Skip to content

Instantly share code, notes, and snippets.

@defanator
Created August 31, 2017 16:59
Show Gist options
  • Save defanator/0a9658a07ed6eb005fe94162cebfba1d to your computer and use it in GitHub Desktop.
Save defanator/0a9658a07ed6eb005fe94162cebfba1d to your computer and use it in GitHub Desktop.
libmodsecurity debug logs for #1552
[9] JSON parser initialization
[9] yajl JSON parsing callback initialization
[4] Initializing transaction
[4] Transaction context created.
[4] Starting phase CONNECTION. (SecRules 0)
[9] This phase consists of 32 rule(s).
[4] Starting phase URI. (SecRules 0 + 1/2)
[4] Starting phase REQUEST_HEADERS. (SecRules 1)
[9] This phase consists of 134 rule(s).
[4] (Rule: 200000) Executing operator "Rx" with param "(?:text|application)/xml" against REQUEST_HEADERS:Content-Type.
[9] T (0) t:lowercase: "application/x-www-form-urlencoded"
[9] Target value: "application/x-www-form-urlencoded" (Variable: REQUEST_HEADERS:Content-Type)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 200001) Executing operator "Rx" with param "application/json" against REQUEST_HEADERS:Content-Type.
[9] T (0) t:lowercase: "application/x-www-form-urlencoded"
[9] Target value: "application/x-www-form-urlencoded" (Variable: REQUEST_HEADERS:Content-Type)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 900990) Executing unconditional rule...
[9] Rule contains a `pass' action
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:crs_setup_version with value: 302
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] (Rule: 901001) Executing operator "Eq" with param "0" against TX:crs_setup_version.
[9] Target value: "1" (Variable: TX:crs_setup_version)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 901100) Executing operator "Eq" with param "0" against TX:inbound_anomaly_score_threshold.
[9] Target value: "0" (Variable: TX:inbound_anomaly_score_threshold)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:inbound_anomaly_score_threshold with value: 5
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] (Rule: 901110) Executing operator "Eq" with param "0" against TX:outbound_anomaly_score_threshold.
[9] Target value: "0" (Variable: TX:outbound_anomaly_score_threshold)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:outbound_anomaly_score_threshold with value: 4
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] (Rule: 901120) Executing operator "Eq" with param "0" against TX:paranoia_level.
[9] Target value: "0" (Variable: TX:paranoia_level)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:paranoia_level with value: 1
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] (Rule: 901130) Executing operator "Eq" with param "0" against TX:sampling_percentage.
[9] Target value: "0" (Variable: TX:sampling_percentage)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:sampling_percentage with value: 100
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] (Rule: 901140) Executing operator "Eq" with param "0" against TX:critical_anomaly_score.
[9] Target value: "0" (Variable: TX:critical_anomaly_score)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:critical_anomaly_score with value: 5
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] (Rule: 901141) Executing operator "Eq" with param "0" against TX:error_anomaly_score.
[9] Target value: "0" (Variable: TX:error_anomaly_score)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:error_anomaly_score with value: 4
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] (Rule: 901142) Executing operator "Eq" with param "0" against TX:warning_anomaly_score.
[9] Target value: "0" (Variable: TX:warning_anomaly_score)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:warning_anomaly_score with value: 3
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] (Rule: 901143) Executing operator "Eq" with param "0" against TX:notice_anomaly_score.
[9] Target value: "0" (Variable: TX:notice_anomaly_score)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:notice_anomaly_score with value: 2
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] (Rule: 901150) Executing operator "Eq" with param "0" against TX:do_reput_block.
[9] Target value: "0" (Variable: TX:do_reput_block)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:do_reput_block with value: 0
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] (Rule: 901152) Executing operator "Eq" with param "0" against TX:reput_block_duration.
[9] Target value: "0" (Variable: TX:reput_block_duration)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:reput_block_duration with value: 300
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] (Rule: 901160) Executing operator "Eq" with param "0" against TX:allowed_methods.
[9] Target value: "0" (Variable: TX:allowed_methods)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:allowed_methods with value: GET HEAD POST OPTIONS
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] (Rule: 901162) Executing operator "Eq" with param "0" against TX:allowed_request_content_type.
[9] Target value: "0" (Variable: TX:allowed_request_content_type)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:allowed_request_content_type with value: application/x-www-form-urlencoded|multipart/form-data|text/xml|application/xml|application/soap+xml|application/x-amf|application/json|application/octet-stream|text/plain
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] (Rule: 901163) Executing operator "Eq" with param "0" against TX:allowed_http_versions.
[9] Target value: "0" (Variable: TX:allowed_http_versions)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:allowed_http_versions with value: HTTP/1.0 HTTP/1.1 HTTP/2 HTTP/2.0
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] (Rule: 901164) Executing operator "Eq" with param "0" against TX:restricted_extensions.
[9] Target value: "0" (Variable: TX:restricted_extensions)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:restricted_extensions with value: .asa/ .asax/ .ascx/ .axd/ .backup/ .bak/ .bat/ .cdx/ .cer/ .cfg/ .cmd/ .com/ .config/ .conf/ .cs/ .csproj/ .csr/ .dat/ .db/ .dbf/ .dll/ .dos/ .htr/ .htw/ .ida/ .idc/ .idq/ .inc/ .ini/ .key/ .licx/ .lnk/ .log/ .mdb/ .old/ .pass/ .pdb/ .pol/ .printer/ .pwd/ .resources/ .resx/ .sql/ .sys/ .vb/ .vbs/ .vbproj/ .vsdisco/ .webinfo/ .xsd/ .xsx/
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] (Rule: 901165) Executing operator "Eq" with param "0" against TX:restricted_headers.
[9] Target value: "0" (Variable: TX:restricted_headers)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:restricted_headers with value: /proxy/ /lock-token/ /content-range/ /translate/ /if/
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] (Rule: 901166) Executing operator "Eq" with param "0" against TX:static_extensions.
[9] Target value: "0" (Variable: TX:static_extensions)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:static_extensions with value: /.jpg/ /.jpeg/ /.png/ /.gif/ /.js/ /.css/ /.ico/ /.svg/ /.webp/
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] (Rule: 901200) Executing unconditional rule...
[9] Rule contains a `pass' action
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:anomaly_score with value: 0
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:sql_injection_score with value: 0
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:xss_score with value: 0
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:rfi_score with value: 0
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:lfi_score with value: 0
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:rce_score with value: 0
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:php_injection_score with value: 0
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:http_violation_score with value: 0
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:session_fixation_score with value: 0
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:inbound_anomaly_score with value: 0
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:outbound_anomaly_score with value: 0
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:sql_error_match with value: 0
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] (Rule: 901318) Executing operator "Rx" with param "^(.*)$" against REQUEST_HEADERS:User-Agent.
[9] T (0) t:sha1: "Á ò∑xak@sȇ´Í,#K+Ü+"
[9] T (1) t:hexEncode: "ffffffe709ffffff98ffffffb778616b4073ffffffe9ffffffe0ffffffabffffffea2c234b2b1dff (8 characters omitted)"
[9] Target value: "ffffffe709ffffff98ffffffb778616b4073ffffffe9ffffffe0ffffffabffffffea2c234b2b1dff (8 characters omitted)" (Variable: REQUEST_HEADERS:User-Agent)
[9] Matched vars updated.
[4] Running [independent] (non-disruptive) action: setvar
[6] Resolving: matched_var to: curl/7.52.1
[8] Saving variable: TX:ua_hash with value: curl/7.52.1
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] (Rule: 901321) Executing unconditional rule...
[4] Running [independent] (non-disruptive) action: setvar
[6] Resolving: remote_addr to: 127.0.0.1
[8] Saving variable: TX:real_ip with value: 127.0.0.1
[9] Rule contains a `pass' action
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: initcol
[5] Collection `global' initialized with value: global
[4] Running (non-disruptive) action: initcol
[6] Resolving: remote_addr to: 127.0.0.1
[6] Resolving: tx.ua_hash to: curl/7.52.1
[5] Collection `ip' initialized with value: 127.0.0.1_curl/7.52.1
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] (Rule: 901400) Executing operator "Eq" with param "100" against TX:sampling_percentage.
[9] Target value: "100" (Variable: TX:sampling_percentage)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-SAMPLING
[9] Skipped rule id '901410' due to a SecMarker: END-SAMPLING
[9] Rule:
[9] Skipped rule id '901420' due to a SecMarker: END-SAMPLING
[9] Rule:
[9] Skipped rule id '901430' due to a SecMarker: END-SAMPLING
[9] Rule:
[9] Skipped rule id '901440' due to a SecMarker: END-SAMPLING
[9] Rule:
[9] Skipped rule id '901450' due to a SecMarker: END-SAMPLING
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-SAMPLING
[9] Rule: END-SAMPLING
[4] Out of a SecMarker after skip 6.000000 rules.
[4] (Rule: 9001180) Executing operator "StrEq" with param "POST" against REQUEST_METHOD.
[9] Target value: "POST" (Variable: REQUEST_METHOD)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[4] Executing chained rule.
[4] (Rule: 0) Executing operator "Rx" with param "/admin/content/assets/add/[a-z]+$" against REQUEST_FILENAME.
[9] Target value: "/modsec-full/" (Variable: REQUEST_FILENAME)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 9001182) Executing operator "StrEq" with param "POST" against REQUEST_METHOD.
[9] Target value: "POST" (Variable: REQUEST_METHOD)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[4] Executing chained rule.
[4] (Rule: 0) Executing operator "Rx" with param "/admin/content/assets/manage/[0-9]+$" against REQUEST_FILENAME.
[9] Target value: "/modsec-full/" (Variable: REQUEST_FILENAME)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 9001184) Executing operator "StrEq" with param "POST" against REQUEST_METHOD.
[9] Target value: "POST" (Variable: REQUEST_METHOD)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[4] Executing chained rule.
[4] (Rule: 0) Executing operator "Rx" with param "/file/ajax/field_asset_[a-z0-9_]+/[ua]nd/0/form-[a-z0-9A-Z_-]+$" against REQUEST_FILENAME.
[9] Target value: "/modsec-full/" (Variable: REQUEST_FILENAME)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 9002000) Executing operator "Eq" with param "0" against TX:crs_exclusions_wordpress|TX:crs_exclusions_wordpress.
[9] Target value: "0" (Variable: TX:crs_exclusions_wordpress)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-WORDPRESS
[9] Skipped rule id '9002200' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002300' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002400' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-WORDPRESS
[9] Rule: END-WORDPRESS-ADMIN
[9] Skipped rule id '0' due to a SecMarker: END-WORDPRESS
[9] Rule: END-WORDPRESS
[4] Out of a SecMarker after skip 5.000000 rules.
[4] (Rule: 905100) Executing operator "StrEq" with param "GET /" against REQUEST_LINE.
[9] Target value: "POST /modsec-full/ HTTP/1.1" (Variable: REQUEST_LINE)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 905110) Executing operator "Rx" with param "^(GET /|OPTIONS \*) HTTP/[12]\.[01]$" against REQUEST_LINE.
[9] Target value: "POST /modsec-full/ HTTP/1.1" (Variable: REQUEST_LINE)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 910011) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 910013) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-910-IP-REPUTATION
[9] Skipped rule id '910015' due to a SecMarker: END-REQUEST-910-IP-REPUTATION
[9] Rule:
[9] Skipped rule id '910017' due to a SecMarker: END-REQUEST-910-IP-REPUTATION
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-910-IP-REPUTATION
[9] Rule: END-REQUEST-910-IP-REPUTATION
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 911011) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 911013) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-911-METHOD-ENFORCEMENT
[9] Skipped rule id '911015' due to a SecMarker: END-REQUEST-911-METHOD-ENFORCEMENT
[9] Rule:
[9] Skipped rule id '911017' due to a SecMarker: END-REQUEST-911-METHOD-ENFORCEMENT
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-911-METHOD-ENFORCEMENT
[9] Rule: END-REQUEST-911-METHOD-ENFORCEMENT
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 912100) Executing operator "Eq" with param "0" against TX:dos_burst_time_slice.
[9] Target value: "0" (Variable: TX:dos_burst_time_slice)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[4] Executing chained rule.
[4] (Rule: 0) Executing operator "Eq" with param "0" against TX:dos_counter_threshold.
[9] Target value: "0" (Variable: TX:dos_counter_threshold)
[9] Matched vars updated.
[4] Rule returned 1.
[4] Executing chained rule.
[4] (Rule: 0) Executing operator "Eq" with param "0" against TX:dos_block_timeout.
[9] Target value: "0" (Variable: TX:dos_block_timeout)
[9] Matched vars updated.
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END_DOS_PROTECTION_CHECKS
[9] Skipped rule id '912011' due to a SecMarker: END_DOS_PROTECTION_CHECKS
[9] Rule:
[9] Skipped rule id '912120' due to a SecMarker: END_DOS_PROTECTION_CHECKS
[9] Rule:
[9] Skipped rule id '912130' due to a SecMarker: END_DOS_PROTECTION_CHECKS
[9] Rule:
[9] Skipped rule id '912013' due to a SecMarker: END_DOS_PROTECTION_CHECKS
[9] Rule:
[9] Skipped rule id '912015' due to a SecMarker: END_DOS_PROTECTION_CHECKS
[9] Rule:
[9] Skipped rule id '912017' due to a SecMarker: END_DOS_PROTECTION_CHECKS
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END_DOS_PROTECTION_CHECKS
[9] Rule: END-REQUEST-912-DOS-PROTECTION
[9] Skipped rule id '0' due to a SecMarker: END_DOS_PROTECTION_CHECKS
[9] Rule: END_DOS_PROTECTION_CHECKS
[4] Out of a SecMarker after skip 8.000000 rules.
[4] (Rule: 913011) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 913013) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-913-SCANNER-DETECTION
[9] Skipped rule id '913015' due to a SecMarker: END-REQUEST-913-SCANNER-DETECTION
[9] Rule:
[9] Skipped rule id '913017' due to a SecMarker: END-REQUEST-913-SCANNER-DETECTION
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-913-SCANNER-DETECTION
[9] Rule: END-REQUEST-913-SCANNER-DETECTION
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 920011) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920160) Executing operator "Rx" with param "^\d+$" against REQUEST_HEADERS:Content-Length.
[6] Resolving: matched_var to: NULL
[9] Target value: "3" (Variable: REQUEST_HEADERS:Content-Length)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920013) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[9] Skipped rule id '920015' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[9] Rule:
[9] Skipped rule id '920017' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[9] Rule: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 921011) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 921013) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-921-PROTOCOL-ATTACK
[9] Skipped rule id '921015' due to a SecMarker: END-REQUEST-921-PROTOCOL-ATTACK
[9] Rule:
[9] Skipped rule id '921017' due to a SecMarker: END-REQUEST-921-PROTOCOL-ATTACK
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-921-PROTOCOL-ATTACK
[9] Rule: END-REQUEST-921-PROTOCOL-ATTACK
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 930011) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 930013) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-930-APPLICATION-ATTACK-LFI
[9] Skipped rule id '930015' due to a SecMarker: END-REQUEST-930-APPLICATION-ATTACK-LFI
[9] Rule:
[9] Skipped rule id '930017' due to a SecMarker: END-REQUEST-930-APPLICATION-ATTACK-LFI
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-930-APPLICATION-ATTACK-LFI
[9] Rule: END-REQUEST-930-APPLICATION-ATTACK-LFI
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 931011) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 931013) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-931-APPLICATION-ATTACK-RFI
[9] Skipped rule id '931015' due to a SecMarker: END-REQUEST-931-APPLICATION-ATTACK-RFI
[9] Rule:
[9] Skipped rule id '931017' due to a SecMarker: END-REQUEST-931-APPLICATION-ATTACK-RFI
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-931-APPLICATION-ATTACK-RFI
[9] Rule: END-REQUEST-931-APPLICATION-ATTACK-RFI
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 932011) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 932013) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-932-APPLICATION-ATTACK-RCE
[9] Skipped rule id '932015' due to a SecMarker: END-REQUEST-932-APPLICATION-ATTACK-RCE
[9] Rule:
[9] Skipped rule id '932017' due to a SecMarker: END-REQUEST-932-APPLICATION-ATTACK-RCE
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-932-APPLICATION-ATTACK-RCE
[9] Rule: END-REQUEST-932-APPLICATION-ATTACK-RCE
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 933011) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 933013) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-933-APPLICATION-ATTACK-PHP
[9] Skipped rule id '933015' due to a SecMarker: END-REQUEST-933-APPLICATION-ATTACK-PHP
[9] Rule:
[9] Skipped rule id '933017' due to a SecMarker: END-REQUEST-933-APPLICATION-ATTACK-PHP
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-933-APPLICATION-ATTACK-PHP
[9] Rule: END-REQUEST-933-APPLICATION-ATTACK-PHP
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 941011) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941013) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-941-APPLICATION-ATTACK-XSS
[9] Skipped rule id '941015' due to a SecMarker: END-REQUEST-941-APPLICATION-ATTACK-XSS
[9] Rule:
[9] Skipped rule id '941017' due to a SecMarker: END-REQUEST-941-APPLICATION-ATTACK-XSS
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-941-APPLICATION-ATTACK-XSS
[9] Rule: END-REQUEST-941-APPLICATION-ATTACK-XSS
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 942011) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 942013) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Skipped rule id '942015' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942017' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 943011) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 943013) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION
[9] Skipped rule id '943015' due to a SecMarker: END-REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION
[9] Rule:
[9] Skipped rule id '943017' due to a SecMarker: END-REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION
[9] Rule: END-REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 949011) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 949013) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-949-BLOCKING-EVALUATION
[9] Skipped rule id '949015' due to a SecMarker: END-REQUEST-949-BLOCKING-EVALUATION
[9] Rule:
[9] Skipped rule id '949017' due to a SecMarker: END-REQUEST-949-BLOCKING-EVALUATION
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-949-BLOCKING-EVALUATION
[9] Rule: END-REQUEST-949-BLOCKING-EVALUATION
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 980011) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 980013) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-RESPONSE-980-CORRELATION
[9] Skipped rule id '980015' due to a SecMarker: END-RESPONSE-980-CORRELATION
[9] Rule:
[9] Skipped rule id '980017' due to a SecMarker: END-RESPONSE-980-CORRELATION
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-RESPONSE-980-CORRELATION
[9] Rule: END-RESPONSE-980-CORRELATION
[4] Out of a SecMarker after skip 3.000000 rules.
[9] Appending request body: 3 bytes. Limit set to: 13107200.000000
[4] Starting phase REQUEST_BODY. (SecRules 2)
[4] Adding request argument (POST): name "d", value "b"
[9] This phase consists of 315 rule(s).
[4] (Rule: 200002) Executing operator "Eq" with param "0" against REQBODY_ERROR.
[6] Resolving: reqbody_error_msg to: NULL
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 200003) Executing operator "Eq" with param "0" against MULTIPART_STRICT_ERROR.
[6] Resolving: REQBODY_PROCESSOR_ERROR to: NULL
[6] Resolving: MULTIPART_BOUNDARY_QUOTED to: NULL
[6] Resolving: MULTIPART_BOUNDARY_WHITESPACE to: NULL
[6] Resolving: MULTIPART_DATA_BEFORE to: NULL
[6] Resolving: MULTIPART_DATA_AFTER to: NULL
[6] Resolving: MULTIPART_HEADER_FOLDING to: NULL
[6] Resolving: MULTIPART_LF_LINE to: NULL
[6] Resolving: MULTIPART_MISSING_SEMICOLON to: NULL
[6] Resolving: MULTIPART_INVALID_QUOTING to: NULL
[6] Resolving: MULTIPART_INVALID_PART to: NULL
[6] Resolving: MULTIPART_INVALID_HEADER_FOLDING to: NULL
[6] Resolving: MULTIPART_FILE_LIMIT_EXCEEDED to: NULL
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 200004) Executing operator "Eq" with param "0" against MULTIPART_UNMATCHED_BOUNDARY.
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 200005) Executing operator "StrEq" with param "0" against TX.
[6] Resolving: MATCHED_VAR_NAME to: NULL
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 9001000) Executing operator "Eq" with param "0" against TX:crs_exclusions_drupal|TX:crs_exclusions_drupal.
[9] Target value: "0" (Variable: TX:crs_exclusions_drupal)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-DRUPAL-RULE-EXCLUSIONS
[9] Skipped rule id '9001100' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '9001110' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '9001112' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '9001114' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '9001116' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '9001122' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '9001124' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '9001126' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '9001128' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '9001140' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '9001160' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '9001170' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '9001200' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '9001202' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '9001204' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '9001206' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '9001208' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '9001210' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '9001212' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '9001214' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '9001216' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule: END-DRUPAL-RULE-EXCLUSIONS
[4] Out of a SecMarker after skip 22.000000 rules.
[4] (Rule: 9002001) Executing operator "Eq" with param "0" against TX:crs_exclusions_wordpress|TX:crs_exclusions_wordpress.
[9] Target value: "0" (Variable: TX:crs_exclusions_wordpress)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-WORDPRESS
[9] Skipped rule id '9002100' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002120' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002130' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002150' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002160' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002401' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002410' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002420' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002520' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002530' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002540' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002600' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002700' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002710' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002720' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002730' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002740' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002750' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002760' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002800' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002810' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002820' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002900' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-WORDPRESS
[9] Rule: END-WORDPRESS-ADMIN
[9] Skipped rule id '0' due to a SecMarker: END-WORDPRESS
[9] Rule: END-WORDPRESS
[4] Out of a SecMarker after skip 25.000000 rules.
[4] (Rule: 910012) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 910000) Executing operator "Eq" with param "1" against TX:DO_REPUT_BLOCK.
