;br /&gt;
  | Detects MySQL comments, conditions and ch(a)r injections&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 981242&lt;br /&gt;
  | 942330&lt;br /&gt;
  | Detects classic SQL injection probings 1/2&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 981243&lt;br /&gt;
  | 942370&lt;br /&gt;
  | Detects classic SQL injection probings 2/2&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 981244&lt;br /&gt;
  | 942180&lt;br /&gt;
  | Detects basic SQL authentication bypass attempts 1/3&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 981245&lt;br /&gt;
  | 942260&lt;br /&gt;
  | Detects basic SQL authentication bypass attempts 2/3&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 981246&lt;br /&gt;
  | 942340&lt;br /&gt;
  | Detects basic SQL authentication bypass attempts 3/3&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 981248&lt;br /&gt;
  | 942210&lt;br /&gt;
  | Detects chained SQL injection attempts 1/2&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 981249&lt;br /&gt;
  | 942310&lt;br /&gt;
  | Detects chained SQL injection attempts 2/2&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 981257&lt;br /&gt;
  | 942200&lt;br /&gt;
  | Detects MySQL comment-/space-obfuscated injections and backtick termination&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 981260&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Hex Encoding Identified&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 981319&lt;br /&gt;
  | 942120&lt;br /&gt;
  | SQL Injection Attack: SQL Operator Detected&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 981049&lt;br /&gt;
  | 912100&lt;br /&gt;
  | Potential Denial of Service (DoS) Attack from ... - # of Request Bursts: ...	   &lt;br /&gt;
  | cloning-candidate	&lt;br /&gt;
  | limit currently at 2; could be set to 1; now, the attacker has to exceed dos_counter_threshold twice. With full reset of counter after first hit. Source: 2.2.X-&amp;gt;experimental rules&lt;br /&gt;
|-&lt;br /&gt;
  | 960901          &lt;br /&gt;
  | 920270			&lt;br /&gt;
  | Invalid character in request&lt;br /&gt;
  | cloning-candidate	&lt;br /&gt;
  | @validateByteRange 1-255; there was a conditional rule with stricter byterange 32-126 in 2.2.X as well&lt;br /&gt;
|-&lt;br /&gt;
  | 970003          &lt;br /&gt;
  | 951100			&lt;br /&gt;
  | none					   					   &lt;br /&gt;
  | cloning-candidate	&lt;br /&gt;
  | rule is only setting tx.sql_error_match. Could also trigger score directly&lt;br /&gt;
|-&lt;br /&gt;
  | 950907          &lt;br /&gt;
  | 932100			&lt;br /&gt;
  | Remote Command Execution (RCE) Attempt					   	   &lt;br /&gt;
  | cloning-candidate	&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 958977          &lt;br /&gt;
  | 933110			&lt;br /&gt;
  | PHP Injection Attack: Function Name Found					    &lt;br /&gt;
  | cloning-candidate&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 958979          &lt;br /&gt;
  | 933120			&lt;br /&gt;
  | PHP Injection Attack: Configuration Directive Found				    &lt;br /&gt;
  | cloning-candidate&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 958980          &lt;br /&gt;
  | 933130			&lt;br /&gt;
  | PHP Injection Attack: Variables Found					   	    &lt;br /&gt;
  | cloning-candidate&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 950001          &lt;br /&gt;
  | 942150			&lt;br /&gt;
  | SQL Injection Attack					   			    &lt;br /&gt;
  | cloning-candidate&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Rules from 2.2.X, missing in 3.0.0-rc1===&lt;br /&gt;
&lt;br /&gt;
It looks as if only the base_rules made it into 3.0.0. In fact there are a few rule ids know from the optional and experimental rule folders in 2.2.X, but it is more likely, these are new 3.0.0 rules reusing old rule ids as the rules (regexes and msg) do not match at all.&lt;br /&gt;
&lt;br /&gt;
When trying to generate the list below, be aware that the rule ids have been renumbered between 3.0.0-dev and 3.0.0-rc1. IdNumbering.csv in your friend.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''2.2.X rule id'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''msg'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''remarks'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | 950002&lt;br /&gt;
  | System Command Access&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950006&lt;br /&gt;
  | System Command Injection&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950007&lt;br /&gt;
  | Blind SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950008&lt;br /&gt;
  | Injection of Undocumented ColdFusion Tags&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950010&lt;br /&gt;
  | LDAP Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950011&lt;br /&gt;
  | SSI injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950018&lt;br /&gt;
  | Universal PDF XSS URL Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950019&lt;br /&gt;
  | Email Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950908&lt;br /&gt;
  | SQL Injection Attack.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950921&lt;br /&gt;
  | Backdoor access&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950922&lt;br /&gt;
  | Backdoor access&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958000&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958001&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958002&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958003&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958004&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958005&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958006&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958007&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958008&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958009&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958010&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958011&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958012&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958013&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958016&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958017&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958018&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958019&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958020&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958022&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958023&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958024&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958025&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958026