/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/tests/regression/tests/REQUEST-921-PROTOCOL-ATTACK
--- meta: author: "Andrea Menin (theMiddle)" description: "HTTP Splitting" enabled: true name: 921190.yaml tests: - test_title: 921190-1 desc: "New line char in request filename (1)" stages: - stage: input: dest_addr: "127.0.0.1" headers: Host: "localhost" User-Agent: "ModSecurity CRS 3 Tests" port: 80 uri: "/foo%0Abar" output: log_contains: id "921190" - test_title: 921190-2 desc: "New line char in request filename (2)" stages: - stage: input: dest_addr: "127.0.0.1" headers: Host: "localhost" User-Agent: "ModSecurity CRS 3 Tests" port: 80 uri: "/foo%0abar" output: log_contains: id "921190" - test_title: 921190-3 desc: "FastCGI variable injection: Nginx + PHP-FPM (CVE-2019-11043)" stages: - stage: input: dest_addr: "127.0.0.1" headers: Host: "localhost" User-Agent: "ModSecurity CRS 3 Tests" port: 80 uri: "/index.php/PHP%0Ainfo.php?QQQ" output: log_contains: id "921190" - test_title: 921190-4 desc: "PHP Settings injection: Nginx + PHP-FPM (CVE-2019-11043)" stages: - stage: input: dest_addr: "127.0.0.1" headers: Host: "localhost" User-Agent: "ModSecurity CRS 3 Tests" port: 80 uri: "/index.php/PHP_VALUE%0Asession.auto_start=1;;;?QQQ" output: log_contains: id "921190"
.
Edit
..
Edit
921110.yaml
Edit
921120.yaml
Edit
921130.yaml
Edit
921140.yaml
Edit
921150.yaml
Edit
921160.yaml
Edit
921190.yaml
Edit
921200.yaml
Edit
921230.yaml
Edit
921421.yaml
Edit
921422.yaml
Edit