<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=ModSecurity_CRS_RuleID-960000</id>
		<title>ModSecurity CRS RuleID-960000 - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=ModSecurity_CRS_RuleID-960000"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ModSecurity_CRS_RuleID-960000&amp;action=history"/>
		<updated>2026-05-09T09:32:49Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ModSecurity_CRS_RuleID-960000&amp;diff=132223&amp;oldid=prev</id>
		<title>Josh Amishav-Zlatin: Created page with &quot;== Rule ID: 960000 ==  &lt;table style=&quot;border-style:double;border-width:3px;&quot; &gt; &lt;tr&gt;&lt;td style=&quot;border-style:solid;border-width:1px;background-color:#CCCCCC;text-transform:upperc...&quot;</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ModSecurity_CRS_RuleID-960000&amp;diff=132223&amp;oldid=prev"/>
				<updated>2012-06-27T13:20:08Z</updated>
		
		<summary type="html">&lt;p&gt;Created page with &amp;quot;== Rule ID: 960000 ==  &amp;lt;table style=&amp;quot;border-style:double;border-width:3px;&amp;quot; &amp;gt; &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border-style:solid;border-width:1px;background-color:#CCCCCC;text-transform:upperc...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;== Rule ID: 960000 ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table style=&amp;quot;border-style:double;border-width:3px;&amp;quot; &amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border-style:solid;border-width:1px;background-color:#CCCCCC;text-transform:uppercase &amp;quot; &amp;gt;Rule ID&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color:#F2F2F2;table-layout:fixed;width:700px;&amp;quot; &amp;gt;&lt;br /&gt;
960000&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border-style:solid;border-width:1px;background-color:#CCCCCC;text-transform:uppercase &amp;quot; &amp;gt;Rule Message&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color:#F2F2F2;table-layout:fixed;width:700px;&amp;quot; &amp;gt;&lt;br /&gt;
Attempted multipart/form-data bypass&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border-style:solid;border-width:1px;background-color:#CCCCCC;text-transform:uppercase &amp;quot; &amp;gt;Rule Summary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color:#F2F2F2;table-layout:fixed;width:700px;&amp;quot; &amp;gt;&lt;br /&gt;
Identify multipart/form-data name evasion attempts&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border-style:solid;border-width:1px;background-color:#CCCCCC;text-transform:uppercase &amp;quot; &amp;gt;Impact&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color:#F2F2F2;table-layout:fixed;width:700px;&amp;quot; &amp;gt;&lt;br /&gt;
2 - Critical&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border-style:solid;border-width:1px;background-color:#CCCCCC;text-transform:uppercase &amp;quot; &amp;gt;Rule&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color:#F2F2F2;table-layout:fixed;width:700px;&amp;quot; &amp;gt;&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
SecRule FILES_NAMES|FILES &amp;quot;['\&amp;quot;;=]&amp;quot; &amp;quot;phase:2,t:none,id:'960000',rev:'2.2.5',block,capture,msg:'Attempted multipart/form-data bypass',logdata:'%{matched_var}',severity:'2',setvar:'tx.msg=%{rule.msg}',setvar:'tx.id=%{rule.id}',tag:'RULE_MATURITY/7',tag:'RULE_ACCURACY/7',tag:'https://www.owasp.org/index.php/ModSecurity_CRS_RuleID-%{tx.id}',setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},setvar:tx.protocol_violation_score=+%{tx.notice_anomaly_score},setvar:tx.%{rule.id}-PROTOCOL_VIOLATION/INVALID_REQ-%{matched_var_name}=%{tx.0}&amp;quot;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border-style:solid;border-width:1px;background-color:#CCCCCC;text-transform:uppercase &amp;quot; &amp;gt;Detailed Rule Information&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color:#F2F2F2;table-layout:fixed;width:700px;&amp;quot; &amp;gt;&lt;br /&gt;
*There are possible impedance mismatches between how ModSecurity interprets multipart file names and how a destination app server such as PHP might parse the Content-Disposition data.&lt;br /&gt;