&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958027&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958028&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958030&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958031&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958032&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958033&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958034&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958036&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958037&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958038&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958039&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958040&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958041&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958045&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958046&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958047&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958049&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958051&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958052&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958054&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958056&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958057&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958059&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958291&lt;br /&gt;
  | Range: field exists and begins with 0.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958404&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958405&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958406&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958407&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958408&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958409&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958410&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958411&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958412&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958413&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958414&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958415&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958416&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958417&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958418&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958419&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958420&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958421&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958422&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958423&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958976&lt;br /&gt;
  | PHP Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959070&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959071&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959072&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959073&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960014&lt;br /&gt;
  | Proxy access attempt&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960018&lt;br /&gt;
  | Invalid character in request&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960020&lt;br /&gt;
  | Pragma Header requires Cache-Control Header for HTTP/1.1 requests.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960022&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960024&lt;br /&gt;
  | Meta-Character Anomaly Detection Alert - Repetative Non-Word Characters&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960902&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960913&lt;br /&gt;
  | Invalid request&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970007&lt;br /&gt;
  | Zope Information Leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970008&lt;br /&gt;
  | Cold Fusion Information Leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970010&lt;br /&gt;
  | ISA server existence revealed&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970011&lt;br /&gt;
  | File or Directory Names Leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970012&lt;br /&gt;
  | Microsoft Office document properties leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970016&lt;br /&gt;
  | Cold Fusion source code leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970018&lt;br /&gt;
  | IIS installed in default location&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970021&lt;br /&gt;
  | WebLogic information disclosure&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970903&lt;br /&gt;
  | ASP/JSP source code leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973300&lt;br /&gt;
  | Possible XSS Attack Detected - HTML Tag Handler&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973301&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973302&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973303&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973304&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973305&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973306&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973307&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973308&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973309&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973310&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973311&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973312&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973313&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973314&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973316&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973325&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973327&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973328&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973329&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973330&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973331&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973332&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973333&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973334&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973335&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973347&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981000&lt;br /&gt;
  | Possibly malicious iframe tag in output&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981001&lt;br /&gt;
  | Possibly malicious iframe tag in output&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981003&lt;br /&gt;