[6] Resolving: ip.reput_block_reason to: NULL
[9] Target value: "0" (Variable: TX:DO_REPUT_BLOCK)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 910100) Executing operator "Rx" with param "^$" against TX:HIGH_RISK_COUNTRY_CODES.
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 910120) Executing operator "Eq" with param "1" against IP.
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 910130) Executing operator "Eq" with param "0" against TX:block_suspicious_ip.
[9] Target value: "0" (Variable: TX:block_suspicious_ip)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[4] Executing chained rule.
[4] (Rule: 0) Executing operator "Eq" with param "0" against TX:block_harvester_ip.
[9] Target value: "0" (Variable: TX:block_harvester_ip)
[9] Matched vars updated.
[4] Rule returned 1.
[4] Executing chained rule.
[4] (Rule: 0) Executing operator "Eq" with param "0" against TX:block_spammer_ip.
[9] Target value: "0" (Variable: TX:block_spammer_ip)
[9] Matched vars updated.
[4] Rule returned 1.
[4] Executing chained rule.
[4] (Rule: 0) Executing operator "Eq" with param "0" against TX:block_search_ip.
[9] Target value: "0" (Variable: TX:block_search_ip)
[9] Matched vars updated.
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END_RBL_CHECK
[9] Skipped rule id '910140' due to a SecMarker: END_RBL_CHECK
[9] Rule:
[9] Skipped rule id '910150' due to a SecMarker: END_RBL_CHECK
[9] Rule:
[9] Skipped rule id '910160' due to a SecMarker: END_RBL_CHECK
[9] Rule:
[9] Skipped rule id '910170' due to a SecMarker: END_RBL_CHECK
[9] Rule:
[9] Skipped rule id '910180' due to a SecMarker: END_RBL_CHECK
[9] Rule:
[9] Skipped rule id '910190' due to a SecMarker: END_RBL_CHECK
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END_RBL_CHECK
[9] Rule: END_RBL_LOOKUP
[9] Skipped rule id '0' due to a SecMarker: END_RBL_CHECK
[9] Rule: END_RBL_CHECK
[4] Out of a SecMarker after skip 8.000000 rules.
[4] (Rule: 910014) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-910-IP-REPUTATION
[9] Skipped rule id '910016' due to a SecMarker: END-REQUEST-910-IP-REPUTATION
[9] Rule:
[9] Skipped rule id '910018' due to a SecMarker: END-REQUEST-910-IP-REPUTATION
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-910-IP-REPUTATION
[9] Rule: END-REQUEST-910-IP-REPUTATION
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 911012) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[6] Resolving: tx.allowed_methods to: GET HEAD POST OPTIONS
[4] (Rule: 911100) Executing operator "Within" with param "GET HEAD POST OPTIONS" Was: "%{tx.allowed_methods}" against REQUEST_METHOD.
[6] Resolving: matched_var to: NULL
[9] Target value: "POST" (Variable: REQUEST_METHOD)
[6] Resolving: tx.allowed_methods to: GET HEAD POST OPTIONS
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 911014) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-911-METHOD-ENFORCEMENT
[9] Skipped rule id '911016' due to a SecMarker: END-REQUEST-911-METHOD-ENFORCEMENT
[9] Rule:
[9] Skipped rule id '911018' due to a SecMarker: END-REQUEST-911-METHOD-ENFORCEMENT
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-911-METHOD-ENFORCEMENT
[9] Rule: END-REQUEST-911-METHOD-ENFORCEMENT
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 912012) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 912014) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-912-DOS-PROTECTION
[9] Skipped rule id '912016' due to a SecMarker: END-REQUEST-912-DOS-PROTECTION
[9] Rule:
[9] Skipped rule id '912018' due to a SecMarker: END-REQUEST-912-DOS-PROTECTION
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-912-DOS-PROTECTION
[9] Rule: END-REQUEST-912-DOS-PROTECTION
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 913012) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 913100) Executing operator "PmFromFile" with param "scanners-user-agents.data" against REQUEST_HEADERS:User-Agent.
[6] Resolving: TX.0 to: NULL
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:lowercase: "curl/7.52.1"
[9] Target value: "curl/7.52.1" (Variable: REQUEST_HEADERS:User-Agent)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 913110) Executing operator "PmFromFile" with param "scanners-headers.data" against REQUEST_HEADERS_NAMES|REQUEST_HEADERS.
[6] Resolving: TX.0 to: NULL
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:lowercase: "host"
[9] Target value: "host" (Variable: REQUEST_HEADERS_NAMES:Host)
[9] T (0) t:lowercase: "user-agent"
[9] Target value: "user-agent" (Variable: REQUEST_HEADERS_NAMES:User-Agent)
[9] T (0) t:lowercase: "accept"
[9] Target value: "accept" (Variable: REQUEST_HEADERS_NAMES:Accept)
[9] T (0) t:lowercase: "content-length"
[9] Target value: "content-length" (Variable: REQUEST_HEADERS_NAMES:Content-Length)
[9] T (0) t:lowercase: "content-type"
[9] Target value: "content-type" (Variable: REQUEST_HEADERS_NAMES:Content-Type)
[9] T (0) t:lowercase: "localhost"
[9] Target value: "localhost" (Variable: REQUEST_HEADERS:Host)
[9] T (0) t:lowercase: "curl/7.52.1"
[9] Target value: "curl/7.52.1" (Variable: REQUEST_HEADERS:User-Agent)
[9] T (0) t:lowercase: "*/*"
[9] Target value: "*/*" (Variable: REQUEST_HEADERS:Accept)
[9] T (0) t:lowercase: "3"
[9] Target value: "3" (Variable: REQUEST_HEADERS:Content-Length)
[9] T (0) t:lowercase: "application/x-www-form-urlencoded"
[9] Target value: "application/x-www-form-urlencoded" (Variable: REQUEST_HEADERS:Content-Type)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 913120) Executing operator "PmFromFile" with param "scanners-urls.data" against REQUEST_FILENAME|ARGS.
[6] Resolving: TX.0 to: NULL
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:lowercase: "/modsec-full/"
[9] Target value: "/modsec-full/" (Variable: REQUEST_FILENAME)
[9] T (0) t:lowercase: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 913014) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-913-SCANNER-DETECTION
[9] Skipped rule id '913101' due to a SecMarker: END-REQUEST-913-SCANNER-DETECTION
[9] Rule:
[9] Skipped rule id '913102' due to a SecMarker: END-REQUEST-913-SCANNER-DETECTION
[9] Rule:
[9] Skipped rule id '913016' due to a SecMarker: END-REQUEST-913-SCANNER-DETECTION
[9] Rule:
[9] Skipped rule id '913018' due to a SecMarker: END-REQUEST-913-SCANNER-DETECTION
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-913-SCANNER-DETECTION
[9] Rule: END-REQUEST-913-SCANNER-DETECTION
[4] Out of a SecMarker after skip 5.000000 rules.
[4] (Rule: 920012) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920100) Executing operator "Rx" with param "^(?i:(?:[a-z]{3,10}\s+(?:\w{3,7}?://[\w\-\./]*(?::\d+)?)?/[^?#]*(?:\?[^#\s]*)?(?:#[\S]*)?|connect (?:\d{1,3}\.){3}\d{1,3}\.?(?::\d+)?|options \*)\s+[\w\./]+|get /[^?#]*(?:\?[^#\s]*)?(?:#[\S]*)?)$" against REQUEST_LINE.
[6] Resolving: request_line to: POST /modsec-full/ HTTP/1.1
[9] Target value: "POST /modsec-full/ HTTP/1.1" (Variable: REQUEST_LINE)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920120) Executing operator "Rx" with param "(?<!&(?:[aAoOuUyY]uml)|&(?:[aAeEiIoOuU]circ)|&(?:[eEiIoOuUyY]acute)|&(?:[aAeEiIoOuU]grave)|&(?:[cC]cedil)|&(?:[aAnNoO]tilde)|&(?:amp)|&(?:apos));|['\"=]" against FILES_NAMES|FILES.
[6] Resolving: matched_var to: NULL
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920130) Executing operator "Eq" with param "0" against REQBODY_ERROR.
[6] Resolving: REQBODY_ERROR_MSG to: NULL
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920140) Executing operator "Eq" with param "0" against MULTIPART_STRICT_ERROR.
[6] Resolving: REQBODY_PROCESSOR_ERROR to: NULL
[6] Resolving: MULTIPART_BOUNDARY_QUOTED to: NULL
[6] Resolving: MULTIPART_BOUNDARY_WHITESPACE to: NULL
[6] Resolving: MULTIPART_DATA_BEFORE to: NULL
[6] Resolving: MULTIPART_DATA_AFTER to: NULL
[6] Resolving: MULTIPART_HEADER_FOLDING to: NULL
[6] Resolving: MULTIPART_LF_LINE to: NULL
[6] Resolving: MULTIPART_SEMICOLON_MISSING to: NULL
[6] Resolving: MULTIPART_INVALID_QUOTING to: NULL
[6] Resolving: MULTIPART_INVALID_HEADER_FOLDING to: NULL
[6] Resolving: MULTIPART_FILE_LIMIT_EXCEEDED to: NULL
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920170) Executing operator "Rx" with param "^(?:GET|HEAD)$" against REQUEST_METHOD.
[6] Resolving: matched_var to: NULL
[9] Target value: "POST" (Variable: REQUEST_METHOD)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920180) Executing operator "Rx" with param "^POST$" against REQUEST_METHOD.
[6] Resolving: matched_var to: NULL
[9] Target value: "POST" (Variable: REQUEST_METHOD)
[9] Matched vars updated.
[4] Running [independent] (non-disruptive) action: msg
[9] Saving msg: POST request missing Content-Length Header.
[4] Rule returned 1.
[4] Executing chained rule.
[4] (Rule: 0) Executing operator "Eq" with param "0" against REQUEST_HEADERS:Content-Length.
[9] Target value: "1" (Variable: REQUEST_HEADERS:Content-Length)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920190) Executing operator "Rx" with param "(\d+)\-(\d+)\," against REQUEST_HEADERS:Range|REQUEST_HEADERS:Request-Range.
[6] Resolving: matched_var to: NULL
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920210) Executing operator "Rx" with param "\b(keep-alive|close),\s?(keep-alive|close)\b" against REQUEST_HEADERS:Connection.
[6] Resolving: matched_var to: NULL
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920220) Executing operator "Rx" with param "\%((?!$|\W)|[0-9a-fA-F]{2}|u[0-9a-fA-F]{4})" against REQUEST_URI.
[9] Target value: "/modsec-full/" (Variable: REQUEST_URI)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920240) Executing operator "Rx" with param "^(application\/x-www-form-urlencoded|text\/xml)(?:;(?:\s?charset\s?=\s?[\w\d\-]{1,18})?)??$" against REQUEST_HEADERS:Content-Type.
[9] Target value: "application/x-www-form-urlencoded" (Variable: REQUEST_HEADERS:Content-Type)
[9] Matched vars updated.
[4] Running [independent] (non-disruptive) action: msg
[9] Saving msg: URL Encoding Abuse Attack Attempt
[4] Rule returned 1.
[4] Executing chained rule.
[4] (Rule: 0) Executing operator "Rx" with param "\%((?!$|\W)|[0-9a-fA-F]{2}|u[0-9a-fA-F]{4})" against REQUEST_BODY|XML:/*.
[9] Target value: "d=b" (Variable: REQUEST_BODY)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920250) Executing operator "Eq" with param "1" against TX:CRS_VALIDATE_UTF8_ENCODING.
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920260) Executing operator "Rx" with param "\%u[fF]{2}[0-9a-fA-F]{2}" against REQUEST_URI|REQUEST_BODY.
[9] Target value: "/modsec-full/" (Variable: REQUEST_URI)
[9] Target value: "d=b" (Variable: REQUEST_BODY)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920270) Executing operator "ValidadeByteRange" with param "1-255" against REQUEST_URI|REQUEST_HEADERS|ARGS|ARGS_NAMES.
[9] T (0) t:urlDecodeUni: "/modsec-full/"
[9] Target value: "/modsec-full/" (Variable: REQUEST_URI)
[9] T (0) t:urlDecodeUni: "localhost"
[9] Target value: "localhost" (Variable: REQUEST_HEADERS:Host)
[9] T (0) t:urlDecodeUni: "curl/7.52.1"
[9] Target value: "curl/7.52.1" (Variable: REQUEST_HEADERS:User-Agent)
[9] T (0) t:urlDecodeUni: "*/*"
[9] Target value: "*/*" (Variable: REQUEST_HEADERS:Accept)
[9] T (0) t:urlDecodeUni: "3"
[9] Target value: "3" (Variable: REQUEST_HEADERS:Content-Length)
[9] T (0) t:urlDecodeUni: "application/x-www-form-urlencoded"
[9] Target value: "application/x-www-form-urlencoded" (Variable: REQUEST_HEADERS:Content-Type)
[9] T (0) t:urlDecodeUni: "b"
[9] Target value: "b" (Variable: ARGS:d)
[9] T (0) t:urlDecodeUni: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920280) Executing operator "Eq" with param "0" against REQUEST_HEADERS:Host.
[9] Target value: "1" (Variable: REQUEST_HEADERS:Host)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920290) Executing operator "Rx" with param "^$" against REQUEST_HEADERS:Host.
[9] Target value: "localhost" (Variable: REQUEST_HEADERS:Host)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920310) Executing operator "Rx" with param "^$" against REQUEST_HEADERS:Accept.
[9] Target value: "*/*" (Variable: REQUEST_HEADERS:Accept)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920311) Executing operator "Rx" with param "^$" against REQUEST_HEADERS:Accept.
[9] Target value: "*/*" (Variable: REQUEST_HEADERS:Accept)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920330) Executing operator "Rx" with param "^$" against REQUEST_HEADERS:User-Agent.
[9] Target value: "curl/7.52.1" (Variable: REQUEST_HEADERS:User-Agent)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920340) Executing operator "Rx" with param "^0$" against REQUEST_HEADERS:Content-Length.
[9] Target value: "3" (Variable: REQUEST_HEADERS:Content-Length)
[9] Matched vars updated.
[4] Running [independent] (non-disruptive) action: msg
[9] Saving msg: Request Containing Content, but Missing Content-Type header
[4] Rule returned 1.
[4] Executing chained rule.
[4] (Rule: 0) Executing operator "Eq" with param "0" against REQUEST_HEADERS:Content-Type.
[9] Target value: "1" (Variable: REQUEST_HEADERS:Content-Type)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920350) Executing operator "Rx" with param "^[\d.:]+$" against REQUEST_HEADERS:Host.
[6] Resolving: matched_var to: NULL
[9] Target value: "localhost" (Variable: REQUEST_HEADERS:Host)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920380) Executing operator "Eq" with param "1" against TX:MAX_NUM_ARGS.
[9] Target value: "0" (Variable: TX:MAX_NUM_ARGS)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920360) Executing operator "Eq" with param "1" against TX:ARG_NAME_LENGTH.
[9] Target value: "0" (Variable: TX:ARG_NAME_LENGTH)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920370) Executing operator "Eq" with param "1" against TX:ARG_LENGTH.
[9] Target value: "0" (Variable: TX:ARG_LENGTH)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920390) Executing operator "Eq" with param "1" against TX:TOTAL_ARG_LENGTH.
[9] Target value: "0" (Variable: TX:TOTAL_ARG_LENGTH)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920400) Executing operator "Eq" with param "1" against TX:MAX_FILE_SIZE.
[9] Target value: "0" (Variable: TX:MAX_FILE_SIZE)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920410) Executing operator "Eq" with param "1" against TX:COMBINED_FILE_SIZES.
[9] Target value: "0" (Variable: TX:COMBINED_FILE_SIZES)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920420) Executing operator "Rx" with param "^(?:GET|HEAD|PROPFIND|OPTIONS)$" against REQUEST_METHOD.
[6] Resolving: matched_var to: NULL
[9] Target value: "POST" (Variable: REQUEST_METHOD)
[9] Matched vars updated.
[4] Running [independent] (non-disruptive) action: msg
[9] Saving msg: Request content type is not allowed by policy
[4] Rule returned 1.
[4] Executing chained rule.
[4] (Rule: 0) Executing operator "Rx" with param "^([^;\s]+)" against REQUEST_HEADERS:Content-Type.
[9] Target value: "application/x-www-form-urlencoded" (Variable: REQUEST_HEADERS:Content-Type)
[7] Added regex subexpression TX.0: application/x-www-form-urlencoded
[7] Added regex subexpression TX.1: application/x-www-form-urlencoded
[9] Matched vars updated.
[4] Rule returned 1.
[4] Executing chained rule.
[6] Resolving: tx.allowed_request_content_type to: application/x-www-form-urlencoded|multipart/form-data|text/xml|application/xml|application/soap+xml|application/x-amf|application/json|application/octet-stream|text/plain
[4] (Rule: 0) Executing operator "Rx" with param "^application/x-www-form-urlencoded|multipart/form-data|text/xml|application/xml|application/soap+xml|application/x-amf|application/json|application/octet-stream|text/plain$" Was: "^%{tx.allowed_request_content_type}$" against TX:0.
[9] Target value: "application/x-www-form-urlencoded" (Variable: TX:0)
[9] Matched vars updated.
[4] Running [independent] (non-disruptive) action: setvar
[6] Resolving: rule.msg to: Request content type is not allowed by policy
[8] Saving variable: TX:msg with value: Request content type is not allowed by policy
[4] Running [independent] (non-disruptive) action: setvar
[6] Resolving: tx.critical_anomaly_score to: 5
[8] Saving variable: TX:anomaly_score with value: 5
[4] Running [independent] (non-disruptive) action: setvar
[6] Resolving: rule.id to: 920420
[6] Resolving: matched_var_name to: TX:0
[6] Resolving: matched_var to: application/x-www-form-urlencoded
[8] Saving variable: TX:920420-OWASP_CRS/POLICY/CONTENT_TYPE_NOT_ALLOWED-TX:0 with value: application/x-www-form-urlencoded
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: ctl
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: capture
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) ignoring action: pass (rule contains a disruptive action)
[4] Running (disruptive) action: block
[8] Marking request as disruptive.
[8] Running action pass
[4] Running (non-disruptive) action: severity
[9] This rule severity is: 2 current transaction is: 255
[4] Running (non-disruptive) action: logdata
[6] Resolving: matched_var to: application/x-www-form-urlencoded
[4] Running (non-disruptive) action: tag
[9] Rule tag: application-multi
[4] Running (non-disruptive) action: tag
[9] Rule tag: language-multi
[4] Running (non-disruptive) action: tag
[9] Rule tag: platform-multi
[4] Running (non-disruptive) action: tag
[9] Rule tag: attack-protocol
[4] Running (non-disruptive) action: tag
[9] Rule tag: OWASP_CRS/POLICY/ENCODING_NOT_ALLOWED
[4] Running (non-disruptive) action: tag
[9] Rule tag: WASCTC/WASC-20
[4] Running (non-disruptive) action: tag
[9] Rule tag: OWASP_TOP_10/A1
[4] Running (non-disruptive) action: tag
[9] Rule tag: OWASP_AppSensor/EE2
[4] Running (non-disruptive) action: tag
[9] Rule tag: PCI/12.1
[6] Resolving: tx.allowed_http_versions to: HTTP/1.0 HTTP/1.1 HTTP/2 HTTP/2.0
[4] (Rule: 920430) Executing operator "Within" with param "HTTP/1.0 HTTP/1.1 HTTP/2 HTTP/2.0" Was: "%{tx.allowed_http_versions}" against REQUEST_PROTOCOL.
[6] Resolving: matched_var to: application/x-www-form-urlencoded
[9] Target value: "HTTP/1.1" (Variable: REQUEST_PROTOCOL)
[6] Resolving: tx.allowed_http_versions to: HTTP/1.0 HTTP/1.1 HTTP/2 HTTP/2.0
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920440) Executing operator "Rx" with param "\.(.*)$" against REQUEST_BASENAME.
[6] Resolving: TX.0 to: application/x-www-form-urlencoded
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920450) Executing operator "Rx" with param "^(.*)$" against REQUEST_HEADERS_NAMES.
[6] Resolving: MATCHED_VAR to: NULL
[6] Resolving: matched_var to: NULL
[9] T (0) t:lowercase: "host"
[9] Target value: "host" (Variable: REQUEST_HEADERS_NAMES:Host)
[7] Added regex subexpression TX.0: host
[7] Added regex subexpression TX.1: host
[9] Matched vars updated.
[4] Running [independent] (non-disruptive) action: msg
[6] Resolving: MATCHED_VAR to: Host
[9] Saving msg: HTTP header is restricted by policy (Host)
[4] Running [independent] (non-disruptive) action: setvar
[6] Resolving: tx.0 to: host
[6] Resolving: tx.0 to: host
[8] Saving variable: TX:header_name_host with value: /host/
[9] T (0) t:lowercase: "user-agent"
[9] Target value: "user-agent" (Variable: REQUEST_HEADERS_NAMES:User-Agent)
[7] Added regex subexpression TX.0: user-agent
[7] Added regex subexpression TX.1: user-agent
[9] Matched vars updated.
[4] Running [independent] (non-disruptive) action: msg
[6] Resolving: MATCHED_VAR to: User-Agent
[9] Saving msg: HTTP header is restricted by policy (User-Agent)
[4] Running [independent] (non-disruptive) action: setvar
[6] Resolving: tx.0 to: user-agent
[6] Resolving: tx.0 to: user-agent
[8] Saving variable: TX:header_name_user-agent with value: /user-agent/
[9] T (0) t:lowercase: "accept"
[9] Target value: "accept" (Variable: REQUEST_HEADERS_NAMES:Accept)
[7] Added regex subexpression TX.0: accept
[7] Added regex subexpression TX.1: accept
[9] Matched vars updated.