*These rules check for the existence of the ' &amp;quot; ; = meta-characters in either the file or file name variables in order to detect evasion attempts.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
///  A description of the regular expression:&lt;br /&gt;
///  &lt;br /&gt;
///  Match any (single) character contained within the brackets&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border-style:solid;border-width:1px;background-color:#CCCCCC;text-transform:uppercase &amp;quot; &amp;gt;Example Payload&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color:#F2F2F2;table-layout:fixed;width:700px;&amp;quot; &amp;gt;&lt;br /&gt;
Content-Disposition: form-data; name=&amp;quot;fileRap&amp;quot;; filename=&amp;quot;file=.txt&amp;quot;&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border-style:solid;border-width:1px;background-color:#CCCCCC;text-transform:uppercase &amp;quot; &amp;gt;Example Audit Log Entry&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color:#F2F2F2;table-layout:fixed;width:700px;&amp;quot; &amp;gt;&lt;br /&gt;
Include an example ModSecurity Audit Log Entry for when this rule matchs.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
--50b28e4c-A--&lt;br /&gt;
[27/Jun/2012:16:07:22 +0300] T@sFin8AAQEAADwGDRIAAAAA 127.0.0.1 56803 127.0.0.1 80&lt;br /&gt;
--50b28e4c-B--&lt;br /&gt;
POST /fileupload.asp HTTP/1.1&lt;br /&gt;
Host: localhost&lt;br /&gt;
Accept: */*&lt;br /&gt;
Accept-Language: en&lt;br /&gt;
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)&lt;br /&gt;
Connection: close&lt;br /&gt;
Referer: http://localhost/&lt;br /&gt;
Content-Type: multipart/form-data; boundary=--------397236876&lt;br /&gt;
Content-Length: 930&lt;br /&gt;
&lt;br /&gt;
--50b28e4c-C--&lt;br /&gt;
----------397236876&lt;br /&gt;
Content-Disposition: form-data; name=&amp;quot;fileRap&amp;quot;; filename=&amp;quot;file=.txt&amp;quot;&lt;br /&gt;
Content-Type: text/plain&lt;br /&gt;
&lt;br /&gt;
555-555-0199@example.com&lt;br /&gt;
----------397236876&lt;br /&gt;
&lt;br /&gt;
--50b28e4c-F--&lt;br /&gt;
HTTP/1.1 403 Forbidden&lt;br /&gt;
Vary: Accept-Encoding&lt;br /&gt;
Content-Length: 307&lt;br /&gt;
Connection: close&lt;br /&gt;
Content-Type: text/html; charset=iso-8859-1&lt;br /&gt;
&lt;br /&gt;
--50b28e4c-E--&lt;br /&gt;
&lt;br /&gt;
--50b28e4c-H--&lt;br /&gt;
Message: Access denied with code 403 (phase 2). Pattern match &amp;quot;['\&amp;quot;;=]&amp;quot; at FILES:fileRap. [file &amp;quot;/opt/modsecurity/etc/crs/base_rules/modsecurity_crs_20_protocol_violations.conf&amp;quot;] [line &amp;quot;73&amp;quot;] [id &amp;quot;960000&amp;quot;] [rev &amp;quot;2.2.5&amp;quot;] [msg &amp;quot;Attempted multipart/form-data bypass&amp;quot;] [data &amp;quot;file=.txt&amp;quot;] [severity &amp;quot;CRITICAL&amp;quot;] [tag &amp;quot;RULE_MATURITY/7&amp;quot;] [tag &amp;quot;RULE_ACCURACY/7&amp;quot;] [tag &amp;quot;https://www.owasp.org/index.php/ModSecurity_CRS_RuleID-960000&amp;quot;]&lt;br /&gt;
Action: Intercepted (phase 2)&lt;br /&gt;
Stopwatch: 1340802442388746 3425 (- - -)&lt;br /&gt;
Stopwatch2: 1340802442388746 3425; combined=2114, p1=1798, p2=300, p3=0, p4=0, p5=15, sr=91, sw=1, l=0, gc=0&lt;br /&gt;
Response-Body-Transformed: Dechunked&lt;br /&gt;
Producer: ModSecurity for Apache/2.7.0-dev1 (http://www.modsecurity.org/); core ruleset/2.2.5.&lt;br /&gt;
Server: Apache/2.2.22 (Debian)&lt;br /&gt;
Engine-Mode: &amp;quot;ENABLED&amp;quot;&lt;br /&gt;
&lt;br /&gt;
--50b28e4c-K--&lt;br /&gt;
SecRule &amp;quot;FILES_NAMES|FILES&amp;quot; &amp;quot;@rx ['\&amp;quot;;=]&amp;quot; &amp;quot;phase:2,log,t:none,id:960000,rev:2.2.5,block,capture,msg:'Attempted multipart/form-data bypass',logdata:%{matched_var},severity:2,setvar:tx.msg=%{rule.msg},setvar:tx.id=%{rule.id},tag:RULE_MATURITY/7,tag:RULE_ACCURACY/7,tag:https://www.owasp.org/index.php/ModSecurity_CRS_RuleID-%{tx.id},setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},setvar:tx.protocol_violation_score=+%{tx.notice_anomaly_score},setvar:tx.%{rule.id}-PROTOCOL_VIOLATION/INVALID_REQ-%{matched_var_name}=%{tx.0}&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--50b28e4c-Z--&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border-style:solid;border-width:1px;background-color:#CCCCCC;text-transform:uppercase &amp;quot; &amp;gt;Attack Scenarios&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color:#F2F2F2;table-layout:fixed;width:700px;&amp;quot; &amp;gt;&lt;br /&gt;