  | Malicious iframe+javascript tag in output&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981004&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Excessive fromCharCode&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981005&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Eval+Unescape&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981006&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Unescape&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981007&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Heap Spray&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981018&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981022&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981133&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981134&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981136&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981172&lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981173&lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981177&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981178&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981231&lt;br /&gt;
  | SQL Comment Sequence Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981260&lt;br /&gt;
  | SQL Hex Encoding Identified&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981300&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981301&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981302&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981303&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981304&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981305&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981306&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981307&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981308&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981309&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981310&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981311&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981312&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981313&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981314&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981315&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981316&lt;br /&gt;
  | SQL SELECT Statement Anomaly Detection Alert&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981317&lt;br /&gt;
  | SQL SELECT Statement Anomaly Detection Alert&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 990012&lt;br /&gt;
  | Rogue web site crawler&lt;br /&gt;
  | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Stricter siblings for existing rules ===&lt;br /&gt;
&lt;br /&gt;
The siblings detection rates and the anomaly ratings are drastically adjusted. To prevent loads of false positives, the rules can be filtered for common FP cases through chaining.&lt;br /&gt;
&lt;br /&gt;
==== 981173 : SQL Injection Character Anomaly Usage ====&lt;br /&gt;
&lt;br /&gt;
Original ID (2.2.X): 981173&amp;lt;br&amp;gt;&lt;br /&gt;
Change: Regex counter decreased to '1', anomaly score set to 'critical'&amp;lt;br&amp;gt;&lt;br /&gt;
FP Filter: UUIDs&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  #&lt;br /&gt;
  # -=[ SQL Injection Character Anomaly Usage ]=-&lt;br /&gt;
  #&lt;br /&gt;
  # This is a paranoid sibling to 2.2.9 Rule 981173.&lt;br /&gt;
  # The regex limit is set to {1,}, adjust to your own needs.&lt;br /&gt;
  # For dealing with false positives caused by uuids, the rule is now chained.&lt;br /&gt;
  # Also the anomaly score is now set to critical.&lt;br /&gt;
  #&lt;br /&gt;
  SecRule ARGS_NAMES|ARGS|XML:/* &amp;quot;([\~\!\@\#\$\%\^\&amp;amp;\*\(\)\-\+\=\{\}\[\]\|\:\;\&amp;quot;\'\´\’\‘\`\&amp;lt;\&amp;gt;].*?){1,}&amp;quot;\&lt;br /&gt;
        &amp;quot;chain,\&lt;br /&gt;
        phase:request,\&lt;br /&gt;
        rev:'2',\&lt;br /&gt;
        ver:'OWASP_CRS/3.0.0',\&lt;br /&gt;
        maturity:'5',\&lt;br /&gt;
        accuracy:'6',\&lt;br /&gt;
        t:none,t:urlDecodeUni,\&lt;br /&gt;
        block,\&lt;br /&gt;
        msg:'Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded',\&lt;br /&gt;
        id:'10000',\&lt;br /&gt;
        tag:'OWASP_CRS/WEB_ATTACK/SQL_INJECTION',\&lt;br /&gt;
        logdata:'Matched Data: %{TX.1} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}',\&lt;br /&gt;
        severity:'CRITICAL',\&lt;br /&gt;
        setvar:'tx.msg=%{rule.msg}',\&lt;br /&gt;
        setvar:tx.%{rule.id}-OWASP_CRS/WEB_ATTACK/RESTRICTED_SQLI_CHARS-%{matched_var_name}=%{tx.0}&amp;quot;&lt;br /&gt;
        SecRule MATCHED_VARS &amp;quot;!@rx ^[a-f0-9-]{36}$&amp;quot;\&lt;br /&gt;
                &amp;quot;t:lowercase,\&lt;br /&gt;
                setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
                setvar:tx.sql_injection_score=+1&amp;quot;&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode&amp;diff=207604</id>
		<title>OWASP ModSec CRS Paranoia Mode</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode&amp;diff=207604"/>
				<updated>2016-01-28T13:38:17Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: 'Stricter siblings for existing rules' added&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Abstract==&lt;br /&gt;
&lt;br /&gt;
This is a page about the development of a paranoia mode aka bringing back the rules that used to yield a high number of false positives. This little project is aimed at inclusion into the 3.0.0 release of the OWASP ModSecurity Core Rules, where some rules have been removed in order to reduce the number of false positives with vanilla installations.&lt;br /&gt;
&lt;br /&gt;
FIXME: Detailed description&lt;br /&gt;
&lt;br /&gt;
''Back to the [https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project OWASP ModSecurity Core Rules Set].''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Sub-Project Infos==&lt;br /&gt;
&lt;br /&gt;
* '''Status''': active (January 2016)&lt;br /&gt;
* '''Schedule''': Pull request in January 2016&lt;br /&gt;
* '''Who''': Christian Folini (dune73), Noël Zindel (zino), Franziska Bühler (franziskabuehler), Manuel Leos (Spartan), FIXME&lt;br /&gt;
* '''Documentation''': Here on the [https://www.owasp.org/index.php/OWASP_ModSec_CRS_Paranoia_Mode OWASP Wiki]&lt;br /&gt;
* '''Discussion / Archive''': &amp;lt;tt&amp;gt;owasp-modsecurity-core-rule-set@lists.owasp.org&amp;lt;/tt&amp;gt; / archive: http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/&lt;br /&gt;
* '''Github Link''': https://github.com/SpiderLabs/owasp-modsecurity-crs/tree/v3.0.0-rc1&lt;br /&gt;
* '''Final Pull Request''': FIXME&lt;br /&gt;
&lt;br /&gt;
==Tasks==&lt;br /&gt;
&lt;br /&gt;
