@@ -253,19 +253,19 @@ The following rule groups and rules are available when using Web Application Fir
253
253
## <a name =" drs21 " ></a > 2.1 rule sets
254
254
255
255
### <a name =" general-21 " ></a > General
256
- | Rule ID| Anomaly Score Severity | Description|
256
+ | Rule ID| Anomaly score severity | Description|
257
257
| ---| ---| --|
258
258
| 200002| Critical - 5| Failed to parse request body|
259
259
| 200003| Critical - 5| Multipart request body failed strict validation|
260
260
261
261
262
262
### <a name =" drs911-21 " ></a > METHOD ENFORCEMENT
263
- | Rule ID| Anomaly Score Severity | Description|
263
+ | Rule ID| Anomaly score severity | Description|
264
264
| ---| ---| --|
265
265
| 911100| Critical - 5| Method isn't allowed by policy|
266
266
267
267
### <a name =" drs920-21 " ></a > PROTOCOL-ENFORCEMENT
268
- | Rule ID| Anomaly Score Severity | Description|
268
+ | Rule ID| Anomaly score severity | Description|
269
269
| ---| ---| --|
270
270
| 920100| Notice - 2| Invalid HTTP Request Line|
271
271
| 920120| Critical - 5| Attempted multipart/form-data bypass|
@@ -305,7 +305,7 @@ The following rule groups and rules are available when using Web Application Fir
305
305
306
306
### <a name =" drs921-21 " ></a > PROTOCOL-ATTACK
307
307
308
- | Rule ID| Anomaly Score Severity | Description|
308
+ | Rule ID| Anomaly score severity | Description|
309
309
| ---| ---| --|
310
310
| 921110| Critical - 5| HTTP Request Smuggling Attack|
311
311
| 921120| Critical - 5| HTTP Response Splitting Attack|
@@ -319,23 +319,23 @@ The following rule groups and rules are available when using Web Application Fir
319
319
320
320
321
321
### <a name =" drs930-21 " ></a > LFI - Local File Inclusion
322
- | Rule ID| Anomaly Score Severity | Description|
322
+ | Rule ID| Anomaly score severity | Description|
323
323
| ---| ---| --|
324
324
| 930100| Critical - 5| Path Traversal Attack (/../)|
325
325
| 930110| Critical - 5| Path Traversal Attack (/../)|
326
326
| 930120| Critical - 5| OS File Access Attempt|
327
327
| 930130| Critical - 5| Restricted File Access Attempt|
328
328
329
329
### <a name =" drs931-21 " ></a > RFI - Remote File Inclusion
330
- | Rule ID| Anomaly Score Severity | Description|
330
+ | Rule ID| Anomaly score severity | Description|
331
331
| ---| ---| --|
332
332
| 931100| Critical - 5| Possible Remote File Inclusion (RFI) Attack: URL Parameter using IP Address|
333
333
| 931110| Critical - 5| Possible Remote File Inclusion (RFI) Attack: Common RFI Vulnerable Parameter Name used w/URL Payload|
334
334
| 931120| Critical - 5| Possible Remote File Inclusion (RFI) Attack: URL Payload Used w/Trailing Question Mark Character (?)|
335
335
| 931130| Critical - 5| Possible Remote File Inclusion (RFI) Attack: Off-Domain Reference/Link|
336
336
337
337
### <a name =" drs932-21 " ></a > RCE - Remote Command Execution
338
- | Rule ID| Anomaly Score Severity | Description|
338
+ | Rule ID| Anomaly score severity | Description|
339
339
| ---| ---| --|
340
340
| 932100| Critical - 5| Remote Command Execution: Unix Command Injection|
341
341
| 932105| Critical - 5| Remote Command Execution: Unix Command Injection|
@@ -351,7 +351,7 @@ The following rule groups and rules are available when using Web Application Fir
351
351
| 932180| Critical - 5| Restricted File Upload Attempt|
352
352
353
353
### <a name =" drs933-21 " ></a > PHP Attacks
354
- | Rule ID| Anomaly Score Severity | Description|
354
+ | Rule ID| Anomaly score severity | Description|
355
355
| ---| ---| --|
356
356
| 933100| Critical - 5| PHP Injection Attack: Opening/Closing Tag Found|
357
357
| 933110| Critical - 5| PHP Injection Attack: PHP Script File Upload Found|
@@ -367,12 +367,12 @@ The following rule groups and rules are available when using Web Application Fir
367
367
| 933210| Critical - 5| PHP Injection Attack: Variable Function Call Found|
368
368
369
369
### <a name =" drs934-21 " ></a > Node JS Attacks
370
- | Rule ID| Anomaly Score Severity | Description|
370
+ | Rule ID| Anomaly score severity | Description|
371
371
| ---| ---| --|
372
372
| 934100| Critical - 5| Node.js Injection Attack|