[4] Running [independent] (non-disruptive) action: msg
[6] Resolving: MATCHED_VAR to: Accept
[9] Saving msg: HTTP header is restricted by policy (Accept)
[4] Running [independent] (non-disruptive) action: setvar
[6] Resolving: tx.0 to: accept
[6] Resolving: tx.0 to: accept
[8] Saving variable: TX:header_name_accept with value: /accept/
[9] T (0) t:lowercase: "content-length"
[9] Target value: "content-length" (Variable: REQUEST_HEADERS_NAMES:Content-Length)
[7] Added regex subexpression TX.0: content-length
[7] Added regex subexpression TX.1: content-length
[9] Matched vars updated.
[4] Running [independent] (non-disruptive) action: msg
[6] Resolving: MATCHED_VAR to: Content-Length
[9] Saving msg: HTTP header is restricted by policy (Content-Length)
[4] Running [independent] (non-disruptive) action: setvar
[6] Resolving: tx.0 to: content-length
[6] Resolving: tx.0 to: content-length
[8] Saving variable: TX:header_name_content-length with value: /content-length/
[9] T (0) t:lowercase: "content-type"
[9] Target value: "content-type" (Variable: REQUEST_HEADERS_NAMES:Content-Type)
[7] Added regex subexpression TX.0: content-type
[7] Added regex subexpression TX.1: content-type
[9] Matched vars updated.
[4] Running [independent] (non-disruptive) action: msg
[6] Resolving: MATCHED_VAR to: Content-Type
[9] Saving msg: HTTP header is restricted by policy (Content-Type)
[4] Running [independent] (non-disruptive) action: setvar
[6] Resolving: tx.0 to: content-type
[6] Resolving: tx.0 to: content-type
[8] Saving variable: TX:header_name_content-type with value: /content-type/
[4] Rule returned 1.
[4] Executing chained rule.
[6] Resolving: tx.restricted_headers to: /proxy/ /lock-token/ /content-range/ /translate/ /if/
[4] (Rule: 0) Executing operator "Within" with param "/proxy/ /lock-token/ /content-range/ /translate/ /if/" Was: "%{tx.restricted_headers}" against TX.
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920014) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[9] Skipped rule id '920200' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[9] Rule:
[9] Skipped rule id '920201' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[9] Rule:
[9] Skipped rule id '920230' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[9] Rule:
[9] Skipped rule id '920300' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[9] Rule:
[9] Skipped rule id '920271' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[9] Rule:
[9] Skipped rule id '920320' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[9] Rule:
[9] Skipped rule id '920121' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[9] Rule:
[9] Skipped rule id '920016' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[9] Rule:
[9] Skipped rule id '920272' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[9] Rule:
[9] Skipped rule id '920018' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[9] Rule:
[9] Skipped rule id '920202' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[9] Rule:
[9] Skipped rule id '920273' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[9] Rule:
[9] Skipped rule id '920274' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[9] Rule:
[9] Skipped rule id '920460' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[9] Rule: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[4] Out of a SecMarker after skip 15.000000 rules.
[4] (Rule: 921012) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 921100) Executing operator "Rx" with param "," against REQUEST_HEADERS.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "3" (Variable: REQUEST_HEADERS:Content-Length)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 921110) Executing operator "Rx" with param "(?:\n|\r)+(?:get|post|head|options|connect|put|delete|trace|propfind|propatch|mkcol|copy|move|lock|unlock)\s+" against ARGS_NAMES|ARGS|XML:/*.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] T (1) t:htmlEntityDecode: "d"
[9] T (2) t:lowercase: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:urlDecodeUni: "b"
[9] T (1) t:htmlEntityDecode: "b"
[9] T (2) t:lowercase: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 921120) Executing operator "Rx" with param "[\r\n]\W*?(?:content-(type|length)|set-cookie|location):" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] T (1) t:lowercase: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:urlDecodeUni: "b"
[9] T (1) t:lowercase: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 921130) Executing operator "Rx" with param "(?:\bhttp\/(?:0\.9|1\.[01])|<(?:html|meta)\b)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] T (1) t:htmlEntityDecode: "d"
[9] T (2) t:lowercase: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:urlDecodeUni: "b"
[9] T (1) t:htmlEntityDecode: "b"
[9] T (2) t:lowercase: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 921140) Executing operator "Rx" with param "(\n|\r)" against REQUEST_HEADERS_NAMES|REQUEST_HEADERS.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:htmlEntityDecode: "Host"
[9] T (1) t:lowercase: "host"
[9] Target value: "host" (Variable: REQUEST_HEADERS_NAMES:Host)
[9] T (0) t:htmlEntityDecode: "User-Agent"
[9] T (1) t:lowercase: "user-agent"
[9] Target value: "user-agent" (Variable: REQUEST_HEADERS_NAMES:User-Agent)
[9] T (0) t:htmlEntityDecode: "Accept"
[9] T (1) t:lowercase: "accept"
[9] Target value: "accept" (Variable: REQUEST_HEADERS_NAMES:Accept)
[9] T (0) t:htmlEntityDecode: "Content-Length"
[9] T (1) t:lowercase: "content-length"
[9] Target value: "content-length" (Variable: REQUEST_HEADERS_NAMES:Content-Length)
[9] T (0) t:htmlEntityDecode: "Content-Type"
[9] T (1) t:lowercase: "content-type"
[9] Target value: "content-type" (Variable: REQUEST_HEADERS_NAMES:Content-Type)
[9] T (0) t:htmlEntityDecode: "localhost"
[9] T (1) t:lowercase: "localhost"
[9] Target value: "localhost" (Variable: REQUEST_HEADERS:Host)
[9] T (0) t:htmlEntityDecode: "curl/7.52.1"
[9] T (1) t:lowercase: "curl/7.52.1"
[9] Target value: "curl/7.52.1" (Variable: REQUEST_HEADERS:User-Agent)
[9] T (0) t:htmlEntityDecode: "*/*"
[9] T (1) t:lowercase: "*/*"
[9] Target value: "*/*" (Variable: REQUEST_HEADERS:Accept)
[9] T (0) t:htmlEntityDecode: "3"
[9] T (1) t:lowercase: "3"
[9] Target value: "3" (Variable: REQUEST_HEADERS:Content-Length)
[9] T (0) t:htmlEntityDecode: "application/x-www-form-urlencoded"
[9] T (1) t:lowercase: "application/x-www-form-urlencoded"
[9] Target value: "application/x-www-form-urlencoded" (Variable: REQUEST_HEADERS:Content-Type)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 921150) Executing operator "Rx" with param "(\n|\r)" against ARGS_NAMES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] T (1) t:htmlEntityDecode: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 921160) Executing operator "Rx" with param "(?:\n|\r)+(?:\s+|location|refresh|(?:set-)?cookie|(X-)?(?:forwarded-(?:for|host|server)|host|via|remote-ip|remote-addr|originating-IP))\s*:" against ARGS_NAMES|ARGS|XML:/*.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] T (1) t:htmlEntityDecode: "d"
[9] T (2) t:lowercase: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:urlDecodeUni: "b"
[9] T (1) t:htmlEntityDecode: "b"
[9] T (2) t:lowercase: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 921014) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-921-PROTOCOL-ATTACK
[9] Skipped rule id '921151' due to a SecMarker: END-REQUEST-921-PROTOCOL-ATTACK
[9] Rule:
[9] Skipped rule id '921016' due to a SecMarker: END-REQUEST-921-PROTOCOL-ATTACK
[9] Rule:
[9] Skipped rule id '921170' due to a SecMarker: END-REQUEST-921-PROTOCOL-ATTACK
[9] Rule:
[9] Skipped rule id '921180' due to a SecMarker: END-REQUEST-921-PROTOCOL-ATTACK
[9] Rule:
[9] Skipped rule id '921018' due to a SecMarker: END-REQUEST-921-PROTOCOL-ATTACK
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-921-PROTOCOL-ATTACK
[9] Rule: END-REQUEST-921-PROTOCOL-ATTACK
[4] Out of a SecMarker after skip 6.000000 rules.
[4] (Rule: 930012) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 930100) Executing operator "Rx" with param "(?i)(?:\x5c|(?:%(?:c(?:0%(?:[2aq]f|5c|9v)|1%(?:[19p]c|8s|af))|2(?:5(?:c(?:0%25af|1%259c)|2f|5c)|%46|f)|(?:(?:f(?:8%8)?0%8|e)0%80%a|bg%q)f|%3(?:2(?:%(?:%6|4)6|F)|5%%63)|u(?:221[56]|002f|EFC8|F025)|1u|5c)|0x(?:2f|5c)|\/))(?:%(?:(?:f(?:(?:c%80|8)%8)?0%8|e)0%80%ae|2(?:(?:5(?:c0%25a|2))?e|%45)|u(?:(?:002|ff0)e|2024)|%32(?:%(?:%6|4)5|E)|c0(?:%[256aef]e|\.))|\.(?:%0[01]|\?)?|\?\.?|0x2e){2}(?:\x5c|(?:%(?:c(?:0%(?:[2aq]f|5c|9v)|1%(?:[19p]c|8s|af))|2(?:5(?:c(?:0%25af|1%259c)|2f|5c)|%46|f)|(?:(?:f(?:8%8)?0%8|e)0%80%a|bg%q)f|%3(?:2(?:%(?:%6|4)6|F)|5%%63)|u(?:221[56]|002f|EFC8|F025)|1u|5c)|0x(?:2f|5c)|\/))" against REQUEST_URI_RAW|REQUEST_BODY|REQUEST_HEADERS|XML:/*, except for: REQUEST_HEADERS:Referer.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "/modsec-full/" (Variable: REQUEST_URI_RAW)
[9] Target value: "d=b" (Variable: REQUEST_BODY)
[9] Target value: "localhost" (Variable: REQUEST_HEADERS:Host)
[9] Target value: "curl/7.52.1" (Variable: REQUEST_HEADERS:User-Agent)
[9] Target value: "*/*" (Variable: REQUEST_HEADERS:Accept)
[9] Target value: "3" (Variable: REQUEST_HEADERS:Content-Length)
[9] Target value: "application/x-www-form-urlencoded" (Variable: REQUEST_HEADERS:Content-Type)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 930110) Executing operator "Pm" with param "..\ ../" against REQUEST_URI|REQUEST_BODY|REQUEST_HEADERS|XML:/*, except for: REQUEST_HEADERS:Referer.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "/modsec-full/"
[9] T (1) t:urlDecodeUni: "/modsec-full/"
[9] T (2) t:removeNulls: "/modsec-full/"
[9] T (3) t:cmdLine: "/modsec-full/"
[9] Target value: "/modsec-full/" (Variable: REQUEST_URI)
[9] T (0) t:utf8toUnicode: "d=b"
[9] T (1) t:urlDecodeUni: "d=b"
[9] T (2) t:removeNulls: "d=b"
[9] T (3) t:cmdLine: "d=b"
[9] Target value: "d=b" (Variable: REQUEST_BODY)
[9] T (0) t:utf8toUnicode: "localhost"
[9] T (1) t:urlDecodeUni: "localhost"
[9] T (2) t:removeNulls: "localhost"
[9] T (3) t:cmdLine: "localhost"
[9] Target value: "localhost" (Variable: REQUEST_HEADERS:Host)
[9] T (0) t:utf8toUnicode: "curl/7.52.1"
[9] T (1) t:urlDecodeUni: "curl/7.52.1"
[9] T (2) t:removeNulls: "curl/7.52.1"
[9] T (3) t:cmdLine: "curl/7.52.1"
[9] Target value: "curl/7.52.1" (Variable: REQUEST_HEADERS:User-Agent)
[9] T (0) t:utf8toUnicode: "*/*"
[9] T (1) t:urlDecodeUni: "*/*"
[9] T (2) t:removeNulls: "*/*"
[9] T (3) t:cmdLine: "*/*"
[9] Target value: "*/*" (Variable: REQUEST_HEADERS:Accept)
[9] T (0) t:utf8toUnicode: "3"
[9] T (1) t:urlDecodeUni: "3"
[9] T (2) t:removeNulls: "3"
[9] T (3) t:cmdLine: "3"
[9] Target value: "3" (Variable: REQUEST_HEADERS:Content-Length)
[9] T (0) t:utf8toUnicode: "application/x-www-form-urlencoded"
[9] T (1) t:urlDecodeUni: "application/x-www-form-urlencoded"
[9] T (2) t:removeNulls: "application/x-www-form-urlencoded"
[9] T (3) t:cmdLine: "application/x-www-form-urlencoded"
[9] Target value: "application/x-www-form-urlencoded" (Variable: REQUEST_HEADERS:Content-Type)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 930120) Executing operator "PmFromFile" with param "lfi-os-files.data" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:normalizePathWin: "d"
[9] T (3) t:lowercase: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:normalizePathWin: "b"
[9] T (3) t:lowercase: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 930130) Executing operator "PmFromFile" with param "restricted-files.data" against REQUEST_FILENAME.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "/modsec-full/"
[9] T (1) t:urlDecodeUni: "/modsec-full/"
[9] T (2) t:normalizePathWin: "/modsec-full/"
[9] T (3) t:lowercase: "/modsec-full/"
[9] Target value: "/modsec-full/" (Variable: REQUEST_FILENAME)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 930014) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-930-APPLICATION-ATTACK-LFI
[9] Skipped rule id '930016' due to a SecMarker: END-REQUEST-930-APPLICATION-ATTACK-LFI
[9] Rule:
[9] Skipped rule id '930018' due to a SecMarker: END-REQUEST-930-APPLICATION-ATTACK-LFI
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-930-APPLICATION-ATTACK-LFI
[9] Rule: END-REQUEST-930-APPLICATION-ATTACK-LFI
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 931012) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 931100) Executing operator "Rx" with param "^(?i)(?:file|ftps?|https?):\/\/(\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})" against ARGS.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 931110) Executing operator "Rx" with param "(?i:(\binclude\s*\([^)]*|mosConfig_absolute_path|_CONF\[path\]|_SERVER\[DOCUMENT_ROOT\]|GALLERY_BASEDIR|path\[docroot\]|appserv_root|config\[root_dir\])=(file|ftps?|https?):\/\/)" against QUERY_STRING|REQUEST_BODY.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d=b"