===Open Tasks===&lt;br /&gt;
&lt;br /&gt;
Please define state as follows: ''new'', ''assigned'', ''waiting'', ''closed''. When a task it is closed, it is moved to the seperate closed tasks table below.&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''Task'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Who'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of disappeared / missing 2.2.X base_rules, which should be brought back&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 2.2.X optional and experimental rules, which should be brought back&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 3.0.0-rc1 rules, which could be moved to the paranoia mode&lt;br /&gt;
  | Franziska&lt;br /&gt;
  | assigned&lt;br /&gt;
|-&lt;br /&gt;
  | Nail down final list of rules which should be moved / recreated into the paranoia mode&lt;br /&gt;
  | group&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Write new stricter siblings for existing rules&lt;br /&gt;
  | Noël&lt;br /&gt;
  | assigned&lt;br /&gt;
|-&lt;br /&gt;
  | Define ID-space for strict siblings&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Sort out mechanics of the paranoia mode&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Define exact syntax of paranoia mode setup&lt;br /&gt;
  | Christian&lt;br /&gt;
  | waiting&lt;br /&gt;
|-&lt;br /&gt;
  | Sort out name: Is &amp;quot;Paranoia Mode&amp;quot; really the right term?&lt;br /&gt;
  | Christian&lt;br /&gt;
  | waiting&lt;br /&gt;
|-&lt;br /&gt;
  | Write pull request&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Submit pull request&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Draw flowchart&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Write documentation&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Closed Tasks===&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''Task'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Who'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of rules, which triggered false positives in 2.2.X frequently&lt;br /&gt;
  | Christian&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 2.2.x rules, which have disappeared from 3.0.0-rc1&lt;br /&gt;
  | Spartan&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 3.0.0-rc1 rules, which could be accompanied with&amp;lt;br /&amp;gt;stricter siblings in paranoia mode&amp;lt;br /&amp;gt;(same idea of the rule, but harder limit etc.)&lt;br /&gt;
  | Christian&lt;br /&gt;
  | closed&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Rules==&lt;br /&gt;
&lt;br /&gt;
===Paranoia Mode Candidates===&lt;br /&gt;
&lt;br /&gt;
The 3.0.0-rc1 has all rules renumbered. Existing numbering was fairly crazy and the new numbering follows the numbering scheme of the rules files (-&amp;gt; 9&amp;lt;2-digit-rulefile&amp;gt;&amp;lt;3-digit-id&amp;gt;)&lt;br /&gt;
A mapping table exists [[https://github.com/SpiderLabs/owasp-modsecurity-crs/blob/v3.0.0-rc1/id_renumbering/IdNumbering.csv IdNumbering.csv]]&lt;br /&gt;
We need to make sure, we do not mess things up, so let's add both IDs to the table, the old one and the new one.&lt;br /&gt;
&lt;br /&gt;
Please set status as follows : ''candidate'', ''cloning-candidate'', ''unsure'', ''dropped''. &lt;br /&gt;
* 'cloning-candidates' are rules, that could be cloned into an even stricter variant with a stricter limit in a higher paranoia setting.&lt;br /&gt;
* If dropped, please provide reasoning in the remarks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''RuleID 2.2.x'''&lt;br /&gt;
  |'''RuleID 3.0.0-rc1'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''msg'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Remarks'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | 950001&lt;br /&gt;
  | 942150&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 950109&lt;br /&gt;
  | 920230&lt;br /&gt;
  | Multiple URL Encoding Detected&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 950901&lt;br /&gt;
  | 942130&lt;br /&gt;
  | SQL Injection Attack: SQL Tautology Detected.&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 950907&lt;br /&gt;
  | 932100&lt;br /&gt;
  | System Command Injection&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 959070&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 959071&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 959072&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 959073&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 960015&lt;br /&gt;
  | 920300&lt;br /&gt;
  | Request Missing an Accept Header&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 960017&lt;br /&gt;
  | 920350&lt;br /&gt;
  | Host header is a numeric IP address&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 960024&lt;br /&gt;
  | gone  &lt;br /&gt;
  | Meta-Character Anomaly Detection Alert - Repetative Non-Word Characters&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 960035&lt;br /&gt;
  | 920440&lt;br /&gt;
  | URL file extension is restricted by policy&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 973300&lt;br /&gt;
  | gone  &lt;br /&gt;
  | Possible XSS Attack Detected - HTML Tag Handler&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 973332&lt;br /&gt;
  | gone  &lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 973333&lt;br /&gt;
  | gone  &lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 981172&lt;br /&gt;
  | gone  &lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 981173&lt;br /&gt;
  | gone  &lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 981231&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Comment Sequence Detected.&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 981240&lt;br /&gt;
  | 942300&lt;br /&gt;
  | Detects MySQL comments, conditions and ch(a)r injections&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 981242&lt;br /&gt;
  | 942330&lt;br /&gt;
  | Detects classic SQL injection probings 1/2&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 981243&lt;br /&gt;
  | 942370&lt;br /&gt;
  | Detects classic SQL injection probings 2/2&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 981244&lt;br /&gt;
  | 942180&lt;br /&gt;
  | Detects basic SQL authentication bypass attempts 1/3&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 981245&lt;br /&gt;
  | 942260&lt;br /&gt;
  | Detects basic SQL authentication bypass attempts 2/3&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 981246&lt;br /&gt;
  | 942340&lt;br /&gt;
  | Detects basic SQL authentication bypass attempts 3/3&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 981248&lt;br /&gt;
  | 942210&lt;br /&gt;
  | Detects chained SQL injection attempts 1/2&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 981249&lt;br /&gt;