An attacker manipulated the file name which is mistakenly treated as code by the backend server.&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border-style:solid;border-width:1px;background-color:#CCCCCC;text-transform:uppercase &amp;quot; &amp;gt;Ease of Attack&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color:#F2F2F2;table-layout:fixed;width:700px;&amp;quot; &amp;gt;&lt;br /&gt;
Easy&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border-style:solid;border-width:1px;background-color:#CCCCCC;text-transform:uppercase &amp;quot; &amp;gt;Ease of Detection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color:#F2F2F2;table-layout:fixed;width:700px;&amp;quot; &amp;gt;&lt;br /&gt;
Easy with regular expressions&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border-style:solid;border-width:1px;background-color:#CCCCCC;text-transform:uppercase &amp;quot; &amp;gt;False Positives&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color:#F2F2F2;table-layout:fixed;width:700px;&amp;quot; &amp;gt;&lt;br /&gt;
'''None known'''&amp;lt;br&amp;gt;&lt;br /&gt;
If there are any known false positives - specify them here&lt;br /&gt;
Also sign-up for the Reporting False Positives mail-list here:&lt;br /&gt;
https://lists.sourceforge.net/lists/listinfo/mod-security-report-false-positives&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Send FP Report emails here:&amp;lt;br&amp;gt;&lt;br /&gt;
mod-security-report-false-positives[[Image:Justat.gif|10x]]lists.sourceforge.net&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border-style:solid;border-width:1px;background-color:#CCCCCC;text-transform:uppercase &amp;quot; &amp;gt;False Negatives&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color:#F2F2F2;table-layout:fixed;width:700px;&amp;quot; &amp;gt;&lt;br /&gt;
'''None known'''&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border-style:solid;border-width:1px;background-color:#CCCCCC;text-transform:uppercase &amp;quot; &amp;gt;Rule Maturity&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color:#F2F2F2;table-layout:fixed;width:700px;&amp;quot; &amp;gt;&lt;br /&gt;
'''7'''&amp;lt;br&amp;gt;&lt;br /&gt;
10 point scale (0-9) where:&amp;lt;br&amp;gt;0 = Beta/Experimental &amp;lt;br&amp;gt;9 = Heavily Tested&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border-style:solid;border-width:1px;background-color:#CCCCCC;text-transform:uppercase &amp;quot; &amp;gt;Rule Accuracy&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color:#F2F2F2;table-layout:fixed;width:700px;&amp;quot; &amp;gt;&lt;br /&gt;
'''7'''&amp;lt;br&amp;gt;&lt;br /&gt;
10 point scale (0-9) where:&amp;lt;br&amp;gt;0 = High % of FP&amp;lt;br&amp;gt;5 = No false positives reported&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border-style:solid;border-width:1px;background-color:#CCCCCC;text-transform:uppercase &amp;quot; &amp;gt;Rule Documentation Contributor(s)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color:#F2F2F2;table-layout:fixed;width:700px;&amp;quot; &amp;gt;&lt;br /&gt;
Josh Amishav-Zlatin - jamuse[[Image:Justat.gif|10px]]gmail.com.com&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border-style:solid;border-width:1px;background-color:#CCCCCC;text-transform:uppercase &amp;quot; &amp;gt;Additional References&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color:#F2F2F2;table-layout:fixed;width:700px;&amp;quot; &amp;gt;&lt;br /&gt;
http://www.ietf.org/rfc/rfc2183.txt&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
[[Category:OWASP ModSecurity Core Rule Set Project]]&lt;/div&gt;</summary>
		<author><name>Josh Amishav-Zlatin</name></author>	</entry>

	</feed>