[9] Target value: "d=b" (Variable: REQUEST_BODY)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 931120) Executing operator "Rx" with param "^(?i)(?:file|ftps?|https?)(.*?)\?+$" against ARGS.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 931014) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-931-APPLICATION-ATTACK-RFI
[9] Skipped rule id '931130' due to a SecMarker: END-REQUEST-931-APPLICATION-ATTACK-RFI
[9] Rule:
[9] Skipped rule id '931016' due to a SecMarker: END-REQUEST-931-APPLICATION-ATTACK-RFI
[9] Rule:
[9] Skipped rule id '931018' due to a SecMarker: END-REQUEST-931-APPLICATION-ATTACK-RFI
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-931-APPLICATION-ATTACK-RFI
[9] Rule: END-REQUEST-931-APPLICATION-ATTACK-RFI
[4] Out of a SecMarker after skip 4.000000 rules.
[4] (Rule: 932012) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 932100) Executing operator "Rx" with param "(?:;|\{|\||\|\||&|&&|\n|\r|\$\(|\$\(\(|`|\${|<\(|>\(|\(\s*\))\s*(?:{|\s*\(\s*|\w+=(?:[^\s]*|\$.*|\$.*|<.*|>.*|\'.*\'|\".*\")\s+|!\s*|\$)*\s*(?:'|\")*(?:[\?\*\[\]\(\)\-\|+\w'\"\./\\\\]+/)?[\\\\'\"]*(?:l[\\\\'\"]*(?:w[\\\\'\"]*p[\\\\'\"]*-[\\\\'\"]*(?:d[\\\\'\"]*(?:o[\\\\'\"]*w[\\\\'\"]*n[\\\\'\"]*l[\\\\'\"]*o[\\\\'\"]*a[\\\\'\"]*d|u[\\\\'\"]*m[\\\\'\"]*p)|r[\\\\'\"]*e[\\\\'\"]*q[\\\\'\"]*u[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*t|m[\\\\'\"]*i[\\\\'\"]*r[\\\\'\"]*r[\\\\'\"]*o[\\\\'\"]*r)|s(?:[\\\\'\"]*(?:b[\\\\'\"]*_[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*l[\\\\'\"]*e[\\\\'\"]*a[\\\\'\"]*s[\\\\'\"]*e|c[\\\\'\"]*p[\\\\'\"]*u|m[\\\\'\"]*o[\\\\'\"]*d|p[\\\\'\"]*c[\\\\'\"]*i|u[\\\\'\"]*s[\\\\'\"]*b|-[\\\\'\"]*F|h[\\\\'\"]*w|o[\\\\'\"]*f))?|z[\\\\'\"]*(?:(?:[ef][\\\\'\"]*)?g[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*p|c[\\\\'\"]*(?:a[\\\\'\"]*t|m[\\\\'\"]*p)|m[\\\\'\"]*(?:o[\\\\'\"]*r[\\\\'\"]*e|a)|d[\\\\'\"]*i[\\\\'\"]*f[\\\\'\"]*f|l[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*s)|e[\\\\'\"]*s[\\\\'\"]*s[\\\\'\"]*(?:(?:f[\\\\'\"]*i[\\\\'\"]*l|p[\\\\'\"]*i[\\\\'\"]*p)[\\\\'\"]*e|e[\\\\'\"]*c[\\\\'\"]*h[\\\\'\"]*o|(?:\s|<|>).*)|a[\\\\'\"]*s[\\\\'\"]*t[\\\\'\"]*(?:l[\\\\'\"]*o[\\\\'\"]*g(?:[\\\\'\"]*i[\\\\'\"]*n)?|c[\\\\'\"]*o[\\\\'\"]*m[\\\\'\"]*m|(?:\s|<|>).*)|o[\\\\'\"]*(?:c[\\\\'\"]*a[\\\\'\"]*(?:t[\\\\'\"]*e|l)[\\\\'\"]*(?:\s|<|>).*|g[\\\\'\"]*n[\\\\'\"]*a[\\\\'\"]*m[\\\\'\"]*e)|d[\\\\'\"]*(?:c[\\\\'\"]*o[\\\\'\"]*n[\\\\'\"]*f[\\\\'\"]*i[\\\\'\"]*g|d[\\\\'\"]*(?:\s|<|>).*)|f[\\\\'\"]*t[\\\\'\"]*p(?:[\\\\'\"]*g[\\\\'\"]*e[\\\\'\"]*t)?|(?:[np]|y[\\\\'\"]*n[\\\\'\"]*x)[\\\\'\"]*(?:\s|<|>).*)|b[\\\\'\"]*(?:z[\\\\'\"]*(?:(?:[ef][\\\\'\"]*)?g[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*p|d[\\\\'\"]*i[\\\\'\"]*f[\\\\'\"]*f|l[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*s|m[\\\\'\"]*o[\\\\'\"]*r[\\\\'\"]*e|c[\\\\'\"]*a[\\\\'\"]*t|i[\\\\'\"]*p[\\\\'\"]*2)|s[\\\\'\"]*d[\\\\'\"]*(?:c[\\\\'\"]*a[\\\\'\"]*t|i[\\\\'\"]*f[\\\\'\"]*f|t[\\\\'\"]*a[\\\\'\"]*r)|a[\\\\'\"]*(?:t[\\\\'\"]*c[\\\\'\"]*h[\\\\'\"]*(?:\s|<|>).*|s[\\\\'\"]*h)|r[\\\\'\"]*e[\\\\'\"]*a[\\\\'\"]*k[\\\\'\"]*s[\\\\'\"]*w|u[\\\\'\"]*i[\\\\'\"]*l[\\\\'\"]*t[\\\\'\"]*i[\\\\'\"]*n)|c[\\\\'\"]*(?:o[\\\\'\"]*(?:m[\\\\'\"]*(?:p[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*s|m[\\\\'\"]*a[\\\\'\"]*n[\\\\'\"]*d)[\\\\'\"]*(?:\s|<|>).*|p[\\\\'\"]*r[\\\\'\"]*o[\\\\'\"]*c)|h[\\\\'\"]*(?:d[\\\\'\"]*i[\\\\'\"]*r[\\\\'\"]*(?:\s|<|>).*|f[\\\\'\"]*l[\\\\'\"]*a[\\\\'\"]*g[\\\\'\"]*s|a[\\\\'\"]*t[\\\\'\"]*t[\\\\'\"]*r|m[\\\\'\"]*o[\\\\'\"]*d)|r[\\\\'\"]*o[\\\\'\"]*n[\\\\'\"]*t[\\\\'\"]*a[\\\\'\"]*b|(?:[cp]|a[\\\\'\"]*t)[\\\\'\"]*(?:\s|<|>).*|u[\\\\'\"]*r[\\\\'\"]*l|s[\\\\'\"]*h)|f[\\\\'\"]*(?:i(?:[\\\\'\"]*(?:l[\\\\'\"]*e[\\\\'\"]*(?:t[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*t|(?:\s|<|>).*)|n[\\\\'\"]*d[\\\\'\"]*(?:\s|<|>).*))?|t[\\\\'\"]*p[\\\\'\"]*(?:s[\\\\'\"]*t[\\\\'\"]*a[\\\\'\"]*t[\\\\'\"]*s|w[\\\\'\"]*h[\\\\'\"]*o|(?:\s|<|>).*)|u[\\\\'\"]*n[\\\\'\"]*c[\\\\'\"]*t[\\\\'\"]*i[\\\\'\"]*o[\\\\'\"]*n|(?:e[\\\\'\"]*t[\\\\'\"]*c[\\\\'\"]*h|c)[\\\\'\"]*(?:\s|<|>).*|o[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*a[\\\\'\"]*c[\\\\'\"]*h|g[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*p)|e[\\\\'\"]*(?:n[\\\\'\"]*(?:v(?:[\\\\'\"]*-[\\\\'\"]*u[\\\\'\"]*p[\\\\'\"]*d[\\\\'\"]*a[\\\\'\"]*t[\\\\'\"]*e)?|d[\\\\'\"]*(?:i[\\\\'\"]*f|s[\\\\'\"]*w))|x[\\\\'\"]*(?:p[\\\\'\"]*(?:a[\\\\'\"]*n[\\\\'\"]*d|o[\\\\'\"]*r[\\\\'\"]*t|r)|e[\\\\'\"]*c[\\\\'\"]*(?:\s|<|>).*|i[\\\\'\"]*t)|c[\\\\'\"]*h[\\\\'\"]*o[\\\\'\"]*(?:\s|<|>).*|g[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*p|s[\\\\'\"]*a[\\\\'\"]*c|v[\\\\'\"]*a[\\\\'\"]*l)|h[\\\\'\"]*(?:t[\\\\'\"]*(?:d[\\\\'\"]*i[\\\\'\"]*g[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*t|p[\\\\'\"]*a[\\\\'\"]*s[\\\\'\"]*s[\\\\'\"]*w[\\\\'\"]*d)|o[\\\\'\"]*s[\\\\'\"]*t[\\\\'\"]*(?:n[\\\\'\"]*a[\\\\'\"]*m[\\\\'\"]*e|i[\\\\'\"]*d)|(?:e[\\\\'\"]*a[\\\\'\"]*d|u[\\\\'\"]*p)[\\\\'\"]*(?:\s|<|>).*|i[\\\\'\"]*s[\\\\'\"]*t[\\\\'\"]*o[\\\\'\"]*r[\\\\'\"]*y)|i[\\\\'\"]*(?:p[\\\\'\"]*(?:(?:6[\\\\'\"]*)?t[\\\\'\"]*a[\\\\'\"]*b[\\\\'\"]*l[\\\\'\"]*e[\\\\'\"]*s|c[\\\\'\"]*o[\\\\'\"]*n[\\\\'\"]*f[\\\\'\"]*i[\\\\'\"]*g)|r[\\\\'\"]*b(?:[\\\\'\"]*(?:1(?:[\\\\'\"]*[89])?|2[\\\\'\"]*[012]))?|f[\\\\'\"]*c[\\\\'\"]*o[\\\\'\"]*n[\\\\'\"]*f[\\\\'\"]*i[\\\\'\"]*g|d[\\\\'\"]*(?:\s|<|>).*)|g[\\\\'\"]*(?:(?:e[\\\\'\"]*t[\\\\'\"]*f[\\\\'\"]*a[\\\\'\"]*c[\\\\'\"]*l|r[\\\\'\"]*e[\\\\'\"]*p|c[\\\\'\"]*c|i[\\\\'\"]*t)[\\\\'\"]*(?:\s|<|>).*|z[\\\\'\"]*(?:c[\\\\'\"]*a[\\\\'\"]*t|i[\\\\'\"]*p)|u[\\\\'\"]*n[\\\\'\"]*z[\\\\'\"]*i[\\\\'\"]*p|d[\\\\'\"]*b)|a[\\\\'\"]*(?:(?:l[\\\\'\"]*i[\\\\'\"]*a[\\\\'\"]*s|w[\\\\'\"]*k)[\\\\'\"]*(?:\s|<|>).*|d[\\\\'\"]*d[\\\\'\"]*u[\\\\'\"]*s[\\\\'\"]*e[\\\\'\"]*r|p[\\\\'\"]*t[\\\\'\"]*-[\\\\'\"]*g[\\\\'\"]*e[\\\\'\"]*t|r[\\\\'\"]*(?:c[\\\\'\"]*h[\\\\'\"]*(?:\s|<|>).*|p))|d[\\\\'\"]*(?:h[\\\\'\"]*c[\\\\'\"]*l[\\\\'\"]*i[\\\\'\"]*e[\\\\'\"]*n[\\\\'\"]*t|(?:i[\\\\'\"]*f[\\\\'\"]*f|u)[\\\\'\"]*(?:\s|<|>).*|(?:m[\\\\'\"]*e[\\\\'\"]*s|p[\\\\'\"]*k)[\\\\'\"]*g|o[\\\\'\"]*(?:a[\\\\'\"]*s|n[\\\\'\"]*e)|a[\\\\'\"]*s[\\\\'\"]*h)|m[\\\\'\"]*(?:(?:k[\\\\'\"]*d[\\\\'\"]*i[\\\\'\"]*r|o[\\\\'\"]*r[\\\\'\"]*e)[\\\\'\"]*(?:\s|<|>).*|a[\\\\'\"]*i[\\\\'\"]*l[\\\\'\"]*(?:x[\\\\'\"]*(?:\s|<|>).*|q)|l[\\\\'\"]*o[\\\\'\"]*c[\\\\'\"]*a[\\\\'\"]*t[\\\\'\"]*e)|j[\\\\'\"]*(?:(?:a[\\\\'\"]*v[\\\\'\"]*a|o[\\\\'\"]*b[\\\\'\"]*s)[\\\\'\"]*(?:\s|<|>).*|e[\\\\'\"]*x[\\\\'\"]*e[\\\\'\"]*c)|k[\\\\'\"]*i[\\\\'\"]*l[\\\\'\"]*l[\\\\'\"]*(?:a[\\\\'\"]*l[\\\\'\"]*l|(?:\s|<|>).*)|(?:G[\\\\'\"]*E[\\\\'\"]*T[\\\\'\"]*(?:\s|<|>)|\.\s).*|7[\\\\'\"]*z(?:[\\\\'\"]*[ar])?)\b" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 932105) Executing operator "Rx" with param "(?:;|\{|\||\|\||&|&&|\n|\r|\$\(|\$\(\(|`|\${|<\(|>\(|\(\s*\))\s*(?:{|\s*\(\s*|\w+=(?:[^\s]*|\$.*|\$.*|<.*|>.*|\'.*\'|\".*\")\s+|!\s*|\$)*\s*(?:'|\")*(?:[\?\*\[\]\(\)\-\|+\w'\"\./\\\\]+/)?[\\\\'\"]*(?:s[\\\\'\"]*(?:e[\\\\'\"]*(?:t[\\\\'\"]*(?:(?:f[\\\\'\"]*a[\\\\'\"]*c[\\\\'\"]*l[\\\\'\"]*)?(?:\s|<|>).*|e[\\\\'\"]*n[\\\\'\"]*v|s[\\\\'\"]*i[\\\\'\"]*d)|n[\\\\'\"]*d[\\\\'\"]*m[\\\\'\"]*a[\\\\'\"]*i[\\\\'\"]*l|d[\\\\'\"]*(?:\s|<|>).*)|h[\\\\'\"]*(?:\.[\\\\'\"]*d[\\\\'\"]*i[\\\\'\"]*s[\\\\'\"]*t[\\\\'\"]*r[\\\\'\"]*i[\\\\'\"]*b|u[\\\\'\"]*t[\\\\'\"]*d[\\\\'\"]*o[\\\\'\"]*w[\\\\'\"]*n|(?:\s|<|>).*)|o[\\\\'\"]*(?:(?:u[\\\\'\"]*r[\\\\'\"]*c[\\\\'\"]*e|r[\\\\'\"]*t)[\\\\'\"]*(?:\s|<|>).*|c[\\\\'\"]*a[\\\\'\"]*t)|c[\\\\'\"]*(?:h[\\\\'\"]*e[\\\\'\"]*d|p[\\\\'\"]*(?:\s|<|>).*)|t[\\\\'\"]*r[\\\\'\"]*i[\\\\'\"]*n[\\\\'\"]*g[\\\\'\"]*s|(?:l[\\\\'\"]*e[\\\\'\"]*e|f[\\\\'\"]*t)[\\\\'\"]*p|y[\\\\'\"]*s[\\\\'\"]*c[\\\\'\"]*t[\\\\'\"]*l|u[\\\\'\"]*(?:(?:\s|<|>).*|d[\\\\'\"]*o)|d[\\\\'\"]*i[\\\\'\"]*f[\\\\'\"]*f|s[\\\\'\"]*h|v[\\\\'\"]*n)|p[\\\\'\"]*(?:k[\\\\'\"]*(?:g(?:(?:[\\\\'\"]*_)?[\\\\'\"]*i[\\\\'\"]*n[\\\\'\"]*f[\\\\'\"]*o)?|e[\\\\'\"]*x[\\\\'\"]*e[\\\\'\"]*c|i[\\\\'\"]*l[\\\\'\"]*l)|t[\\\\'\"]*a[\\\\'\"]*r(?:[\\\\'\"]*(?:d[\\\\'\"]*i[\\\\'\"]*f[\\\\'\"]*f|g[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*p))?|a[\\\\'\"]*(?:t[\\\\'\"]*c[\\\\'\"]*h[\\\\'\"]*(?:\s|<|>).*|s[\\\\'\"]*s[\\\\'\"]*w[\\\\'\"]*d)|r[\\\\'\"]*i[\\\\'\"]*n[\\\\'\"]*t[\\\\'\"]*(?:e[\\\\'\"]*n[\\\\'\"]*v|f[\\\\'\"]*(?:\s|<|>).*)|y[\\\\'\"]*t[\\\\'\"]*h[\\\\'\"]*o[\\\\'\"]*n(?:[\\\\'\"]*(?:3(?:[\\\\'\"]*m)?|2))?|e[\\\\'\"]*r[\\\\'\"]*(?:l(?:[\\\\'\"]*(?:s[\\\\'\"]*h|5))?|m[\\\\'\"]*s)|(?:g[\\\\'\"]*r[\\\\'\"]*e|f[\\\\'\"]*t)[\\\\'\"]*p|(?:u[\\\\'\"]*s[\\\\'\"]*h|o[\\\\'\"]*p)[\\\\'\"]*d|h[\\\\'\"]*p(?:[\\\\'\"]*[57])?|i[\\\\'\"]*n[\\\\'\"]*g|s[\\\\'\"]*(?:\s|<|>).*)|n[\\\\'\"]*(?:c[\\\\'\"]*(?:\.[\\\\'\"]*(?:t[\\\\'\"]*r[\\\\'\"]*a[\\\\'\"]*d[\\\\'\"]*i[\\\\'\"]*t[\\\\'\"]*i[\\\\'\"]*o[\\\\'\"]*n[\\\\'\"]*a[\\\\'\"]*l|o[\\\\'\"]*p[\\\\'\"]*e[\\\\'\"]*n[\\\\'\"]*b[\\\\'\"]*s[\\\\'\"]*d)|(?:\s|<|>).*|a[\\\\'\"]*t)|e[\\\\'\"]*t[\\\\'\"]*(?:k[\\\\'\"]*i[\\\\'\"]*t[\\\\'\"]*-[\\\\'\"]*f[\\\\'\"]*t[\\\\'\"]*p|(?:s[\\\\'\"]*t|c)[\\\\'\"]*a[\\\\'\"]*t|(?:\s|<|>).*)|s[\\\\'\"]*(?:l[\\\\'\"]*o[\\\\'\"]*o[\\\\'\"]*k[\\\\'\"]*u[\\\\'\"]*p|t[\\\\'\"]*a[\\\\'\"]*t)|(?:a[\\\\'\"]*n[\\\\'\"]*o|i[\\\\'\"]*c[\\\\'\"]*e)[\\\\'\"]*(?:\s|<|>).*|(?:o[\\\\'\"]*h[\\\\'\"]*u|m[\\\\'\"]*a)[\\\\'\"]*p|p[\\\\'\"]*i[\\\\'\"]*n[\\\\'\"]*g)|r[\\\\'\"]*(?:e[\\\\'\"]*(?:(?:p[\\\\'\"]*(?:l[\\\\'\"]*a[\\\\'\"]*c[\\\\'\"]*e|e[\\\\'\"]*a[\\\\'\"]*t)|n[\\\\'\"]*a[\\\\'\"]*m[\\\\'\"]*e)[\\\\'\"]*(?:\s|<|>).*|a[\\\\'\"]*l[\\\\'\"]*p[\\\\'\"]*a[\\\\'\"]*t[\\\\'\"]*h)|m[\\\\'\"]*(?:(?:d[\\\\'\"]*i[\\\\'\"]*r[\\\\'\"]*)?(?:\s|<|>).*|u[\\\\'\"]*s[\\\\'\"]*e[\\\\'\"]*r)|u[\\\\'\"]*b[\\\\'\"]*y(?:[\\\\'\"]*(?:1(?:[\\\\'\"]*[89])?|2[\\\\'\"]*[012]))?|(?:a[\\\\'\"]*r|c[\\\\'\"]*p|p[\\\\'\"]*m)[\\\\'\"]*(?:\s|<|>).*|n[\\\\'\"]*a[\\\\'\"]*n[\\\\'\"]*o|o[\\\\'\"]*u[\\\\'\"]*t[\\\\'\"]*e|s[\\\\'\"]*y[\\\\'\"]*n[\\\\'\"]*c)|t[\\\\'\"]*(?:c[\\\\'\"]*(?:p[\\\\'\"]*(?:t[\\\\'\"]*r[\\\\'\"]*a[\\\\'\"]*c[\\\\'\"]*e[\\\\'\"]*r[\\\\'\"]*o[\\\\'\"]*u[\\\\'\"]*t[\\\\'\"]*e|i[\\\\'\"]*n[\\\\'\"]*g)|s[\\\\'\"]*h)|r[\\\\'\"]*a[\\\\'\"]*c[\\\\'\"]*e[\\\\'\"]*r[\\\\'\"]*o[\\\\'\"]*u[\\\\'\"]*t[\\\\'\"]*e(?:[\\\\'\"]*6)?|e[\\\\'\"]*(?:l[\\\\'\"]*n[\\\\'\"]*e[\\\\'\"]*t|e[\\\\'\"]*(?:\s|<|>).*)|i[\\\\'\"]*m[\\\\'\"]*e[\\\\'\"]*(?:o[\\\\'\"]*u[\\\\'\"]*t|(?:\s|<|>).*)|a[\\\\'\"]*(?:i[\\\\'\"]*l(?:[\\\\'\"]*f)?|r[\\\\'\"]*(?:\s|<|>).*)|o[\\\\'\"]*(?:u[\\\\'\"]*c[\\\\'\"]*h[\\\\'\"]*(?:\s|<|>).*|p))|u[\\\\'\"]*(?:n[\\\\'\"]*(?:l[\\\\'\"]*(?:i[\\\\'\"]*n[\\\\'\"]*k[\\\\'\"]*(?:\s|<|>).*|z[\\\\'\"]*m[\\\\'\"]*a)|c[\\\\'\"]*o[\\\\'\"]*m[\\\\'\"]*p[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*s|a[\\\\'\"]*m[\\\\'\"]*e|r[\\\\'\"]*a[\\\\'\"]*r|s[\\\\'\"]*e[\\\\'\"]*t|z[\\\\'\"]*i[\\\\'\"]*p|x[\\\\'\"]*z)|s[\\\\'\"]*e[\\\\'\"]*r[\\\\'\"]*(?:(?:a[\\\\'\"]*d|m[\\\\'\"]*o)[\\\\'\"]*d|d[\\\\'\"]*e[\\\\'\"]*l)|l[\\\\'\"]*i[\\\\'\"]*m[\\\\'\"]*i[\\\\'\"]*t[\\\\'\"]*(?:\s|<|>).*)|m[\\\\'\"]*(?:y[\\\\'\"]*s[\\\\'\"]*q[\\\\'\"]*l(?:[\\\\'\"]*(?:d[\\\\'\"]*u[\\\\'\"]*m[\\\\'\"]*p(?:[\\\\'\"]*s[\\\\'\"]*l[\\\\'\"]*o[\\\\'\"]*w)?|h[\\\\'\"]*o[\\\\'\"]*t[\\\\'\"]*c[\\\\'\"]*o[\\\\'\"]*p[\\\\'\"]*y|a[\\\\'\"]*d[\\\\'\"]*m[\\\\'\"]*i[\\\\'\"]*n|s[\\\\'\"]*h[\\\\'\"]*o[\\\\'\"]*w))?|(?:(?:o[\\\\'\"]*u[\\\\'\"]*n|u[\\\\'\"]*t)[\\\\'\"]*t|v)[\\\\'\"]*(?:\s|<|>).*)|x[\\\\'\"]*(?:z[\\\\'\"]*(?:(?:[ef][\\\\'\"]*)?g[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*p|d[\\\\'\"]*(?:i[\\\\'\"]*f[\\\\'\"]*f|e[\\\\'\"]*c)|c[\\\\'\"]*(?:a[\\\\'\"]*t|m[\\\\'\"]*p)|l[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*s|m[\\\\'\"]*o[\\\\'\"]*r[\\\\'\"]*e|(?:\s|<|>).*)|a[\\\\'\"]*r[\\\\'\"]*g[\\\\'\"]*s|t[\\\\'\"]*e[\\\\'\"]*r[\\\\'\"]*m|x[\\\\'\"]*d[\\\\'\"]*(?:\s|<|>).*)|z[\\\\'\"]*(?:(?:[ef][\\\\'\"]*)?g[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*p|c[\\\\'\"]*(?:a[\\\\'\"]*t|m[\\\\'\"]*p)|d[\\\\'\"]*i[\\\\'\"]*f[\\\\'\"]*f|i[\\\\'\"]*p[\\\\'\"]*(?:\s|<|>).*|l[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*s|m[\\\\'\"]*o[\\\\'\"]*r[\\\\'\"]*e|r[\\\\'\"]*u[\\\\'\"]*n|s[\\\\'\"]*h)|o[\\\\'\"]*(?:p[\\\\'\"]*e[\\\\'\"]*n[\\\\'\"]*s[\\\\'\"]*s[\\\\'\"]*l|n[\\\\'\"]*i[\\\\'\"]*n[\\\\'\"]*t[\\\\'\"]*r)|w[\\\\'\"]*(?:h[\\\\'\"]*o[\\\\'\"]*(?:a[\\\\'\"]*m[\\\\'\"]*i|(?:\s|<|>).*)|g[\\\\'\"]*e[\\\\'\"]*t|3[\\\\'\"]*m)|v[\\\\'\"]*i[\\\\'\"]*(?:m[\\\\'\"]*(?:\s|<|>).*|g[\\\\'\"]*r|p[\\\\'\"]*w)|y[\\\\'\"]*u[\\\\'\"]*m)\b" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 932110) Executing operator "Rx" with param "(?i)(?:;|\{|\||\|\||&|&&|\n|\r|`)\s*[\(,@\'\"\s]*(?:[\w'\"\./]+/|[\\\\'\"\^]*\w[\\\\'\"\^]*:.*\\\\|[\^\.\w '\"/\\\\]*\\\\)?[\"\^]*(?:m[\"\^]*(?:y[\"\^]*s[\"\^]*q[\"\^]*l(?:[\"\^]*(?:d[\"\^]*u[\"\^]*m[\"\^]*p(?:[\"\^]*s[\"\^]*l[\"\^]*o[\"\^]*w)?|h[\"\^]*o[\"\^]*t[\"\^]*c[\"\^]*o[\"\^]*p[\"\^]*y|a[\"\^]*d[\"\^]*m[\"\^]*i[\"\^]*n|s[\"\^]*h[\"\^]*o[\"\^]*w))?|s[\"\^]*(?:i[\"\^]*(?:n[\"\^]*f[\"\^]*o[\"\^]*3[\"\^]*2|e[\"\^]*x[\"\^]*e[\"\^]*c)|c[\"\^]*o[\"\^]*n[\"\^]*f[\"\^]*i[\"\^]*g|g[\"\^]*(?:[\s,;]|\.|/|<|>).*|t[\"\^]*s[\"\^]*c)|o[\"\^]*(?:u[\"\^]*n[\"\^]*t[\"\^]*(?:(?:[\s,;]|\.|/|<|>).*|v[\"\^]*o[\"\^]*l)|v[\"\^]*e[\"\^]*u[\"\^]*s[\"\^]*e[\"\^]*r|[dr][\"\^]*e[\"\^]*(?:[\s,;]|\.|/|<|>).*)|k[\"\^]*(?:d[\"\^]*i[\"\^]*r[\"\^]*(?:[\s,;]|\.|/|<|>).