  | 942310&lt;br /&gt;
  | Detects chained SQL injection attempts 2/2&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 981257&lt;br /&gt;
  | 942200&lt;br /&gt;
  | Detects MySQL comment-/space-obfuscated injections and backtick termination&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 981260&lt;br /&gt;
  | gone  &lt;br /&gt;
  | SQL Hex Encoding Identified&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 981319&lt;br /&gt;
  | 942120&lt;br /&gt;
  | SQL Injection Attack: SQL Operator Detected&lt;br /&gt;
  | candidate&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 981049&lt;br /&gt;
  | 912100&lt;br /&gt;
  | Potential Denial of Service (DoS) Attack from ... - # of Request Bursts: ...	   &lt;br /&gt;
  | cloning-candidate	&lt;br /&gt;
  | limit currently at 2; could be set to 1; now, the attacker has to exceed dos_counter_threshold twice. With full reset of counter after first hit. Source: 2.2.X-&amp;gt;experimental rules&lt;br /&gt;
|-&lt;br /&gt;
  | 960901          &lt;br /&gt;
  | 920270			&lt;br /&gt;
  | Invalid character in request&lt;br /&gt;
  | cloning-candidate	&lt;br /&gt;
  | @validateByteRange 1-255; there was a conditional rule with stricter byterange 32-126 in 2.2.X as well&lt;br /&gt;
|-&lt;br /&gt;
  | 970003          &lt;br /&gt;
  | 951100			&lt;br /&gt;
  | none					   					   &lt;br /&gt;
  | cloning-candidate	&lt;br /&gt;
  | rule is only setting tx.sql_error_match. Could also trigger score directly&lt;br /&gt;
|-&lt;br /&gt;
  | 950907          &lt;br /&gt;
  | 932100			&lt;br /&gt;
  | Remote Command Execution (RCE) Attempt					   	   &lt;br /&gt;
  | cloning-candidate	&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 958977          &lt;br /&gt;
  | 933110			&lt;br /&gt;
  | PHP Injection Attack: Function Name Found					    &lt;br /&gt;
  | cloning-candidate&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 958979          &lt;br /&gt;
  | 933120			&lt;br /&gt;
  | PHP Injection Attack: Configuration Directive Found				    &lt;br /&gt;
  | cloning-candidate&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 958980          &lt;br /&gt;
  | 933130			&lt;br /&gt;
  | PHP Injection Attack: Variables Found					   	    &lt;br /&gt;
  | cloning-candidate&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 950001          &lt;br /&gt;
  | 942150			&lt;br /&gt;
  | SQL Injection Attack					   			    &lt;br /&gt;
  | cloning-candidate&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Rules from 2.2.X, missing in 3.0.0-rc1===&lt;br /&gt;
&lt;br /&gt;
It looks as if only the base_rules made it into 3.0.0. In fact there are a few rule ids know from the optional and experimental rule folders in 2.2.X, but it is more likely, these are new 3.0.0 rules reusing old rule ids as the rules (regexes and msg) do not match at all.&lt;br /&gt;
&lt;br /&gt;
When trying to generate the list below, be aware that the rule ids have been renumbered between 3.0.0-dev and 3.0.0-rc1. IdNumbering.csv in your friend.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''2.2.X rule id'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''msg'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''remarks'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | 950002&lt;br /&gt;
  | System Command Access&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950006&lt;br /&gt;
  | System Command Injection&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950007&lt;br /&gt;
  | Blind SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950008&lt;br /&gt;
  | Injection of Undocumented ColdFusion Tags&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950010&lt;br /&gt;
  | LDAP Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950011&lt;br /&gt;
  | SSI injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950018&lt;br /&gt;
  | Universal PDF XSS URL Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950019&lt;br /&gt;
  | Email Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950908&lt;br /&gt;
  | SQL Injection Attack.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950921&lt;br /&gt;
  | Backdoor access&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950922&lt;br /&gt;
  | Backdoor access&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958000&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958001&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958002&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958003&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958004&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958005&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958006&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958007&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958008&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958009&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958010&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958011&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958012&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958013&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958016&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958017&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958018&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958019&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958020&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958022&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958023&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958024&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958025&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958026&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958027&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958028&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958030&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958031&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958032&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958033&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958034&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958036&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958037&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958038&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958039&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958040&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958041&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958045&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958046&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958047&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958049&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958051&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958052&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958054&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958056&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958057&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958059&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958291&lt;br /&gt;