373
373
374
374
### <a name =" drs941-21 " ></a > XSS - Cross-site Scripting
375
- | Rule ID| Anomaly Score Severity | Description|
375
+ | Rule ID| Anomaly score severity | Description|
376
376
| ---| ---| --|
377
377
| 941100| Critical - 5| XSS Attack Detected via libinjection|
378
378
| 941101| Critical - 5| XSS Attack Detected via libinjection.<br />This rule detects requests with a * Referer* header|
@@ -406,7 +406,7 @@ The following rule groups and rules are available when using Web Application Fir
406
406
| 941380| Critical - 5| AngularJS client side template injection detected|
407
407
408
408
### <a name =" drs942-21 " ></a > SQLI - SQL Injection
409
- | Rule ID| Anomaly Score Severity | Description|
409
+ | Rule ID| Anomaly score severity | Description|
410
410
| ---| ---| --|
411
411
| 942100| Critical - 5| SQL Injection Attack Detected via libinjection|
412
412
| 942110| Warning - 3| SQL Injection Attack: Common Injection Testing Detected|
@@ -451,14 +451,14 @@ The following rule groups and rules are available when using Web Application Fir
451
451
| 942510| Critical - 5| SQLi bypass attempt by ticks or backticks detected|
452
452
453
453
### <a name =" drs943-21 " ></a > SESSION-FIXATION
454
- | Rule ID| Anomaly Score Severity | Description|
454
+ | Rule ID| Anomaly score severity | Description|
455
455
| ---| ---| --|
456
456
| 943100| Critical - 5| Possible Session Fixation Attack: Setting Cookie Values in HTML|
457
457
| 943110| Critical - 5| Possible Session Fixation Attack: SessionID Parameter Name with Off-Domain Referrer|
458
458
| 943120| Critical - 5| Possible Session Fixation Attack: SessionID Parameter Name with No Referrer|
459
459
460
460
### <a name =" drs944-21 " ></a > JAVA Attacks
461
- | Rule ID| Anomaly Score Severity | Description|
461
+ | Rule ID| Anomaly score severity | Description|
462
462
| ---| ---| --|
463
463
| 944100| Critical - 5| Remote Command Execution: Apache Struts, Oracle WebLogic|
464
464
| 944110| Critical - 5| Detects potential payload execution|
@@ -470,7 +470,7 @@ The following rule groups and rules are available when using Web Application Fir
470
470
| 944250| Critical - 5| Remote Command Execution: Suspicious Java method detected|
471
471
472
472
### <a name =" drs9905-21 " ></a > MS-ThreatIntel-WebShells
473
- | Rule ID| Anomaly Score Severity | Description|
473
+ | Rule ID| Anomaly score severity | Description|
474
474
| ---| ---| --|
475
475
| 99005002| Critical - 5| Web Shell Interaction Attempt (POST)|
476
476
| 99005003| Critical - 5| Web Shell Upload Attempt (POST) - CHOPPER PHP|
@@ -479,21 +479,21 @@ The following rule groups and rules are available when using Web Application Fir
479
479
| 99005006| Critical - 5| Spring4Shell Interaction Attempt|
480
480
481
481
### <a name =" drs9903-21 " ></a > MS-ThreatIntel-AppSec
482
- | Rule ID| Anomaly Score Severity | Description|
482
+ | Rule ID| Anomaly score severity | Description|
483
483
| ---| ---| --|
484
484
| 99030001| Critical - 5| Path Traversal Evasion in Headers (/.././../)|
485
485
| 99030002| Critical - 5| Path Traversal Evasion in Request Body (/.././../)|
486
486
487
487
### <a name =" drs99031-21 " ></a > MS-ThreatIntel-SQLI
488
- | Rule ID| Anomaly Score Severity | Description|
488
+ | Rule ID| Anomaly score severity | Description|
489
489
| ---| ---| --|
490
490
| 99031001| Warning - 3| SQL Injection Attack: Common Injection Testing Detected|
491
491
| 99031002| Critical - 5| SQL Comment Sequence Detected|
492
492
| 99031003| Critical - 5| SQL Injection Attack|
493
493
| 99031004| Critical - 5| Detects basic SQL authentication bypass attempts 2/3|
494
494
495
495
### <a name =" drs99001-21 " ></a > MS-ThreatIntel-CVEs
496
- | Rule ID| Anomaly Score Severity | Description|
496
+ | Rule ID| Anomaly score severity | Description|
497
497
| ---| ---| --|
498
498
| 99001001| Critical - 5| Attempted F5 tmui (CVE-2020 -5902) REST API Exploitation with known credentials|
499
499
| 99001002| Critical - 5| Attempted Citrix NSC_USER directory traversal [ CVE-2019 -19781] ( https://www.cve.org/CVERecord?id=CVE-2019-19781 ) |
0 commit comments