*|l[\"\^]*i[\"\^]*n[\"\^]*k)|d[\"\^]*(?:s[\"\^]*c[\"\^]*h[\"\^]*e[\"\^]*d|(?:[\s,;]|\.|/|<|>).*)|a[\"\^]*p[\"\^]*i[\"\^]*s[\"\^]*e[\"\^]*n[\"\^]*d|b[\"\^]*s[\"\^]*a[\"\^]*c[\"\^]*l[\"\^]*i|e[\"\^]*a[\"\^]*s[\"\^]*u[\"\^]*r[\"\^]*e|m[\"\^]*s[\"\^]*y[\"\^]*s)|d[\"\^]*(?:i[\"\^]*(?:s[\"\^]*k[\"\^]*(?:(?:m[\"\^]*g[\"\^]*m|p[\"\^]*a[\"\^]*r)[\"\^]*t|s[\"\^]*h[\"\^]*a[\"\^]*d[\"\^]*o[\"\^]*w)|r[\"\^]*(?:(?:[\s,;]|\.|/|<|>).*|u[\"\^]*s[\"\^]*e)|f[\"\^]*f[\"\^]*(?:[\s,;]|\.|/|<|>).*)|e[\"\^]*(?:l[\"\^]*(?:p[\"\^]*r[\"\^]*o[\"\^]*f|t[\"\^]*r[\"\^]*e[\"\^]*e|(?:[\s,;]|\.|/|<|>).*)|v[\"\^]*(?:m[\"\^]*g[\"\^]*m[\"\^]*t|c[\"\^]*o[\"\^]*n)|(?:f[\"\^]*r[\"\^]*a|b[\"\^]*u)[\"\^]*g)|s[\"\^]*(?:a[\"\^]*(?:c[\"\^]*l[\"\^]*s|d[\"\^]*d)|q[\"\^]*u[\"\^]*e[\"\^]*r[\"\^]*y|m[\"\^]*o[\"\^]*(?:v[\"\^]*e|d)|g[\"\^]*e[\"\^]*t|r[\"\^]*m)|(?:r[\"\^]*i[\"\^]*v[\"\^]*e[\"\^]*r[\"\^]*q[\"\^]*u[\"\^]*e[\"\^]*r|o[\"\^]*s[\"\^]*k[\"\^]*e)[\"\^]*y|(?:c[\"\^]*o[\"\^]*m[\"\^]*c[\"\^]*n[\"\^]*f|x[\"\^]*d[\"\^]*i[\"\^]*a)[\"\^]*g|a[\"\^]*t[\"\^]*e[\"\^]*(?:[\s,;]|\.|/|<|>).*|n[\"\^]*s[\"\^]*s[\"\^]*t[\"\^]*a[\"\^]*t)|c[\"\^]*(?:o[\"\^]*(?:m[\"\^]*(?:p[\"\^]*(?:(?:a[\"\^]*c[\"\^]*t[\"\^]*)?(?:[\s,;]|\.|/|<|>).*|m[\"\^]*g[\"\^]*m[\"\^]*t)|e[\"\^]*x[\"\^]*p)|n[\"\^]*(?:2[\"\^]*p|v[\"\^]*e)[\"\^]*r[\"\^]*t|p[\"\^]*y)|l[\"\^]*(?:e[\"\^]*a[\"\^]*(?:n[\"\^]*m[\"\^]*g[\"\^]*r|r[\"\^]*m[\"\^]*e[\"\^]*m)|u[\"\^]*s[\"\^]*t[\"\^]*e[\"\^]*r)|h[\"\^]*(?:k[\"\^]*(?:n[\"\^]*t[\"\^]*f[\"\^]*s|d[\"\^]*s[\"\^]*k)|d[\"\^]*i[\"\^]*r[\"\^]*(?:[\s,;]|\.|/|<|>).*)|s[\"\^]*(?:c[\"\^]*(?:r[\"\^]*i[\"\^]*p[\"\^]*t|c[\"\^]*m[\"\^]*d)|v[\"\^]*d[\"\^]*e)|e[\"\^]*r[\"\^]*t[\"\^]*(?:u[\"\^]*t[\"\^]*i[\"\^]*l|r[\"\^]*e[\"\^]*q)|a[\"\^]*(?:l[\"\^]*l[\"\^]*(?:[\s,;]|\.|/|<|>).*|c[\"\^]*l[\"\^]*s)|m[\"\^]*d(?:[\"\^]*k[\"\^]*e[\"\^]*y)?|i[\"\^]*p[\"\^]*h[\"\^]*e[\"\^]*r|u[\"\^]*r[\"\^]*l)|f[\"\^]*(?:o[\"\^]*r[\"\^]*(?:m[\"\^]*a[\"\^]*t[\"\^]*(?:[\s,;]|\.|/|<|>).*|f[\"\^]*i[\"\^]*l[\"\^]*e[\"\^]*s|e[\"\^]*a[\"\^]*c[\"\^]*h)|i[\"\^]*n[\"\^]*d[\"\^]*(?:(?:[\s,;]|\.|/|<|>).*|s[\"\^]*t[\"\^]*r)|s[\"\^]*(?:m[\"\^]*g[\"\^]*m[\"\^]*t|u[\"\^]*t[\"\^]*i[\"\^]*l)|t[\"\^]*(?:p[\"\^]*(?:[\s,;]|\.|/|<|>).*|y[\"\^]*p[\"\^]*e)|r[\"\^]*e[\"\^]*e[\"\^]*d[\"\^]*i[\"\^]*s[\"\^]*k|c[\"\^]*(?:[\s,;]|\.|/|<|>).*|g[\"\^]*r[\"\^]*e[\"\^]*p)|n[\"\^]*(?:e[\"\^]*t[\"\^]*(?:s[\"\^]*(?:t[\"\^]*a[\"\^]*t|v[\"\^]*c|h)|(?:[\s,;]|\.|/|<|>).*|c[\"\^]*a[\"\^]*t|d[\"\^]*o[\"\^]*m)|t[\"\^]*(?:b[\"\^]*a[\"\^]*c[\"\^]*k[\"\^]*u[\"\^]*p|r[\"\^]*i[\"\^]*g[\"\^]*h[\"\^]*t[\"\^]*s)|(?:s[\"\^]*l[\"\^]*o[\"\^]*o[\"\^]*k[\"\^]*u|m[\"\^]*a)[\"\^]*p|c[\"\^]*(?:(?:[\s,;]|\.|/|<|>).*|a[\"\^]*t)|b[\"\^]*t[\"\^]*s[\"\^]*t[\"\^]*a[\"\^]*t)|e[\"\^]*(?:x[\"\^]*(?:p[\"\^]*(?:a[\"\^]*n[\"\^]*d[\"\^]*(?:[\s,;]|\.|/|<|>).*|l[\"\^]*o[\"\^]*r[\"\^]*e[\"\^]*r)|i[\"\^]*t)|v[\"\^]*e[\"\^]*n[\"\^]*t[\"\^]*(?:c[\"\^]*r[\"\^]*e[\"\^]*a[\"\^]*t[\"\^]*e|v[\"\^]*w[\"\^]*r)|n[\"\^]*d[\"\^]*l[\"\^]*o[\"\^]*c[\"\^]*a[\"\^]*l|g[\"\^]*r[\"\^]*e[\"\^]*p|r[\"\^]*a[\"\^]*s[\"\^]*e|c[\"\^]*h[\"\^]*o)|g[\"\^]*(?:a[\"\^]*t[\"\^]*h[\"\^]*e[\"\^]*r[\"\^]*n[\"\^]*e[\"\^]*t[\"\^]*w[\"\^]*o[\"\^]*r[\"\^]*k[\"\^]*i[\"\^]*n[\"\^]*f[\"\^]*o|p[\"\^]*(?:(?:r[\"\^]*e[\"\^]*s[\"\^]*u[\"\^]*l|e[\"\^]*d[\"\^]*i)[\"\^]*t|u[\"\^]*p[\"\^]*d[\"\^]*a[\"\^]*t[\"\^]*e)|i[\"\^]*t[\"\^]*(?:[\s,;]|\.|/|<|>).*|e[\"\^]*t[\"\^]*m[\"\^]*a[\"\^]*c)|i[\"\^]*(?:r[\"\^]*b(?:[\"\^]*(?:1(?:[\"\^]*[89])?|2[\"\^]*[012]))?|f[\"\^]*m[\"\^]*e[\"\^]*m[\"\^]*b[\"\^]*e[\"\^]*r|p[\"\^]*c[\"\^]*o[\"\^]*n[\"\^]*f[\"\^]*i[\"\^]*g|n[\"\^]*e[\"\^]*t[\"\^]*c[\"\^]*p[\"\^]*l|c[\"\^]*a[\"\^]*c[\"\^]*l[\"\^]*s)|a[\"\^]*(?:d[\"\^]*(?:d[\"\^]*u[\"\^]*s[\"\^]*e[\"\^]*r[\"\^]*s|m[\"\^]*o[\"\^]*d[\"\^]*c[\"\^]*m[\"\^]*d)|r[\"\^]*p[\"\^]*(?:[\s,;]|\.|/|<|>).*|t[\"\^]*t[\"\^]*r[\"\^]*i[\"\^]*b|s[\"\^]*s[\"\^]*o[\"\^]*c|z[\"\^]*m[\"\^]*a[\"\^]*n)|l[\"\^]*(?:o[\"\^]*g[\"\^]*(?:e[\"\^]*v[\"\^]*e[\"\^]*n[\"\^]*t|t[\"\^]*i[\"\^]*m[\"\^]*e|m[\"\^]*a[\"\^]*n|o[\"\^]*f[\"\^]*f)|a[\"\^]*b[\"\^]*e[\"\^]*l[\"\^]*(?:[\s,;]|\.|/|<|>).*|u[\"\^]*s[\"\^]*r[\"\^]*m[\"\^]*g[\"\^]*r)|b[\"\^]*(?:(?:c[\"\^]*d[\"\^]*(?:b[\"\^]*o[\"\^]*o|e[\"\^]*d[\"\^]*i)|r[\"\^]*o[\"\^]*w[\"\^]*s[\"\^]*t[\"\^]*a)[\"\^]*t|i[\"\^]*t[\"\^]*s[\"\^]*a[\"\^]*d[\"\^]*m[\"\^]*i[\"\^]*n|o[\"\^]*o[\"\^]*t[\"\^]*c[\"\^]*f[\"\^]*g)|h[\"\^]*(?:o[\"\^]*s[\"\^]*t[\"\^]*n[\"\^]*a[\"\^]*m[\"\^]*e|d[\"\^]*w[\"\^]*w[\"\^]*i[\"\^]*z)|j[\"\^]*a[\"\^]*v[\"\^]*a[\"\^]*(?:[\s,;]|\.|/|<|>).*|7[\"\^]*z(?:[\"\^]*[ar])?)(?:\.[\"\^]*\w+)?\b" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 932115) Executing operator "Rx" with param "(?i)(?:;|\{|\||\|\||&|&&|\n|\r|`)\s*[\(,@\'\"\s]*(?:[\w'\"\./]+/|[\\\\'\"\^]*\w[\\\\'\"\^]*:.*\\\\|[\^\.\w '\"/\\\\]*\\\\)?[\"\^]*(?:s[\"\^]*(?:y[\"\^]*s[\"\^]*(?:t[\"\^]*e[\"\^]*m[\"\^]*(?:p[\"\^]*r[\"\^]*o[\"\^]*p[\"\^]*e[\"\^]*r[\"\^]*t[\"\^]*i[\"\^]*e[\"\^]*s[\"\^]*(?:d[\"\^]*a[\"\^]*t[\"\^]*a[\"\^]*e[\"\^]*x[\"\^]*e[\"\^]*c[\"\^]*u[\"\^]*t[\"\^]*i[\"\^]*o[\"\^]*n[\"\^]*p[\"\^]*r[\"\^]*e[\"\^]*v[\"\^]*e[\"\^]*n[\"\^]*t[\"\^]*i[\"\^]*o[\"\^]*n|(?:p[\"\^]*e[\"\^]*r[\"\^]*f[\"\^]*o[\"\^]*r[\"\^]*m[\"\^]*a[\"\^]*n[\"\^]*c|h[\"\^]*a[\"\^]*r[\"\^]*d[\"\^]*w[\"\^]*a[\"\^]*r)[\"\^]*e|a[\"\^]*d[\"\^]*v[\"\^]*a[\"\^]*n[\"\^]*c[\"\^]*e[\"\^]*d)|i[\"\^]*n[\"\^]*f[\"\^]*o)|k[\"\^]*e[\"\^]*y|d[\"\^]*m)|h[\"\^]*(?:o[\"\^]*(?:w[\"\^]*(?:g[\"\^]*r[\"\^]*p|m[\"\^]*b[\"\^]*r)[\"\^]*s|r[\"\^]*t[\"\^]*c[\"\^]*u[\"\^]*t)|e[\"\^]*l[\"\^]*l[\"\^]*r[\"\^]*u[\"\^]*n[\"\^]*a[\"\^]*s|u[\"\^]*t[\"\^]*d[\"\^]*o[\"\^]*w[\"\^]*n|r[\"\^]*p[\"\^]*u[\"\^]*b[\"\^]*w|a[\"\^]*r[\"\^]*e|i[\"\^]*f[\"\^]*t)|e[\"\^]*(?:t[\"\^]*(?:(?:x[\"\^]*)?(?:[\s,;]|\.|/|<|>).*|l[\"\^]*o[\"\^]*c[\"\^]*a[\"\^]*l)|c[\"\^]*p[\"\^]*o[\"\^]*l|l[\"\^]*e[\"\^]*c[\"\^]*t)|c[\"\^]*(?:h[\"\^]*t[\"\^]*a[\"\^]*s[\"\^]*k[\"\^]*s|l[\"\^]*i[\"\^]*s[\"\^]*t)|u[\"\^]*b[\"\^]*(?:i[\"\^]*n[\"\^]*a[\"\^]*c[\"\^]*l|s[\"\^]*t)|t[\"\^]*a[\"\^]*r[\"\^]*t[\"\^]*(?:[\s,;]|\.|/|<|>).*|i[\"\^]*g[\"\^]*v[\"\^]*e[\"\^]*r[\"\^]*i[\"\^]*f|l[\"\^]*(?:e[\"\^]*e[\"\^]*p|m[\"\^]*g[\"\^]*r)|o[\"\^]*r[\"\^]*t|f[\"\^]*c|v[\"\^]*n)|p[\"\^]*(?:s[\"\^]*(?:s[\"\^]*(?:h[\"\^]*u[\"\^]*t[\"\^]*d[\"\^]*o[\"\^]*w[\"\^]*n|e[\"\^]*r[\"\^]*v[\"\^]*i[\"\^]*c[\"\^]*e|u[\"\^]*s[\"\^]*p[\"\^]*e[\"\^]*n[\"\^]*d)|l[\"\^]*(?:o[\"\^]*g[\"\^]*(?:g[\"\^]*e[\"\^]*d[\"\^]*o[\"\^]*n|l[\"\^]*i[\"\^]*s[\"\^]*t)|i[\"\^]*s[\"\^]*t)|p[\"\^]*(?:a[\"\^]*s[\"\^]*s[\"\^]*w[\"\^]*d|i[\"\^]*n[\"\^]*g)|g[\"\^]*e[\"\^]*t[\"\^]*s[\"\^]*i[\"\^]*d|e[\"\^]*x[\"\^]*e[\"\^]*c|f[\"\^]*i[\"\^]*l[\"\^]*e|i[\"\^]*n[\"\^]*f[\"\^]*o|k[\"\^]*i[\"\^]*l[\"\^]*l)|o[\"\^]*(?:w[\"\^]*e[\"\^]*r[\"\^]*(?:s[\"\^]*h[\"\^]*e[\"\^]*l[\"\^]*l(?:[\"\^]*_[\"\^]*i[\"\^]*s[\"\^]*e)?|c[\"\^]*f[\"\^]*g)|r[\"\^]*t[\"\^]*q[\"\^]*r[\"\^]*y|p[\"\^]*d)|r[\"\^]*(?:i[\"\^]*n[\"\^]*t[\"\^]*(?:(?:[\s,;]|\.|/|<|>).*|b[\"\^]*r[\"\^]*m)|n[\"\^]*(?:c[\"\^]*n[\"\^]*f[\"\^]*g|m[\"\^]*n[\"\^]*g[\"\^]*r)|o[\"\^]*m[\"\^]*p[\"\^]*t)|a[\"\^]*t[\"\^]*h[\"\^]*(?:p[\"\^]*i[\"\^]*n[\"\^]*g|(?:[\s,;]|\.|/|<|>).*)|e[\"\^]*r[\"\^]*(?:l(?:[\"\^]*(?:s[\"\^]*h|5))?|f[\"\^]*m[\"\^]*o[\"\^]*n)|y[\"\^]*t[\"\^]*h[\"\^]*o[\"\^]*n(?:[\"\^]*(?:3(?:[\"\^]*m)?|2))?|k[\"\^]*g[\"\^]*m[\"\^]*g[\"\^]*r|h[\"\^]*p(?:[\"\^]*[57])?|u[\"\^]*s[\"\^]*h[\"\^]*d|i[\"\^]*n[\"\^]*g)|r[\"\^]*(?:e[\"\^]*(?:(?:p[\"\^]*l[\"\^]*a[\"\^]*c[\"\^]*e|n(?:[\"\^]*a[\"\^]*m[\"\^]*e)?|s[\"\^]*e[\"\^]*t)[\"\^]*(?:[\s,;]|\.|/|<|>).*|g[\"\^]*(?:s[\"\^]*v[\"\^]*r[\"\^]*3[\"\^]*2|e[\"\^]*d[\"\^]*i[\"\^]*t|(?:[\s,;]|\.|/|<|>).*|i[\"\^]*n[\"\^]*i)|c[\"\^]*(?:d[\"\^]*i[\"\^]*s[\"\^]*c|o[\"\^]*v[\"\^]*e[\"\^]*r)|k[\"\^]*e[\"\^]*y[\"\^]*w[\"\^]*i[\"\^]*z)|u[\"\^]*(?:n[\"\^]*(?:d[\"\^]*l[\"\^]*l[\"\^]*3[\"\^]*2|a[\"\^]*s)|b[\"\^]*y[\"\^]*(?:1(?:[\"\^]*[89])?|2[\"\^]*[012]))|a[\"\^]*(?:s[\"\^]*(?:p[\"\^]*h[\"\^]*o[\"\^]*n[\"\^]*e|d[\"\^]*i[\"\^]*a[\"\^]*l)|r[\"\^]*(?:[\s,;]|\.|/|<|>).*)|m[\"\^]*(?:(?:d[\"\^]*i[\"\^]*r[\"\^]*)?(?:[\s,;]|\.|/|<|>).*|t[\"\^]*s[\"\^]*h[\"\^]*a[\"\^]*r[\"\^]*e)|o[\"\^]*(?:u[\"\^]*t[\"\^]*e[\"\^]*(?:[\s,;]|\.|/|<|>).*|b[\"\^]*o[\"\^]*c[\"\^]*o[\"\^]*p[\"\^]*y)|s[\"\^]*(?:t[\"\^]*r[\"\^]*u[\"\^]*i|y[\"\^]*n[\"\^]*c)|d[\"\^]*(?:[\s,;]|\.|/|<|>).*)|t[\"\^]*(?:a[\"\^]*(?:s[\"\^]*k[\"\^]*(?:k[\"\^]*i[\"\^]*l[\"\^]*l|l[\"\^]*i[\"\^]*s[\"\^]*t|s[\"\^]*c[\"\^]*h[\"\^]*d|m[\"\^]*g[\"\^]*r)|k[\"\^]*e[\"\^]*o[\"\^]*w[\"\^]*n)|(?:i[\"\^]*m[\"\^]*e[\"\^]*o[\"\^]*u|p[\"\^]*m[\"\^]*i[\"\^]*n[\"\^]*i|e[\"\^]*l[\"\^]*n[\"\^]*e|l[\"\^]*i[\"\^]*s)[\"\^]*t|s[\"\^]*(?:d[\"\^]*i[\"\^]*s[\"\^]*c[\"\^]*o|s[\"\^]*h[\"\^]*u[\"\^]*t[\"\^]*d)[\"\^]*n|y[\"\^]*p[\"\^]*e[\"\^]*(?:p[\"\^]*e[\"\^]*r[\"\^]*f|(?:[\s,;]|\.|/|<|>).*)|r[\"\^]*(?:a[\"\^]*c[\"\^]*e[\"\^]*r[\"\^]*t|e[\"\^]*e))|w[\"\^]*(?:i[\"\^]*n[\"\^]*(?:d[\"\^]*i[\"\^]*f[\"\^]*f|m[\"\^]*s[\"\^]*d[\"\^]*p|v[\"\^]*a[\"\^]*r|r[\"\^]*[ms])|u[\"\^]*(?:a[\"\^]*(?:u[\"\^]*c[\"\^]*l[\"\^]*t|p[\"\^]*p)|s[\"\^]*a)|s[\"\^]*c[\"\^]*(?:r[\"\^]*i[\"\^]*p[\"\^]*t|u[\"\^]*i)|e[\"\^]*v[\"\^]*t[\"\^]*u[\"\^]*t[\"\^]*i[\"\^]*l|m[\"\^]*i[\"\^]*(?:m[\"\^]*g[\"\^]*m[\"\^]*t|c)|a[\"\^]*i[\"\^]*t[\"\^]*f[\"\^]*o[\"\^]*r|h[\"\^]*o[\"\^]*a[\"\^]*m[\"\^]*i|g[\"\^]*e[\"\^]*t)|u[\"\^]*(?:s[\"\^]*(?:e[\"\^]*r[\"\^]*a[\"\^]*c[\"\^]*c[\"\^]*o[\"\^]*u[\"\^]*n[\"\^]*t[\"\^]*c[\"\^]*o[\"\^]*n[\"\^]*t[\"\^]*r[\"\^]*o[\"\^]*l[\"\^]*s[\"\^]*e[\"\^]*t[\"\^]*t[\"\^]*i[\"\^]*n[\"\^]*g[\"\^]*s|r[\"\^]*s[\"\^]*t[\"\^]*a[\"\^]*t)|n[\"\^]*(?:r[\"\^]*a[\"\^]*r|z[\"\^]*i[\"\^]*p))|q[\"\^]*(?:u[\"\^]*e[\"\^]*r[\"\^]*y[\"\^]*(?:[\s,;]|\.|/|<|>).*|p[\"\^]*r[\"\^]*o[\"\^]*c[\"\^]*e[\"\^]*s[\"\^]*s|w[\"\^]*i[\"\^]*n[\"\^]*s[\"\^]*t[\"\^]*a|g[\"\^]*r[\"\^]*e[\"\^]*p)|o[\"\^]*(?:d[\"\^]*b[\"\^]*c[\"\^]*(?:a[\"\^]*d[\"\^]*3[\"\^]*2|c[\"\^]*o[\"\^]*n[\"\^]*f)|p[\"\^]*e[\"\^]*n[\"\^]*f[\"\^]*i[\"\^]*l[\"\^]*e[\"\^]*s)|v[\"\^]*(?:o[\"\^]*l[\"\^]*(?:[\s,;]|\.|/|<|>).*|e[\"\^]*r[\"\^]*i[\"\^]*f[\"\^]*y)|x[\"\^]*c[\"\^]*(?:a[\"\^]*c[\"\^]*l[\"\^]*s|o[\"\^]*p[\"\^]*y)|z[\"\^]*i[\"\^]*p[\"\^]*(?:[\s,;]|\.|/|<|>).*)(?:\.[\"\^]*\w+)?\b" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 932120) Executing operator "PmFromFile" with param "windows-powershell-commands.data" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] T (1) t:cmdLine: "d"
[9] T (2) t:lowercase: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:urlDecodeUni: "b"
[9] T (1) t:cmdLine: "b"
[9] T (2) t:lowercase: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 932130) Executing operator "Rx" with param "(?:\$(?:\((?:\(.*\)|.*)\)|\{.*\})|[<>]\(.*\))" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] T (1) t:cmdLine: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:urlDecodeUni: "b"
[9] T (1) t:cmdLine: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 932140) Executing operator "Rx" with param "\b(?:if(?:/i)?(?: not)?(?: exist\b| defined\b| errorlevel\b| cmdextversion\b|(?: |\().*(?:\bgeq\b|\bequ\b|\bneq\b|\bleq\b|\bgtr\b|\blss\b|==))|for(/[dflr].*)* %+[^ ]+ in\(.*\)\s?do)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] T (1) t:cmdLine: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:urlDecodeUni: "b"
[9] T (1) t:cmdLine: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 932150) Executing operator "Rx" with param "(?:^|=)\s*(?:{|\s*\(\s*|\w+=(?:[^\s]*|\$.*|\$.*|<.*|>.*|\'.*\'|\".*\")\s+|!\s*|\$)*\s*(?:'|\")*(?:[\?\*\[\]\(\)\-\|+\w'\"\./\\\\]+/)?[\\\\'\"]*(?:l[\\\\'\"]*(?:s(?:[\\\\'\"]*(?:b[\\\\'\"]*_[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*l[\\\\'\"]*e[\\\\'\"]*a[\\\\'\"]*s[\\\\'\"]*e|c[\\\\'\"]*p[\\\\'\"]*u|m[\\\\'\"]*o[\\\\'\"]*d|p[\\\\'\"]*c[\\\\'\"]*i|u[\\\\'\"]*s[\\\\'\"]*b|-[\\\\'\"]*F|o[\\\\'\"]*f))?|z[\\\\'\"]*(?:(?:[ef][\\\\'\"]*)?g[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*p|c[\\\\'\"]*(?:a[\\\\'\"]*t|m[\\\\'\"]*p)|m[\\\\'\"]*(?:o[\\\\'\"]*r[\\\\'\"]*e|a)|d[\\\\'\"]*i[\\\\'\"]*f[\\\\'\"]*f|l[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*s)|e[\\\\'\"]*s[\\\\'\"]*s[\\\\'\"]*(?:(?:f[\\\\'\"]*i[\\\\'\"]*l|p[\\\\'\"]*i[\\\\'\"]*p)[\\\\'\"]*e|e[\\\\'\"]*c[\\\\'\"]*h[\\\\'\"]*o)|a[\\\\'\"]*s[\\\\'\"]*t[\\\\'\"]*(?:l[\\\\'\"]*o[\\\\'\"]*g(?:[\\\\'\"]*i[\\\\'\"]*n)?|c[\\\\'\"]*o[\\\\'\"]*m[\\\\'\"]*m)|w[\\\\'\"]*p(?:[\\\\'\"]*-[\\\\'\"]*d[\\\\'\"]*o[\\\\'\"]*w[\\\\'\"]*n[\\\\'\"]*l[\\\\'\"]*o[\\\\'\"]*a[\\\\'\"]*d)?|f[\\\\'\"]*t[\\\\'\"]*p(?:[\\\\'\"]*g[\\\\'\"]*e[\\\\'\"]*t)?|y[\\\\'\"]*n[\\\\'\"]*x)|s[\\\\'\"]*(?:e[\\\\'\"]*(?:t[\\\\'\"]*(?:e[\\\\'\"]*n[\\\\'\"]*v|s[\\\\'\"]*i[\\\\'\"]*d)|n[\\\\'\"]*d[\\\\'\"]*m[\\\\'\"]*a[\\\\'\"]*i[\\\\'\"]*l|d)|h(?:[\\\\'\"]*\.[\\\\'\"]*d[\\\\'\"]*i[\\\\'\"]*s[\\\\'\"]*t[\\\\'\"]*r[\\\\'\"]*i[\\\\'\"]*b)?|o[\\\\'\"]*(?:u[\\\\'\"]*r[\\\\'\"]*c[\\\\'\"]*e|c[\\\\'\"]*a[\\\\'\"]*t)|t[\\\\'\"]*r[\\\\'\"]*i[\\\\'\"]*n[\\\\'\"]*g[\\\\'\"]*s|y[\\\\'\"]*s[\\\\'\"]*c[\\\\'\"]*t[\\\\'\"]*l|c[\\\\'\"]*(?:h[\\\\'\"]*e[\\\\'\"]*d|p)|d[\\\\'\"]*i[\\\\'\"]*f[\\\\'\"]*f|f[\\\\'\"]*t[\\\\'\"]*p|u[\\\\'\"]*d[\\\\'\"]*o|s[\\\\'\"]*h|v[\\\\'\"]*n)|p[\\\\'\"]*(?:t[\\\\'\"]*a[\\\\'\"]*r(?:[\\\\'\"]*(?:d[\\\\'\"]*i[\\\\'\"]*f[\\\\'\"]*f|g[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*p))?|y[\\\\'\"]*t[\\\\'\"]*h[\\\\'\"]*o[\\\\'\"]*n(?:[\\\\'\"]*(?:3(?:[\\\\'\"]*m)?|2))?