  | Range: field exists and begins with 0.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958404&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958405&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958406&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958407&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958408&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958409&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958410&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958411&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958412&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958413&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958414&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958415&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958416&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958417&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958418&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958419&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958420&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958421&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958422&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958423&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958976&lt;br /&gt;
  | PHP Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959070&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959071&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959072&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959073&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960014&lt;br /&gt;
  | Proxy access attempt&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960018&lt;br /&gt;
  | Invalid character in request&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960020&lt;br /&gt;
  | Pragma Header requires Cache-Control Header for HTTP/1.1 requests.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960022&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960024&lt;br /&gt;
  | Meta-Character Anomaly Detection Alert - Repetative Non-Word Characters&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960902&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960913&lt;br /&gt;
  | Invalid request&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970007&lt;br /&gt;
  | Zope Information Leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970008&lt;br /&gt;
  | Cold Fusion Information Leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970010&lt;br /&gt;
  | ISA server existence revealed&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970011&lt;br /&gt;
  | File or Directory Names Leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970012&lt;br /&gt;
  | Microsoft Office document properties leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970016&lt;br /&gt;
  | Cold Fusion source code leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970018&lt;br /&gt;
  | IIS installed in default location&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970021&lt;br /&gt;
  | WebLogic information disclosure&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970903&lt;br /&gt;
  | ASP/JSP source code leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973300&lt;br /&gt;
  | Possible XSS Attack Detected - HTML Tag Handler&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973301&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973302&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973303&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973304&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973305&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973306&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973307&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973308&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973309&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973310&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973311&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973312&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973313&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973314&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973316&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973325&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973327&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973328&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973329&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973330&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973331&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973332&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973333&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973334&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973335&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973347&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981000&lt;br /&gt;
  | Possibly malicious iframe tag in output&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981001&lt;br /&gt;
  | Possibly malicious iframe tag in output&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981003&lt;br /&gt;
  | Malicious iframe+javascript tag in output&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981004&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Excessive fromCharCode&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981005&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Eval+Unescape&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981006&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Unescape&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981007&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Heap Spray&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981018&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981022&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981133&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981134&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981136&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981172&lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981173&lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981177&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981178&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981231&lt;br /&gt;
  | SQL Comment Sequence Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981260&lt;br /&gt;
  | SQL Hex Encoding Identified&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981300&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981301&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981302&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981303&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981304&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981305&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981306&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981307&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981308&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981309&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981310&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981311&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981312&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981313&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981314&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981315&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981316&lt;br /&gt;
  | SQL SELECT Statement Anomaly Detection Alert&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981317&lt;br /&gt;
  | SQL SELECT Statement Anomaly Detection Alert&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 990012&lt;br /&gt;
  | Rogue web site crawler&lt;br /&gt;
  | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Stricter siblings for existing rules ===&lt;br /&gt;
&lt;br /&gt;
The siblings detection rates and the anomaly ratings are drastically adjusted. To prevent loads of false positives, the rules can be filtered for common FP cases through chaining.&lt;br /&gt;
&lt;br /&gt;
==== SQL Injection Character Anomaly Usage ====&lt;br /&gt;
&lt;br /&gt;
Original ID: 981173&amp;lt;br&amp;gt;&lt;br /&gt;
Change: Regex counter decreased to '1', anomaly score set to 'critical'&amp;lt;br&amp;gt;&lt;br /&gt;
FP Filter: UUIDs&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  SecRule ARGS_NAMES|ARGS|XML:/* &amp;quot;([\~\!\@\#\$\%\^\&amp;amp;\*\(\)\-\+\=\{\}\[\]\|\:\;\&amp;quot;\'\´\’\‘\`\&amp;lt;\&amp;gt;].*?){1,}&amp;quot;\&lt;br /&gt;
        &amp;quot;chain,\&lt;br /&gt;
        phase:request,\&lt;br /&gt;
        rev:'2',\&lt;br /&gt;
        ver:'OWASP_CRS/3.0.0',\&lt;br /&gt;
        maturity:'5',\&lt;br /&gt;
        accuracy:'6',\&lt;br /&gt;
        t:none,t:urlDecodeUni,\&lt;br /&gt;
        block,\&lt;br /&gt;
        msg:'Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded',\&lt;br /&gt;
        id:'10000',\&lt;br /&gt;
        tag:'OWASP_CRS/WEB_ATTACK/SQL_INJECTION',\&lt;br /&gt;
        logdata:'Matched Data: %{TX.1} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}',\&lt;br /&gt;
        severity:'CRITICAL',\&lt;br /&gt;
        setvar:'tx.msg=%{rule.msg}',\&lt;br /&gt;
        setvar:tx.%{rule.id}-OWASP_CRS/WEB_ATTACK/RESTRICTED_SQLI_CHARS-%{matched_var_name}=%{tx.0}&amp;quot;&lt;br /&gt;
        SecRule MATCHED_VARS &amp;quot;!@rx ^[a-f0-9-]{36}$&amp;quot;\&lt;br /&gt;
                &amp;quot;t:lowercase,\&lt;br /&gt;
                setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},\&lt;br /&gt;
                setvar:tx.sql_injection_score=+1&amp;quot;&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode&amp;diff=206280</id>
		<title>OWASP ModSec CRS Paranoia Mode</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode&amp;diff=206280"/>
				<updated>2016-01-12T07:48:02Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: Tasks&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Abstract==&lt;br /&gt;
&lt;br /&gt;
This is a page about the development of a paranoia mode aka bringing back the rules that used to yield a high number of false positives. This little project is aimed at inclusion into the 3.0.0 release of the OWASP ModSecurity Core Rules, where some rules have been removed in order to reduce the number of false positives with vanilla installations.&lt;br /&gt;
&lt;br /&gt;
FIXME: Detailed description&lt;br /&gt;
&lt;br /&gt;
''Back to the [https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project OWASP ModSecurity Core Rules Set].''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Sub-Project Infos==&lt;br /&gt;
&lt;br /&gt;
* '''Status''': active (January 2016)&lt;br /&gt;
* '''Schedule''': Pull request in January 2016&lt;br /&gt;
* '''Who''': Christian Folini (dune73), Noël Zindel (zino), Franziska Bühler (FIXME), FIXME&lt;br /&gt;
* '''Documentation''': Here on the [https://www.owasp.org/index.php/OWASP_ModSec_CRS_Paranoia_Mode OWASP Wiki]&lt;br /&gt;
* '''Discussion / Archive''': &amp;lt;tt&amp;gt;owasp-modsecurity-core-rule-set@lists.owasp.org&amp;lt;/tt&amp;gt; / archive: http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/&lt;br /&gt;
* '''Github Link''': FIXME&lt;br /&gt;
* '''Final Pull Request''': FIXME&lt;br /&gt;
&lt;br /&gt;
==Tasks==&lt;br /&gt;
&lt;br /&gt;
===Open Tasks===&lt;br /&gt;
&lt;br /&gt;
Please define state as follows: ''new'', ''assigned'', ''waiting'', ''closed''. When a task it is closed, it is moved to the seperate closed tasks table below.&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''Task'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Who'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 2.2.x rules, which have disappeared from 3.0.0-rc1&lt;br /&gt;
  | Spartan&lt;br /&gt;
  | assigned&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of disappeared rules, which should be brought back&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 3.0.0-rc1 rules, which could be moved to the paranoia mode&lt;br /&gt;
  | Franziska&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 3.0.0-rc1 rules, which could be accompanied with&amp;lt;br /&amp;gt;stricter siblings in paranoia mode&amp;lt;br /&amp;gt;(same idea of the rule, but harder limit etc.)&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Write new stricter siblings for existing rules&lt;br /&gt;
  | Noël&lt;br /&gt;
  | assigned&lt;br /&gt;
|-&lt;br /&gt;
  | Sort out mechanics of the paranoia mode&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Define exact syntax of paranoia mode setup&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Sort out name: Is &amp;quot;Paranoia Mode&amp;quot; really the right term?&lt;br /&gt;
  | Christian&lt;br /&gt;
  | waiting&lt;br /&gt;
|-&lt;br /&gt;