|k[\\\\'\"]*(?:e[\\\\'\"]*x[\\\\'\"]*e[\\\\'\"]*c|i[\\\\'\"]*l[\\\\'\"]*l)|r[\\\\'\"]*i[\\\\'\"]*n[\\\\'\"]*t[\\\\'\"]*e[\\\\'\"]*n[\\\\'\"]*v|(?:g[\\\\'\"]*r[\\\\'\"]*e|f[\\\\'\"]*t)[\\\\'\"]*p|e[\\\\'\"]*r[\\\\'\"]*l(?:[\\\\'\"]*5)?|h[\\\\'\"]*p(?:[\\\\'\"]*[57])?|i[\\\\'\"]*n[\\\\'\"]*g)|n[\\\\'\"]*(?:c(?:[\\\\'\"]*(?:\.[\\\\'\"]*(?:t[\\\\'\"]*r[\\\\'\"]*a[\\\\'\"]*d[\\\\'\"]*i[\\\\'\"]*t[\\\\'\"]*i[\\\\'\"]*o[\\\\'\"]*n[\\\\'\"]*a[\\\\'\"]*l|o[\\\\'\"]*p[\\\\'\"]*e[\\\\'\"]*n[\\\\'\"]*b[\\\\'\"]*s[\\\\'\"]*d)|a[\\\\'\"]*t))?|e[\\\\'\"]*t[\\\\'\"]*(?:k[\\\\'\"]*i[\\\\'\"]*t[\\\\'\"]*-[\\\\'\"]*f[\\\\'\"]*t[\\\\'\"]*p|(?:s[\\\\'\"]*t|c)[\\\\'\"]*a[\\\\'\"]*t)|o[\\\\'\"]*h[\\\\'\"]*u[\\\\'\"]*p|p[\\\\'\"]*i[\\\\'\"]*n[\\\\'\"]*g|s[\\\\'\"]*t[\\\\'\"]*a[\\\\'\"]*t)|t[\\\\'\"]*(?:c[\\\\'\"]*(?:p[\\\\'\"]*(?:t[\\\\'\"]*r[\\\\'\"]*a[\\\\'\"]*c[\\\\'\"]*e[\\\\'\"]*r[\\\\'\"]*o[\\\\'\"]*u[\\\\'\"]*t[\\\\'\"]*e|i[\\\\'\"]*n[\\\\'\"]*g)|s[\\\\'\"]*h)|r[\\\\'\"]*a[\\\\'\"]*c[\\\\'\"]*e[\\\\'\"]*r[\\\\'\"]*o[\\\\'\"]*u[\\\\'\"]*t[\\\\'\"]*e(?:[\\\\'\"]*6)?|i[\\\\'\"]*m[\\\\'\"]*e(?:[\\\\'\"]*o[\\\\'\"]*u[\\\\'\"]*t)?|a[\\\\'\"]*(?:i[\\\\'\"]*l(?:[\\\\'\"]*f)?|r)|e[\\\\'\"]*l[\\\\'\"]*n[\\\\'\"]*e[\\\\'\"]*t)|r[\\\\'\"]*(?:e[\\\\'\"]*(?:p[\\\\'\"]*(?:l[\\\\'\"]*a[\\\\'\"]*c[\\\\'\"]*e|e[\\\\'\"]*a[\\\\'\"]*t)|a[\\\\'\"]*l[\\\\'\"]*p[\\\\'\"]*a[\\\\'\"]*t[\\\\'\"]*h|n[\\\\'\"]*a[\\\\'\"]*m[\\\\'\"]*e)|u[\\\\'\"]*b[\\\\'\"]*y(?:[\\\\'\"]*(?:1(?:[\\\\'\"]*[89])?|2[\\\\'\"]*[012]))?|m[\\\\'\"]*(?:u[\\\\'\"]*s[\\\\'\"]*e|d[\\\\'\"]*i)[\\\\'\"]*r|n[\\\\'\"]*a[\\\\'\"]*n[\\\\'\"]*o|s[\\\\'\"]*y[\\\\'\"]*n[\\\\'\"]*c|c[\\\\'\"]*p)|b[\\\\'\"]*(?:z[\\\\'\"]*(?:(?:[ef][\\\\'\"]*)?g[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*p|d[\\\\'\"]*i[\\\\'\"]*f[\\\\'\"]*f|l[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*s|m[\\\\'\"]*o[\\\\'\"]*r[\\\\'\"]*e|c[\\\\'\"]*a[\\\\'\"]*t)|s[\\\\'\"]*d[\\\\'\"]*(?:c[\\\\'\"]*a[\\\\'\"]*t|i[\\\\'\"]*f[\\\\'\"]*f|t[\\\\'\"]*a[\\\\'\"]*r)|u[\\\\'\"]*i[\\\\'\"]*l[\\\\'\"]*t[\\\\'\"]*i[\\\\'\"]*n|a[\\\\'\"]*s[\\\\'\"]*h)|m[\\\\'\"]*(?:y[\\\\'\"]*s[\\\\'\"]*q[\\\\'\"]*l[\\\\'\"]*(?:d[\\\\'\"]*u[\\\\'\"]*m[\\\\'\"]*p(?:[\\\\'\"]*s[\\\\'\"]*l[\\\\'\"]*o[\\\\'\"]*w)?|h[\\\\'\"]*o[\\\\'\"]*t[\\\\'\"]*c[\\\\'\"]*o[\\\\'\"]*p[\\\\'\"]*y|a[\\\\'\"]*d[\\\\'\"]*m[\\\\'\"]*i[\\\\'\"]*n|s[\\\\'\"]*h[\\\\'\"]*o[\\\\'\"]*w)|l[\\\\'\"]*o[\\\\'\"]*c[\\\\'\"]*a[\\\\'\"]*t[\\\\'\"]*e|a[\\\\'\"]*i[\\\\'\"]*l[\\\\'\"]*q)|u[\\\\'\"]*(?:n[\\\\'\"]*(?:c[\\\\'\"]*o[\\\\'\"]*m[\\\\'\"]*p[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*s|l[\\\\'\"]*z[\\\\'\"]*m[\\\\'\"]*a|a[\\\\'\"]*m[\\\\'\"]*e|r[\\\\'\"]*a[\\\\'\"]*r|s[\\\\'\"]*e[\\\\'\"]*t|z[\\\\'\"]*i[\\\\'\"]*p|x[\\\\'\"]*z)|s[\\\\'\"]*e[\\\\'\"]*r[\\\\'\"]*(?:(?:a[\\\\'\"]*d|m[\\\\'\"]*o)[\\\\'\"]*d|d[\\\\'\"]*e[\\\\'\"]*l))|x[\\\\'\"]*(?:z(?:[\\\\'\"]*(?:(?:[ef][\\\\'\"]*)?g[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*p|d[\\\\'\"]*(?:i[\\\\'\"]*f[\\\\'\"]*f|e[\\\\'\"]*c)|c[\\\\'\"]*(?:a[\\\\'\"]*t|m[\\\\'\"]*p)|l[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*s|m[\\\\'\"]*o[\\\\'\"]*r[\\\\'\"]*e))?|a[\\\\'\"]*r[\\\\'\"]*g[\\\\'\"]*s)|z[\\\\'\"]*(?:(?:(?:[ef][\\\\'\"]*)?g[\\\\'\"]*r[\\\\'\"]*e|i)[\\\\'\"]*p|c[\\\\'\"]*(?:a[\\\\'\"]*t|m[\\\\'\"]*p)|d[\\\\'\"]*i[\\\\'\"]*f[\\\\'\"]*f|l[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*s|m[\\\\'\"]*o[\\\\'\"]*r[\\\\'\"]*e|r[\\\\'\"]*u[\\\\'\"]*n|s[\\\\'\"]*h)|f[\\\\'\"]*(?:t[\\\\'\"]*p[\\\\'\"]*(?:s[\\\\'\"]*t[\\\\'\"]*a[\\\\'\"]*t[\\\\'\"]*s|w[\\\\'\"]*h[\\\\'\"]*o)|i[\\\\'\"]*l[\\\\'\"]*e[\\\\'\"]*t[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*t|e[\\\\'\"]*t[\\\\'\"]*c[\\\\'\"]*h|g[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*p)|c[\\\\'\"]*(?:o[\\\\'\"]*(?:m[\\\\'\"]*m[\\\\'\"]*a[\\\\'\"]*n[\\\\'\"]*d|p[\\\\'\"]*r[\\\\'\"]*o[\\\\'\"]*c)|u[\\\\'\"]*r[\\\\'\"]*l|s[\\\\'\"]*h|c)|e[\\\\'\"]*(?:g[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*p|c[\\\\'\"]*h[\\\\'\"]*o|v[\\\\'\"]*a[\\\\'\"]*l|x[\\\\'\"]*e[\\\\'\"]*c|n[\\\\'\"]*v)|d[\\\\'\"]*(?:m[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*g|a[\\\\'\"]*s[\\\\'\"]*h|i[\\\\'\"]*f[\\\\'\"]*f|o[\\\\'\"]*a[\\\\'\"]*s)|g[\\\\'\"]*(?:z[\\\\'\"]*(?:c[\\\\'\"]*a[\\\\'\"]*t|i[\\\\'\"]*p)|r[\\\\'\"]*e[\\\\'\"]*p|c[\\\\'\"]*c)|w[\\\\'\"]*(?:h[\\\\'\"]*o[\\\\'\"]*a[\\\\'\"]*m[\\\\'\"]*i|g[\\\\'\"]*e[\\\\'\"]*t|3[\\\\'\"]*m)|j[\\\\'\"]*(?:o[\\\\'\"]*b[\\\\'\"]*s[\\\\'\"]*\s[\\\\'\"]*-[\\\\'\"]*x|a[\\\\'\"]*v[\\\\'\"]*a)|i[\\\\'\"]*r[\\\\'\"]*b(?:[\\\\'\"]*(?:1(?:[\\\\'\"]*[89])?|2[\\\\'\"]*[012]))?|o[\\\\'\"]*n[\\\\'\"]*i[\\\\'\"]*n[\\\\'\"]*t[\\\\'\"]*r|h[\\\\'\"]*(?:e[\\\\'\"]*a[\\\\'\"]*d|u[\\\\'\"]*p)|v[\\\\'\"]*i[\\\\'\"]*(?:g[\\\\'\"]*r|p[\\\\'\"]*w)|G[\\\\'\"]*E[\\\\'\"]*T)[\\\\'\"]*(?:\s|;|\||&|<|>)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 932160) Executing operator "PmFromFile" with param "unix-shell.data" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] T (1) t:cmdLine: "d"
[9] T (2) t:normalizePath: "d"
[9] T (3) t:lowercase: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:urlDecodeUni: "b"
[9] T (1) t:cmdLine: "b"
[9] T (2) t:normalizePath: "b"
[9] T (3) t:lowercase: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 932170) Executing operator "Rx" with param "^\(\s*\)\s+{" against REQUEST_HEADERS|REQUEST_LINE.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecode: "localhost"
[9] Target value: "localhost" (Variable: REQUEST_HEADERS:Host)
[9] T (0) t:urlDecode: "curl/7.52.1"
[9] Target value: "curl/7.52.1" (Variable: REQUEST_HEADERS:User-Agent)
[9] T (0) t:urlDecode: "*/*"
[9] Target value: "*/*" (Variable: REQUEST_HEADERS:Accept)
[9] T (0) t:urlDecode: "3"
[9] Target value: "3" (Variable: REQUEST_HEADERS:Content-Length)
[9] T (0) t:urlDecode: "application/x-www-form-urlencoded"
[9] Target value: "application/x-www-form-urlencoded" (Variable: REQUEST_HEADERS:Content-Type)
[9] T (0) t:urlDecode: "POST /modsec-full/ HTTP/1.1"
[9] Target value: "POST /modsec-full/ HTTP/1.1" (Variable: REQUEST_LINE)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 932171) Executing operator "Rx" with param "^\(\s*\)\s+{" against ARGS_NAMES|ARGS|FILES_NAMES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:urlDecode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 932014) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-932-APPLICATION-ATTACK-RCE
[9] Skipped rule id '932016' due to a SecMarker: END-REQUEST-932-APPLICATION-ATTACK-RCE
[9] Rule:
[9] Skipped rule id '932018' due to a SecMarker: END-REQUEST-932-APPLICATION-ATTACK-RCE
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-932-APPLICATION-ATTACK-RCE
[9] Rule: END-REQUEST-932-APPLICATION-ATTACK-RCE
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 933012) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 933100) Executing operator "Rx" with param "(?:<\?(?!xml\s)|<\?php|\[(?:/|\\\\)?php\])" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] T (1) t:lowercase: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:urlDecodeUni: "b"
[9] T (1) t:lowercase: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 933110) Executing operator "Rx" with param ".*\.(?:php\d*|phtml)\.*$" against FILES|REQUEST_HEADERS:X-Filename|REQUEST_HEADERS:X_Filename|REQUEST_HEADERS:X-File-Name.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 933120) Executing operator "PmFromFile" with param "php-config-directives.data" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] T (1) t:normalisePath: "d"
[9] T (2) t:lowercase: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:urlDecodeUni: "b"
[9] T (1) t:normalisePath: "b"
[9] T (2) t:lowercase: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 933130) Executing operator "PmFromFile" with param "php-variables.data" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:normalisePath: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:lowercase: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:normalisePath: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:lowercase: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 933140) Executing operator "Rx" with param "(?i)php://(std(in|out|err)|(in|out)put|fd|memory|temp|filter)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 933150) Executing operator "PmFromFile" with param "php-function-names-933150.data" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|REQUEST_FILENAME|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:lowercase: "/modsec-full/"
[9] Target value: "/modsec-full/" (Variable: REQUEST_FILENAME)
[9] T (0) t:lowercase: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:lowercase: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 933160) Executing operator "Rx" with param "(?i)\b(?:s(?:e(?:t(?:_(?:e(?:xception|rror)_handler|magic_quotes_runtime|include_path)|defaultstub)|ssion_s(?:et_save_handler|tart))|qlite_(?:(?:(?:unbuffered|single|array)_)?query|create_(?:aggregate|function)|p?open|exec)|tr(?:eam_(?:context_create|socket_client)|ipc?slashes|rev)|implexml_load_(?:string|file)|ocket_c(?:onnect|reate)|h(?:ow_sourc|a1_fil)e|pl_autoload_register|ystem)|p(?:r(?:eg_(?:replace(?:_callback(?:_array)?)?|match(?:_all)?|split)|oc_(?:(?:terminat|clos|nic)e|get_status|open)|int_r)|o(?:six_(?:get(?:(?:e[gu]|g)id|login|pwnam)|mk(?:fifo|nod)|ttyname|kill)|pen)|hp(?:_(?:strip_whitespac|unam)e|version|info)|g_(?:(?:execut|prepar)e|connect|query)|a(?:rse_(?:ini_file|str)|ssthru)|utenv)|r(?:unkit_(?:function_(?:re(?:defin|nam)e|copy|add)|method_(?:re(?:defin|nam)e|copy|add)|constant_(?:redefine|add))|e(?:(?:gister_(?:shutdown|tick)|name)_function|ad(?:(?:gz)?file|_exif_data|dir))|awurl(?:de|en)code)|i(?:mage(?:createfrom(?:(?:jpe|pn)g|x[bp]m|wbmp|gif)|(?:jpe|pn)g|g(?:d2?|if)|2?wbmp|xbm)|s_(?:(?:(?:execut|write?|read)ab|fi)le|dir)|ni_(?:get(?:_all)?|set)|terator_apply|ptcembed)|g(?:et(?:_(?:c(?:urrent_use|fg_va)r|meta_tags)|my(?:[gpu]id|inode)|(?:lastmo|cw)d|imagesize|env)|z(?:(?:(?:defla|wri)t|encod|fil)e|compress|open|read)|lob)|a(?:rray_(?:u(?:intersect(?:_u?assoc)?|diff(?:_u?assoc)?)|intersect_u(?:assoc|key)|diff_u(?:assoc|key)|filter|reduce|map)|ssert(?:_options)?)|h(?:tml(?:specialchars(?:_decode)?|_entity_decode|entities)|(?:ash(?:_(?:update|hmac))?|ighlight)_file|e(?:ader_register_callback|x2bin))|f(?:i(?:le(?:(?:[acm]tim|inod)e|(?:_exist|perm)s|group)?|nfo_open)|tp_(?:nb_(?:ge|pu)|connec|ge|pu)t|(?:unction_exis|pu)ts|write|open)|o(?:b_(?:get_(?:c(?:ontents|lean)|flush)|end_(?:clean|flush)|clean|flush|start)|dbc_(?:result(?:_all)?|exec(?:ute)?|connect)|pendir)|m(?:b_(?:ereg(?:_(?:replace(?:_callback)?|match)|i(?:_replace)?)?|parse_str)|(?:ove_uploaded|d5)_file|ethod_exists|ysql_query|kdir)|e(?:x(?:if_(?:t(?:humbnail|agname)|imagetype|read_data)|ec)|scapeshell(?:arg|cmd)|rror_reporting|val)|c(?:url_(?:file_create|exec|init)|onvert_uuencode|reate_function|hr)|u(?:n(?:serialize|pack)|rl(?:de|en)code|[ak]?sort)|(?:json_(?:de|en)cod|debug_backtrac|tmpfil)e|b(?:(?:son_(?:de|en)|ase64_en)code|zopen)|var_dump)(?:\s|/\*.*\*/|//.*|#.*)*\(.*\)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|REQUEST_FILENAME|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "/modsec-full/" (Variable: REQUEST_FILENAME)
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 933170) Executing operator "Rx" with param "[oOcC]:\d+:\".+?\":\d+:{.*}" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|REQUEST_HEADERS|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "localhost" (Variable: REQUEST_HEADERS:Host)
[9] Target value: "curl/7.52.1" (Variable: REQUEST_HEADERS:User-Agent)
[9] Target value: "*/*" (Variable: REQUEST_HEADERS:Accept)
[9] Target value: "3" (Variable: REQUEST_HEADERS:Content-Length)
[9] Target value: "application/x-www-form-urlencoded" (Variable: REQUEST_HEADERS:Content-Type)
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 933180) Executing operator "Rx" with param "\$+(?:[a-zA-Z_\x7f-\xff][a-zA-Z0-9_\x7f-\xff]*|\s*{.+})(?:\s|\[.+\]|{.+}|/\*.*\*/|//.*|#.*)*\(.*\)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|REQUEST_FILENAME|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "/modsec-full/" (Variable: REQUEST_FILENAME)
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 933014) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-933-APPLICATION-ATTACK-PHP
[9] Skipped rule id '933151' due to a SecMarker: END-REQUEST-933-APPLICATION-ATTACK-PHP
[9] Rule:
[9] Skipped rule id '933016' due to a SecMarker: END-REQUEST-933-APPLICATION-ATTACK-PHP
[9] Rule:
[9] Skipped rule id '933131' due to a SecMarker: END-REQUEST-933-APPLICATION-ATTACK-PHP
[9] Rule:
[9] Skipped rule id '933161' due to a SecMarker: END-REQUEST-933-APPLICATION-ATTACK-PHP
[9] Rule:
[9] Skipped rule id '933111' due to a SecMarker: END-REQUEST-933-APPLICATION-ATTACK-PHP
[9] Rule:
[9] Skipped rule id '933018' due to a SecMarker: END-REQUEST-933-APPLICATION-ATTACK-PHP
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-933-APPLICATION-ATTACK-PHP
[9] Rule: END-REQUEST-933-APPLICATION-ATTACK-PHP
[4] Out of a SecMarker after skip 7.000000 rules.
[4] (Rule: 941012) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941100) Executing operator "DetectXSS" with param "" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|REQUEST_HEADERS:User-Agent|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "curl/7.52.1"
[9] T (1) t:urlDecodeUni: "curl/7.52.1"
[9] T (2) t:htmlEntityDecode: "curl/7.52.1"
[9] T (3) t:jsDecode: "curl/7.52.1"
[9] T (4) t:cssDecode: "curl/7.52.1"
[9] T (5) t:removeNulls: "curl/7.52.1"
[9] Target value: "curl/7.52.1" (Variable: REQUEST_HEADERS:User-Agent)
[9] libinjection was not able to find any XSS in: curl/7.52.1
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:htmlEntityDecode: "d"
[9] T (3) t:jsDecode: "d"
[9] T (4) t:cssDecode: "d"
[9] T (5) t:removeNulls: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] libinjection was not able to find any XSS in: d
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:htmlEntityDecode: "b"
[9] T (3) t:jsDecode: "b"
[9] T (4) t:cssDecode: "b"
[9] T (5) t:removeNulls: "b"
[9] Target value: "b" (Variable: ARGS:d)
[9] libinjection was not able to find any XSS in: b
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941110) Executing operator "Rx" with param "(?i)([<Ôºú]script[^>Ôºû]*[>Ôºû][\s\S]*?)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|REQUEST_HEADERS:User-Agent|REQUEST_HEADERS:Referer|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "curl/7.52.1"
[9] T (1) t:urlDecodeUni: "curl/7.52.1"
[9] T (2) t:htmlEntityDecode: "curl/7.52.1"
[9] T (3) t:jsDecode: "curl/7.52.1"
[9] T (4) t:cssDecode: "curl/7.52.1"
[9] T (5) t:removeNulls: "curl/7.52.1"
[9] Target value: "curl/7.52.1" (Variable: REQUEST_HEADERS:User-Agent)
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:htmlEntityDecode: "d"
[9] T (3) t:jsDecode: "d"
[9] T (4) t:cssDecode: "d"
[9] T (5) t:removeNulls: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:htmlEntityDecode: "b"
[9] T (3) t:jsDecode: "b"
[9] T (4) t:cssDecode: "b"
[9] T (5) t:removeNulls: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941120) Executing operator "Rx" with param "(?i)([\s\"'`;\/0-9\=\x0B\x09\x0C\x3B\x2C\x28\x3B]+on[a-zA-Z]+[\s\x0B\x09\x0C\x3B\x2C\x28\x3B]*?=)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|REQUEST_HEADERS:User-Agent|REQUEST_HEADERS:Referer|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "curl/7.52.1"
[9] T (1) t:urlDecodeUni: "curl/7.52.1"
[9] T (2) t:htmlEntityDecode: "curl/7.52.1"
[9] T (3) t:jsDecode: "curl/7.52.1"
[9] T (4) t:cssDecode: "curl/7.52.1"
[9] T (5) t:removeNulls: "curl/7.52.1"
[9] Target value: "curl/7.52.1" (Variable: REQUEST_HEADERS:User-Agent)
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:htmlEntityDecode: "d"
[9] T (3) t:jsDecode: "d"
[9] T (4) t:cssDecode: "d"
[9] T (5) t:removeNulls: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:htmlEntityDecode: "b"
[9] T (3) t:jsDecode: "b"
[9] T (4) t:cssDecode: "b"
[9] T (5) t:removeNulls: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941130) Executing operator "Rx" with param "(?i)[\s\S](?:x(?:link:href|html|mlns)|!ENTITY.*?SYSTEM|data:text\/html|pattern(?=.*?=)|formaction|\@import|base64)\b" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|REQUEST_HEADERS:User-Agent|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "curl/7.52.1"
[9] T (1) t:urlDecodeUni: "curl/7.52.1"
[9] T (2) t:htmlEntityDecode: "curl/7.52.1"
[9] T (3) t:jsDecode: "curl/7.52.1"
[9] T (4) t:cssDecode: "curl/7.52.1"
[9] T (5) t:removeNulls: "curl/7.52.1"
[9] Target value: "curl/7.52.1" (Variable: REQUEST_HEADERS:User-Agent)
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:htmlEntityDecode: "d"
[9] T (3) t:jsDecode: "d"
[9] T (4) t:cssDecode: "d"
[9] T (5) t:removeNulls: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:htmlEntityDecode: "b"
[9] T (3) t:jsDecode: "b"
[9] T (4) t:cssDecode: "b"
[9] T (5) t:removeNulls: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941140) Executing operator "Rx" with param "(?i)(?:<(?:(?:apple|objec)t|isindex|embed|style|form|meta)\b[^>]*?>[\s\S]*?|(?:=|U\s*?R\s*?L\s*?\()\s*?[^>]*?\s*?S\s*?C\s*?R\s*?I\s*?P\s*?T\s*?:)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|REQUEST_HEADERS:User-Agent|REQUEST_HEADERS:Referer|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "curl/7.52.1"
[9] T (1) t:urlDecodeUni: "curl/7.52.1"
[9] T (2) t:htmlEntityDecode: "curl/7.52.1"
[9] T (3) t:jsDecode: "curl/7.52.1"
[9] T (4) t:cssDecode: "curl/7.52.1"
[9] T (5) t:removeNulls: "curl/7.52.1"
[9] Target value: "curl/7.52.1" (Variable: REQUEST_HEADERS:User-Agent)
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:htmlEntityDecode: "d"
[9] T (3) t:jsDecode: "d"
[9] T (4) t:cssDecode: "d"
[9] T (5) t:removeNulls: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:htmlEntityDecode: "b"
[9] T (3) t:jsDecode: "b"
[9] T (4) t:cssDecode: "b"
[9] T (5) t:removeNulls: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941160) Executing operator "Rx" with param "(?i)<[^\w<>]*(?:[^<>\"'\s]*:)?[^\w<>]*(?:\W*?s\W*?c\W*?r\W*?i\W*?p\W*?t|\W*?f\W*?o\W*?r\W*?m|\W*?s\W*?t\W*?y\W*?l\W*?e|\W*?s\W*?v\W*?g|\W*?m\W*?a\W*?r\W*?q\W*?u\W*?e\W*?e|(?:\W*?l\W*?i\W*?n\W*?k|\W*?o\W*?b\W*?j\W*?e\W*?c\W*?t|\W*?e\W*?m\W*?b\W*?e\W*?d|\W*?a\W*?p\W*?p\W*?l\W*?e\W*?t|\W*?p\W*?a\W*?r\W*?a\W*?m|\W*?i?\W*?f\W*?r\W*?a\W*?m\W*?e|\W*?b\W*?a\W*?s\W*?e|\W*?b\W*?o\W*?d\W*?y|\W*?m\W*?e\W*?t\W*?a|\W*?i\W*?m\W*?a?\W*?g\W*?e?|\W*?v\W*?i\W*?d\W*?e\W*?o|\W*?a\W*?u\W*?d\W*?i\W*?o|\W*?b\W*?i\W*?n\W*?d\W*?i\W*?n\W*?g\W*?s|\W*?s\W*?e\W*?t|\W*?a\W*?n\W*?i\W*?m\W*?a\W*?t\W*?e)[^>\w])|(?:<\w[\s\S]*[\s\/]|['\"](?:[\s\S]*[\s\/])?)(?:formaction|style|background|src|lowsrc|ping|on(?:d(?:e(?:vice(?:(?:orienta|mo)tion|proximity|found|light)|livery(?:success|error)|activate)|r(?:ag(?:e(?:n(?:ter|d)|xit)|(?:gestur|leav)e|start|drop|over)?|op)|i(?:s(?:c(?:hargingtimechange|onnect(?:ing|ed))|abled)|aling)|ata(?:setc(?:omplete|hanged)|(?:availabl|chang)e|error)|urationchange|ownloading|blclick)|Moz(?:M(?:agnifyGesture(?:Update|Start)?|ouse(?:PixelScroll|Hittest))|S(?:wipeGesture(?:Update|Start|End)?|crolledAreaChanged)|(?:(?:Press)?TapGestur|BeforeResiz)e|EdgeUI(?:C(?:omplet|ancel)|Start)ed|RotateGesture(?:Update|Start)?|A(?:udioAvailable|fterPaint))|c(?:o(?:m(?:p(?:osition(?:update|start|end)|lete)|mand(?:update)?)|n(?:t(?:rolselect|extmenu)|nect(?:ing|ed))|py)|a(?:(?:llschang|ch)ed|nplay(?:through)?|rdstatechange)|h(?:(?:arging(?:time)?ch)?ange|ecking)|(?:fstate|ell)change|u(?:echange|t)|l(?:ick|ose))|m(?:o(?:z(?:pointerlock(?:change|error)|(?:orientation|time)change|fullscreen(?:change|error)|network(?:down|up)load)|use(?:(?:lea|mo)ve|o(?:ver|ut)|enter|wheel|down|up)|ve(?:start|end)?)|essage|ark)|s(?:t(?:a(?:t(?:uschanged|echange)|lled|rt)|k(?:sessione|comma)nd|op)|e(?:ek(?:complete|ing|ed)|(?:lec(?:tstar)?)?t|n(?:ding|t))|u(?:ccess|spend|bmit)|peech(?:start|end)|ound(?:start|end)|croll|how)|b(?:e(?:for(?:e(?:(?:scriptexecu|activa)te|u(?:nload|pdate)|p(?:aste|rint)|c(?:opy|ut)|editfocus)|deactivate)|gin(?:Event)?)|oun(?:dary|ce)|l(?:ocked|ur)|roadcast|usy)|a(?:n(?:imation(?:iteration|start|end)|tennastatechange)|fter(?:(?:scriptexecu|upda)te|print)|udio(?:process|start|end)|d(?:apteradded|dtrack)|ctivate|lerting|bort)|DOM(?:Node(?:Inserted(?:IntoDocument)?|Removed(?:FromDocument)?)|(?:CharacterData|Subtree)Modified|A(?:ttrModified|ctivate)|Focus(?:Out|In)|MouseScroll)|r(?:e(?:s(?:u(?:m(?:ing|e)|lt)|ize|et)|adystatechange|pea(?:tEven)?t|movetrack|trieving|ceived)|ow(?:s(?:inserted|delete)|e(?:nter|xit))|atechange)|p(?:op(?:up(?:hid(?:den|ing)|show(?:ing|n))|state)|a(?:ge(?:hide|show)|(?:st|us)e|int)|ro(?:pertychange|gress)|lay(?:ing)?)|t(?:ouch(?:(?:lea|mo)ve|en(?:ter|d)|cancel|start)|ime(?:update|out)|ransitionend|ext)|u(?:s(?:erproximity|sdreceived)|p(?:gradeneeded|dateready)|n(?:derflow|load))|f(?:o(?:rm(?:change|input)|cus(?:out|in)?)|i(?:lterchange|nish)|ailed)|l(?:o(?:ad(?:e(?:d(?:meta)?data|nd)|start)?|secapture)|evelchange|y)|g(?:amepad(?:(?:dis)?connected|button(?:down|up)|axismove)|et)|e(?:n(?:d(?:Event|ed)?|abled|ter)|rror(?:update)?|mptied|xit)|i(?:cc(?:cardlockerror|infochange)|n(?:coming|valid|put))|o(?:(?:(?:ff|n)lin|bsolet)e|verflow(?:changed)?|pen)|SVG(?:(?:Unl|L)oad|Resize|Scroll|Abort|Error|Zoom)|h(?:e(?:adphoneschange|l[dp])|ashchange|olding)|v(?:o(?:lum|ic)e|ersion)change|w(?:a(?:it|rn)ing|heel)|key(?:press|down|up)|(?:AppComman|Loa)d|no(?:update|match)|Request|zoom))[\s\x08]*?=" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|REQUEST_HEADERS:User-Agent|REQUEST_HEADERS:Referer|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "curl/7.52.1"
[9] T (1) t:urlDecodeUni: "curl/7.52.1"
[9] T (2) t:htmlEntityDecode: "curl/7.52.1"
[9] T (3) t:jsDecode: "curl/7.52.1"
[9] T (4) t:cssDecode: "curl/7.52.1"
[9] T (5) t:removeNulls: "curl/7.52.1"
[9] Target value: "curl/7.52.1" (Variable: REQUEST_HEADERS:User-Agent)
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:htmlEntityDecode: "d"
[9] T (3) t:jsDecode: "d"
[9] T (4) t:cssDecode: "d"
[9] T (5) t:removeNulls: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:htmlEntityDecode: "b"
[9] T (3) t:jsDecode: "b"
[9] T (4) t:cssDecode: "b"
[9] T (5) t:removeNulls: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941170) Executing operator "Rx" with param "(?i)(?:\W|^)(?:javascript:(?:[\s\S]+[=\\\(\[\.<]|[\s\S]*?(?:\bname\b|\\[ux]\d))|data:(?:(?:[a-z]\w+\/\w[\w+-]+\w)?[;,]|[\s\S]*?;[\s\S]*?\b(?:base64|charset=)|[\s\S]*?,[\s\S]*?<[\s\S]*?\w[\s\S]*?>))|@\W*?i\W*?m\W*?p\W*?o\W*?r\W*?t\W*?(?:\/\*[\s\S]*?)?(?:[\"']|\W*?u\W*?r\W*?l[\s\S]*?\()|\W*?-\W*?m\W*?o\W*?z\W*?-\W*?b\W*?i\W*?n\W*?d\W*?i\W*?n\W*?g[\s\S]*?:[\s\S]*?\W*?u\W*?r\W*?l[\s\S]*?\(" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|REQUEST_HEADERS:User-Agent|REQUEST_HEADERS:Referer|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "curl/7.52.1"
[9] T (1) t:urlDecodeUni: "curl/7.52.1"
[9] T (2) t:htmlEntityDecode: "curl/7.52.1"
[9] T (3) t:jsDecode: "curl/7.52.1"
[9] T (4) t:cssDecode: "curl/7.52.1"
[9] T (5) t:removeNulls: "curl/7.52.1"
[9] Target value: "curl/7.52.1" (Variable: REQUEST_HEADERS:User-Agent)
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:htmlEntityDecode: "d"
[9] T (3) t:jsDecode: "d"
[9] T (4) t:cssDecode: "d"
[9] T (5) t:removeNulls: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:htmlEntityDecode: "b"
[9] T (3) t:jsDecode: "b"
[9] T (4) t:cssDecode: "b"
[9] T (5) t:removeNulls: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941180) Executing operator "Pm" with param "document.cookie document.write .parentnode .innerhtml window.location -moz-binding <!-- --> <![cdata[" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:htmlEntityDecode: "d"
[9] T (3) t:jsDecode: "d"
[9] T (4) t:cssDecode: "d"
[9] T (5) t:lowercase: "d"
[9] T (6) t:removeNulls: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:htmlEntityDecode: "b"
[9] T (3) t:jsDecode: "b"
[9] T (4) t:cssDecode: "b"
[9] T (5) t:lowercase: "b"
[9] T (6) t:removeNulls: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941190) Executing operator "Rx" with param "(?i:<style.*?>.*?((@[i\\\\])|(([:=]|(&#x?0*((58)|(3A)|(61)|(3D));?)).*?([(\\\\]|(&#x?0*((40)|(28)|(92)|(5C));?)))))" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:htmlEntityDecode: "d"
[9] T (3) t:jsDecode: "d"
[9] T (4) t:cssDecode: "d"
[9] T (5) t:removeNulls: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:htmlEntityDecode: "b"
[9] T (3) t:jsDecode: "b"
[9] T (4) t:cssDecode: "b"
[9] T (5) t:removeNulls: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941200) Executing operator "Rx" with param "(?i:<.*[:]?vmlframe.*?[\s/+]*?src[\s/+]*=)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:htmlEntityDecode: "d"
[9] T (3) t:jsDecode: "d"
[9] T (4) t:cssDecode: "d"
[9] T (5) t:removeNulls: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:htmlEntityDecode: "b"
[9] T (3) t:jsDecode: "b"
[9] T (4) t:cssDecode: "b"
[9] T (5) t:removeNulls: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941210) Executing operator "Rx" with param "(?i:(j|(&#x?0*((74)|(4A)|(106)|(6A));?))([\t]|(&((#x?0*(9|(13)|(10)|A|D);?)|(tab;)|(newline;))))*(a|(&#x?0*((65)|(41)|(97)|(61));?))([\t]|(&((#x?0*(9|(13)|(10)|A|D);?)|(tab;)|(newline;))))*(v|(&#x?0*((86)|(56)|(118)|(76));?))([\t]|(&((#x?0*(9|(13)|(10)|A|D);?)|(tab;)|(newline;))))*(a|(&#x?0*((65)|(41)|(97)|(61));?))([\t]|(&((#x?0*(9|(13)|(10)|A|D);?)|(tab;)|(newline;))))*(s|(&#x?0*((83)|(53)|(115)|(73));?))([\t]|(&((#x?0*(9|(13)|(10)|A|D);?)|(tab;)|(newline;))))*(c|(&#x?0*((67)|(43)|(99)|(63));?))([\t]|(&((#x?0*(9|(13)|(10)|A|D);?)|(tab;)|(newline;))))*(r|(&#x?0*((82)|(52)|(114)|(72));?))([\t]|(&((#x?0*(9|(13)|(10)|A|D);?)|(tab;)|(newline;))))*(i|(&#x?0*((73)|(49)|(105)|(69));?))([\t]|(&((#x?0*(9|(13)|(10)|A|D);?)|(tab;)|(newline;))))*(p|(&#x?0*((80)|(50)|(112)|(70));?))([\t]|(&((#x?0*(9|(13)|(10)|A|D);?)|(tab;)|(newline;))))*(t|(&#x?0*((84)|(54)|(116)|(74));?))([\t]|(&((#x?0*(9|(13)|(10)|A|D);?)|(tab;)|(newline;))))*(:|(&((#x?0*((58)|(3A));?)|(colon;)))).)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:htmlEntityDecode: "d"
[9] T (3) t:jsDecode: "d"
[9] T (4) t:cssDecode: "d"
[9] T (5) t:removeNulls: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:htmlEntityDecode: "b"
[9] T (3) t:jsDecode: "b"
[9] T (4) t:cssDecode: "b"
[9] T (5) t:removeNulls: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941220) Executing operator "Rx" with param "(?i:(v|(&#x?0*((86)|(56)|(118)|(76));?))([\t]|(&((#x?0*(9|(13)|(10)|A|D);?)|(tab;)|(newline;))))*(b|(&#x?0*((66)|(42)|(98)|(62));?))([\t]|(&((#x?0*(9|(13)|(10)|A|D);?)|(tab;)|(newline;))))*(s|(&#x?0*((83)|(53)|(115)|(73));?))([\t]|(&((#x?0*(9|(13)|(10)|A|D);?)|(tab;)|(newline;))))*(c|(&#x?0*((67)|(43)|(99)|(63));?))([\t]|(&((#x?0*(9|(13)|(10)|A|D);?)|(tab;)|(newline;))))*(r|(&#x?0*((82)|(52)|(114)|(72));?))([\t]|(&((#x?0*(9|(13)|(10)|A|D);?)|(tab;)|(newline;))))*(i|(&#x?0*((73)|(49)|(105)|(69));?))([\t]|(&((#x?0*(9|(13)|(10)|A|D);?)|(tab;)|(newline;))))*(p|(&#x?0*((80)|(50)|(112)|(70));?))([\t]|(&((#x?0*(9|(13)|(10)|A|D);?)|(tab;)|(newline;))))*(t|(&#x?0*((84)|(54)|(116)|(74));?))([\t]|(&((#x?0*(9|(13)|(10)|A|D);?)|(tab;)|(newline;))))*(:|(&((#x?0*((58)|(3A));?)|(colon;)))).)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:htmlEntityDecode: "d"
[9] T (3) t:jsDecode: "d"
[9] T (4) t:cssDecode: "d"
[9] T (5) t:removeNulls: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:htmlEntityDecode: "b"
[9] T (3) t:jsDecode: "b"
[9] T (4) t:cssDecode: "b"
[9] T (5) t:removeNulls: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941230) Executing operator "Rx" with param "(?i:<EMBED[\s/+].*?((src)|(type)).*?=)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:htmlEntityDecode: "d"
[9] T (3) t:jsDecode: "d"
[9] T (4) t:cssDecode: "d"
[9] T (5) t:removeNulls: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:htmlEntityDecode: "b"
[9] T (3) t:jsDecode: "b"
[9] T (4) t:cssDecode: "b"
[9] T (5) t:removeNulls: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941240) Executing operator "Rx" with param "<[?]?import[\s\/+\S]*?implementation[\s\/+]*?=" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:htmlEntityDecode: "d"
[9] T (3) t:jsDecode: "d"
[9] T (4) t:cssDecode: "d"
[9] T (5) t:lowercase: "d"
[9] T (6) t:removeNulls: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:htmlEntityDecode: "b"
[9] T (3) t:jsDecode: "b"
[9] T (4) t:cssDecode: "b"
[9] T (5) t:lowercase: "b"
[9] T (6) t:removeNulls: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941250) Executing operator "Rx" with param "(?i:<META[\s/+].*?http-equiv[\s/+]*=[\s/+]*[\"\'`]?(((c|(&#x?0*((67)|(43)|(99)|(63));?)))|((r|(&#x?0*((82)|(52)|(114)|(72));?)))|((s|(&#x?0*((83)|(53)|(115)|(73));?)))))" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:htmlEntityDecode: "d"
[9] T (3) t:jsDecode: "d"
[9] T (4) t:cssDecode: "d"
[9] T (5) t:removeNulls: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:htmlEntityDecode: "b"
[9] T (3) t:jsDecode: "b"
[9] T (4) t:cssDecode: "b"
[9] T (5) t:removeNulls: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941260) Executing operator "Rx" with param "(?i:<META[\s/+].*?charset[\s/+]*=)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:htmlEntityDecode: "d"
[9] T (3) t:jsDecode: "d"
[9] T (4) t:cssDecode: "d"
[9] T (5) t:removeNulls: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:htmlEntityDecode: "b"
[9] T (3) t:jsDecode: "b"
[9] T (4) t:cssDecode: "b"
[9] T (5) t:removeNulls: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941270) Executing operator "Rx" with param "(?i:<LINK[\s/+].*?href[\s/+]*=)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:htmlEntityDecode: "d"
[9] T (3) t:jsDecode: "d"
[9] T (4) t:cssDecode: "d"
[9] T (5) t:removeNulls: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:htmlEntityDecode: "b"
[9] T (3) t:jsDecode: "b"
[9] T (4) t:cssDecode: "b"
[9] T (5) t:removeNulls: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941280) Executing operator "Rx" with param "(?i:<BASE[\s/+].*?href[\s/+]*=)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:htmlEntityDecode: "d"
[9] T (3) t:jsDecode: "d"
[9] T (4) t:cssDecode: "d"
[9] T (5) t:removeNulls: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:htmlEntityDecode: "b"
[9] T (3) t:jsDecode: "b"
[9] T (4) t:cssDecode: "b"
[9] T (5) t:removeNulls: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941290) Executing operator "Rx" with param "(?i:<APPLET[\s/+>])" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:htmlEntityDecode: "d"
[9] T (3) t:jsDecode: "d"
[9] T (4) t:cssDecode: "d"