  | Write pull request&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Submit pull request&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Draw flowchart&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Write documentation&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Closed Tasks===&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''Task'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Who'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | none so far&lt;br /&gt;
  | &amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Rules==&lt;br /&gt;
&lt;br /&gt;
===Paranoia Mode Candidates===&lt;br /&gt;
&lt;br /&gt;
The 3.0.0-rc1 has all rules renumbered. Existing numbering was fairly crazy and the new numbering follows the numbering scheme of the rules files (-&amp;gt; 9&amp;lt;2-digit-rulefile&amp;gt;&amp;lt;3-digit-id&amp;gt;)&lt;br /&gt;
A mapping table exists [[https://github.com/SpiderLabs/owasp-modsecurity-crs/blob/v3.0.0-rc1/id_renumbering/IdNumbering.csv IdNumbering.csv]]&lt;br /&gt;
We need to make sure, we do not mess things up, so let's add both IDs to the table, the old one and the new one.&lt;br /&gt;
&lt;br /&gt;
Please set status as follows : ''candidate'', ''cloning-candidate'', ''unsure'', ''dropped''. &lt;br /&gt;
* 'cloning-candidates' are rules, that could be cloned into an even stricter variant with a stricter limit in a higher paranoia setting.&lt;br /&gt;
* If dropped, please provide reasoning in the remarks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''RuleID 2.2.x'''&lt;br /&gt;
  |'''RuleID 3.0.0-rc1'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''msg'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Remarks'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | 981172&lt;br /&gt;
  | gone&lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | candidate&lt;br /&gt;
  | &lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode&amp;diff=206125</id>
		<title>OWASP ModSec CRS Paranoia Mode</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode&amp;diff=206125"/>
				<updated>2016-01-08T19:55:17Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: Sub-Project Infos: added &amp;quot;Noël Zindel&amp;quot; to &amp;quot;who&amp;quot;, Open Tasks: added &amp;quot;Noël&amp;quot; to Task &amp;quot;stricter siblings&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Abstract==&lt;br /&gt;
&lt;br /&gt;
This is a page about the development of a paranoia mode aka bringing back the rules that used to yield a high number of false positives. This little project is aimed at inclusion into the 3.0.0 release of the OWASP ModSecurity Core Rules, where some rules have been removed in order to reduce the number of false positives with vanilla installations.&lt;br /&gt;
&lt;br /&gt;
FIXME: Detailed description&lt;br /&gt;
&lt;br /&gt;
''Back to the [https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project OWASP ModSecurity Core Rules Set].''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Sub-Project Infos==&lt;br /&gt;
&lt;br /&gt;
* '''Status''': active (January 2016)&lt;br /&gt;
* '''Schedule''': Pull request in January 2016&lt;br /&gt;
* '''Who''': Christian Folini (dune73), Noël Zindel (zino), FIXME&lt;br /&gt;
* '''Documentation''': Here on the [https://www.owasp.org/index.php/OWASP_ModSec_CRS_Paranoia_Mode OWASP Wiki]&lt;br /&gt;
* '''Discussion / Archive''': &amp;lt;tt&amp;gt;owasp-modsecurity-core-rule-set@lists.owasp.org&amp;lt;/tt&amp;gt; / archive: http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/&lt;br /&gt;
* '''Github Link''': FIXME&lt;br /&gt;
* '''Final Pull Request''': FIXME&lt;br /&gt;
&lt;br /&gt;
==Tasks==&lt;br /&gt;
&lt;br /&gt;
===Open Tasks===&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''Task'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Who'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 2.2.x rules, which have disappeared from 3.0.0-rc1&lt;br /&gt;
  | Spartan&lt;br /&gt;
  | open&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of disappeared rules, which should be brought back&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | open&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 3.0.0-rc1 rules, which could be moved to the paranoia mode&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | open&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 3.0.0-rc1 rules, which could be accompanied with&amp;lt;br /&amp;gt;stricter siblings in paranoia mode&amp;lt;br /&amp;gt;(same idea of the rule, but harder limit etc.)&lt;br /&gt;
  | Noël&lt;br /&gt;
  | open&lt;br /&gt;
|-&lt;br /&gt;
  | Write new stricter siblings for existing rules&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | open&lt;br /&gt;
|-&lt;br /&gt;
  | Sort out mechanics of the paranoia mode&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | open&lt;br /&gt;
|-&lt;br /&gt;
  | Define exact syntax of paranoia mode setup&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | open&lt;br /&gt;
|-&lt;br /&gt;
  | Sort out name: Is &amp;quot;Paranoia Mode&amp;quot; really the right term?&lt;br /&gt;
  | Christian&lt;br /&gt;
  | open&lt;br /&gt;
|-&lt;br /&gt;
  | Write pull request&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | open&lt;br /&gt;
|-&lt;br /&gt;
  | Submit pull request&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | open&lt;br /&gt;
|-&lt;br /&gt;
  | Draw flowchart&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | open&lt;br /&gt;
|-&lt;br /&gt;
  | Write documentation&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | open&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Closed Tasks===&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''Task'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Who'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | none so far&lt;br /&gt;
  | &amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Zino&amp;diff=206124</id>
		<title>User:Zino</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Zino&amp;diff=206124"/>
				<updated>2016-01-08T19:49:06Z</updated>
		
		<summary type="html">&lt;p&gt;Zino: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Noël Zindel, Junior IT System Engineer with basic experience in Windows system administration and network administration in Cisco/Checkpoint environments.&lt;br /&gt;
Currently working on LPIC-1 certification and ModSecurity CRS Paranoia Mode for V3.0.&lt;br /&gt;
&lt;br /&gt;
Interests in open-source technologies and IT security.&lt;br /&gt;
&lt;br /&gt;
Languages: German and English&lt;br /&gt;
&lt;br /&gt;
Contact me via mail(at)noelzindel(dot)org&lt;br /&gt;
GPG KeyID 4BABD7E1&lt;/div&gt;</summary>
		<author><name>Zino</name></author>	</entry>

	</feed>