[9] T (5) t:removeNulls: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:htmlEntityDecode: "b"
[9] T (3) t:jsDecode: "b"
[9] T (4) t:cssDecode: "b"
[9] T (5) t:removeNulls: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941300) Executing operator "Rx" with param "(?i:<OBJECT[\s/+].*?((type)|(codetype)|(classid)|(code)|(data))[\s/+]*=)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:htmlEntityDecode: "d"
[9] T (3) t:jsDecode: "d"
[9] T (4) t:cssDecode: "d"
[9] T (5) t:removeNulls: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:htmlEntityDecode: "b"
[9] T (3) t:jsDecode: "b"
[9] T (4) t:cssDecode: "b"
[9] T (5) t:removeNulls: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941310) Executing operator "Rx" with param "(?:¾|¼).*(?:¾|¼|>)|(?:¾|¼|<).*(?:¾|¼)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] T (1) t:lowercase: "d"
[9] T (2) t:urlDecode: "d"
[9] T (3) t:htmlEntityDecode: "d"
[9] T (4) t:jsDecode: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:urlDecodeUni: "b"
[9] T (1) t:lowercase: "b"
[9] T (2) t:urlDecode: "b"
[9] T (3) t:htmlEntityDecode: "b"
[9] T (4) t:jsDecode: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941350) Executing operator "Rx" with param "(?:\+ADw\-|\+AD4\-).*(?:\+ADw\-|\+AD4\-|>)|(?:\+ADw\-|\+AD4\-|<).*(?:\+ADw\-|\+AD4\-)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] T (1) t:lowercase: "d"
[9] T (2) t:urlDecode: "d"
[9] T (3) t:htmlEntityDecode: "d"
[9] T (4) t:jsDecode: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:urlDecodeUni: "b"
[9] T (1) t:lowercase: "b"
[9] T (2) t:urlDecode: "b"
[9] T (3) t:htmlEntityDecode: "b"
[9] T (4) t:jsDecode: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941014) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-941-APPLICATION-ATTACK-XSS
[9] Skipped rule id '941101' due to a SecMarker: END-REQUEST-941-APPLICATION-ATTACK-XSS
[9] Rule:
[9] Skipped rule id '941150' due to a SecMarker: END-REQUEST-941-APPLICATION-ATTACK-XSS
[9] Rule:
[9] Skipped rule id '941320' due to a SecMarker: END-REQUEST-941-APPLICATION-ATTACK-XSS
[9] Rule:
[9] Skipped rule id '941330' due to a SecMarker: END-REQUEST-941-APPLICATION-ATTACK-XSS
[9] Rule:
[9] Skipped rule id '941340' due to a SecMarker: END-REQUEST-941-APPLICATION-ATTACK-XSS
[9] Rule:
[9] Skipped rule id '941016' due to a SecMarker: END-REQUEST-941-APPLICATION-ATTACK-XSS
[9] Rule:
[9] Skipped rule id '941018' due to a SecMarker: END-REQUEST-941-APPLICATION-ATTACK-XSS
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-941-APPLICATION-ATTACK-XSS
[9] Rule: END-REQUEST-941-APPLICATION-ATTACK-XSS
[4] Out of a SecMarker after skip 8.000000 rules.
[4] (Rule: 942012) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 942100) Executing operator "DetectSQLi" with param "" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|REQUEST_HEADERS:User-Agent|REQUEST_HEADERS:Referer|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "curl/7.52.1"
[9] T (1) t:urlDecodeUni: "curl/7.52.1"
[9] T (2) t:removeNulls: "curl/7.52.1"
[9] T (3) t:removeComments: "curl/7.52.1"
[9] Target value: "curl/7.52.1" (Variable: REQUEST_HEADERS:User-Agent)
[9] detected SQLi: not able to find an inject on 'curl/7.52.1'
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:removeNulls: "d"
[9] T (3) t:removeComments: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] detected SQLi: not able to find an inject on 'd'
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:removeNulls: "b"
[9] T (3) t:removeComments: "b"
[9] Target value: "b" (Variable: ARGS:d)
[9] detected SQLi: not able to find an inject on 'b'
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 942140) Executing operator "Rx" with param "(?i:\b(?:m(?:s(?:ysaccessobjects|ysaces|ysobjects|ysqueries|ysrelationships|ysaccessstorage|ysaccessxml|ysmodules|ysmodules2|db)|aster\.\.sysdatabases|ysql\.db)\b|s(?:ys(?:\.database_name|aux)\b|chema(?:\W*\(|_name\b)|qlite(_temp)?_master\b)|d(?:atabas|b_nam)e\W*\(|information_schema\b|pg_(catalog|toast)\b|northwind\b|tempdb\b))" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:urlDecodeUni: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 942160) Executing operator "Rx" with param "(?i:(sleep\((\s*?)(\d*?)(\s*?)\)|benchmark\((.*?)\,(.*?)\)))" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:urlDecodeUni: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 942170) Executing operator "Rx" with param "(?i:(?:(select|;)\s+(?:benchmark|if|sleep)\s*?\(\s*?\(?\s*?\w+))" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:urlDecodeUni: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 942190) Executing operator "Rx" with param "(?i:(?:\s*?(?:exec|execute).*?(?:\W)xp_cmdshell)|(?:[\"'`]\s*?!\s*?[\"'`\w])|(?:from\W+information_schema\W)|(?:(?:(?:current_)?user|database|schema|connection_id)\s*?\([^\)]*?)|(?:[\"'`];?\s*?(?:select|union|having)\b\s*?[^\s])|(?:\wiif\s*?\()|(?:(?:exec|execute)\s+master\.)|(?:union select @)|(?:union[\w(\s]*?select)|(?:select.*?\w?user\()|(?:into[\s+]+(?:dump|out)file\s*?[\"'`]))" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:urlDecodeUni: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 942220) Executing operator "Rx" with param "(?i:(?:^(-0000023456|4294967295|4294967296|2147483648|2147483647|0000012345|-2147483648|-2147483649|0000023456|3.0.00738585072007e-308|1e309)$))" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:urlDecodeUni: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 942230) Executing operator "Rx" with param "(?i:(?:[\s()]case\s*?\()|(?:\)\s*?like\s*?\()|(?:having\s*?[^\s]+\s*?[^\w\s])|(?:if\s?\([\d\w]\s*?[=<>~]))" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:urlDecodeUni: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 942240) Executing operator "Rx" with param "(?i:(?:alter\s*?\w+.*?(?:character|char)\s+set\s+\w+)|([\"'`];*?\s*?waitfor\s+(?:time|delay)\s+[\"'`])|(?:[\"'`];.*?:\s*?goto))" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:urlDecodeUni: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 942250) Executing operator "Rx" with param "(?i:(?:merge.*?using\s*?\()|(execute\s*?immediate\s*?[\"'`])|(?:match\s*?[\w(),+-]+\s*?against\s*?\())" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:urlDecodeUni: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 942270) Executing operator "Rx" with param "(?i:(?:(union(.*?)select(.*?)from)))" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:urlDecodeUni: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 942280) Executing operator "Rx" with param "(?i:(?:select\s*?pg_sleep)|(?:waitfor\s*?delay\s?[\"'`]+\s?\d)|(?:;\s*?shutdown\s*?(?:;|--|#|\/\*|{)))" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:urlDecodeUni: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 942290) Executing operator "Rx" with param "(?i:(?:\[\$(?:ne|eq|lte?|gte?|n?in|mod|all|size|exists|type|slice|x?or|div|like|between|and)\]))" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:urlDecodeUni: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 942320) Executing operator "Rx" with param "(?i:(?:procedure\s+analyse\s*?\()|(?:;\s*?(declare|open)\s+[\w-]+)|(?:create\s+(procedure|function)\s*?\w+\s*?\(\s*?\)\s*?-)|(?:declare[^\w]+[@#]\s*?\w+)|(exec\s*?\(\s*?@))" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:urlDecodeUni: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 942350) Executing operator "Rx" with param "(?i:(?:create\s+function\s+.+\s+returns)|(?:;\s*?(?:select|create|rename|truncate|load|alter|delete|update|insert|desc)\s*?[\[(]?\w{2,}))" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:urlDecodeUni: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 942360) Executing operator "Rx" with param "(?i:(?:[\d\W]\s+as\s*?[\"'`\w]+\s*?from)|(?:^[\W\d]+\s*?(?:union|select|create|rename|truncate|load|alter|delete|update|insert|desc)\b)|(?:(?:select|create|rename|truncate|load|alter|delete|update|insert|desc)\s+(?:(?:group_)concat|char|load_file)\s?\(?)|(?:end\s*?\);)|([\"'`]\s+regexp\W)|(?:[\s(]load_file\s*?\())" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:urlDecodeUni: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 942014) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Skipped rule id '942110' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942120' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942130' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942150' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942180' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942200' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942210' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942260' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942300' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942310' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942330' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942340' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942370' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942380' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942390' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942400' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942410' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942430' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942440' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942450' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942016' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942251' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942420' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942431' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942460' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942018' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942421' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942432' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[4] Out of a SecMarker after skip 29.000000 rules.
[4] (Rule: 943012) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 943100) Executing operator "Rx" with param "(?i)(?:\.cookie\b.*?;\W*?(?:expires|domain)\W*?=|\bhttp-equiv\W+set-cookie\b)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[9] T (0) t:urlDecodeUni: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 943110) Executing operator "Rx" with param "^(jsessionid|aspsessionid|asp.net_sessionid|phpsession|phpsessid|weblogicsession|session_id|session-id|cfid|cftoken|cfsid|jservsession|jwsession)$" against ARGS_NAMES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] T (1) t:lowercase: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 943120) Executing operator "Rx" with param "^(jsessionid|aspsessionid|asp.net_sessionid|phpsession|phpsessid|weblogicsession|session_id|session-id|cfid|cftoken|cfsid|jservsession|jwsession)$" against ARGS_NAMES.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] T (1) t:lowercase: "d"
[9] Target value: "d" (Variable: ARGS_NAMES:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 943014) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION
[9] Skipped rule id '943016' due to a SecMarker: END-REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION
[9] Rule:
[9] Skipped rule id '943018' due to a SecMarker: END-REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION
[9] Rule: END-REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 949100) Executing operator "Eq" with param "1" against IP.
[6] Resolving: ip.reput_block_reason to: NULL
[4] Rule returned 0.
[9] Matched vars cleaned.
[6] Resolving: tx.inbound_anomaly_score_threshold to: 5
[4] (Rule: 949110) Executing operator "Ge" with param "5" Was: "%{tx.inbound_anomaly_score_threshold}" against TX:ANOMALY_SCORE.
[6] Resolving: TX.ANOMALY_SCORE to: 5
[9] Target value: "5" (Variable: TX:ANOMALY_SCORE)
[6] Resolving: tx.inbound_anomaly_score_threshold to: 5
[9] Matched vars updated.
[4] Running [independent] (non-disruptive) action: msg
[6] Resolving: TX.ANOMALY_SCORE to: 5
[9] Saving msg: Inbound Anomaly Score Exceeded (Total Score: 5)
[4] Running [independent] (non-disruptive) action: log
[9] Saving transaction to logs
[4] Running [independent] (non-disruptive) action: setvar
[6] Resolving: tx.msg to: Request content type is not allowed by policy
[8] Saving variable: TX:inbound_tx_msg with value: Request content type is not allowed by policy
[4] Running [independent] (non-disruptive) action: setvar
[6] Resolving: tx.anomaly_score to: 5
[8] Saving variable: TX:inbound_anomaly_score with value: 5
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) ignoring action: pass (rule contains a disruptive action)
[4] Running (non-disruptive) action: severity
[9] This rule severity is: 2 current transaction is: 2
[4] Running (disruptive) action: deny
[8] Running action deny
[4] Running (non-disruptive) action: tag
[9] Rule tag: application-multi
[4] Running (non-disruptive) action: tag
[9] Rule tag: language-multi
[4] Running (non-disruptive) action: tag
[9] Rule tag: platform-multi
[4] Running (non-disruptive) action: tag
[9] Rule tag: attack-generic
[8] Skipping this phase as this request was already intercepted.
[4] Starting phase RESPONSE_HEADERS. (SecRules 3)
[9] This phase consists of 56 rule(s).
[4] (Rule: 950020) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 950013) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-RESPONSE-950-DATA-LEAKAGES
[9] Skipped rule id '950015' due to a SecMarker: END-RESPONSE-950-DATA-LEAKAGES
[9] Rule:
[9] Skipped rule id '950017' due to a SecMarker: END-RESPONSE-950-DATA-LEAKAGES
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-RESPONSE-950-DATA-LEAKAGES
[9] Rule: END-RESPONSE-950-DATA-LEAKAGES
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 951011) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 951013) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-RESPONSE-951-DATA-LEAKAGES-SQL
[9] Skipped rule id '951015' due to a SecMarker: END-RESPONSE-951-DATA-LEAKAGES-SQL
[9] Rule:
[9] Skipped rule id '951017' due to a SecMarker: END-RESPONSE-951-DATA-LEAKAGES-SQL
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-RESPONSE-951-DATA-LEAKAGES-SQL
[9] Rule: END-RESPONSE-951-DATA-LEAKAGES-SQL
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 952011) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 952013) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-RESPONSE-952-DATA-LEAKAGES-JAVA
[9] Skipped rule id '952015' due to a SecMarker: END-RESPONSE-952-DATA-LEAKAGES-JAVA
[9] Rule:
[9] Skipped rule id '952017' due to a SecMarker: END-RESPONSE-952-DATA-LEAKAGES-JAVA
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-RESPONSE-952-DATA-LEAKAGES-JAVA
[9] Rule: END-RESPONSE-952-DATA-LEAKAGES-JAVA
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 953011) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 953013) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-RESPONSE-953-DATA-LEAKAGES-PHP
[9] Skipped rule id '953015' due to a SecMarker: END-RESPONSE-953-DATA-LEAKAGES-PHP
[9] Rule:
[9] Skipped rule id '953017' due to a SecMarker: END-RESPONSE-953-DATA-LEAKAGES-PHP
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-RESPONSE-953-DATA-LEAKAGES-PHP
[9] Rule: END-RESPONSE-953-DATA-LEAKAGES-PHP
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 954011) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 954013) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-RESPONSE-954-DATA-LEAKAGES-IIS
[9] Skipped rule id '954015' due to a SecMarker: END-RESPONSE-954-DATA-LEAKAGES-IIS
[9] Rule:
[9] Skipped rule id '954017' due to a SecMarker: END-RESPONSE-954-DATA-LEAKAGES-IIS
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-RESPONSE-954-DATA-LEAKAGES-IIS
[9] Rule: END-RESPONSE-954-DATA-LEAKAGES-IIS
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 959011) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 959013) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-RESPONSE-959-BLOCKING-EVALUATION
[9] Skipped rule id '959015' due to a SecMarker: END-RESPONSE-959-BLOCKING-EVALUATION
[9] Rule:
[9] Skipped rule id '959017' due to a SecMarker: END-RESPONSE-959-BLOCKING-EVALUATION
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-RESPONSE-959-BLOCKING-EVALUATION
[9] Rule: END-RESPONSE-959-BLOCKING-EVALUATION
[4] Out of a SecMarker after skip 3.000000 rules.
[9] Appending response body: 0 bytes. Limit set to: 524288.000000
[9] Appending response body: 0 bytes. Limit set to: 524288.000000
[4] Starting phase RESPONSE_BODY. (SecRules 4)
[9] This phase consists of 85 rule(s).
[4] (Rule: 950021) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 950130) Executing operator "Rx" with param "(?:<(?:TITLE>Index of.*?<H|title>Index of.*?<h)1>Index of|>\[To Parent Directory\]<\/[Aa]><br>)" against RESPONSE_BODY.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 950014) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-RESPONSE-950-DATA-LEAKAGES
[9] Skipped rule id '950100' due to a SecMarker: END-RESPONSE-950-DATA-LEAKAGES
[9] Rule:
[9] Skipped rule id '950016' due to a SecMarker: END-RESPONSE-950-DATA-LEAKAGES
[9] Rule:
[9] Skipped rule id '950022' due to a SecMarker: END-RESPONSE-950-DATA-LEAKAGES
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-RESPONSE-950-DATA-LEAKAGES
[9] Rule: END-RESPONSE-950-DATA-LEAKAGES
[4] Out of a SecMarker after skip 4.000000 rules.
[4] (Rule: 951012) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 951100) Executing operator "PmFromFile" with param "sql-errors.data" against RESPONSE_BODY.
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 951110) Executing operator "Eq" with param "1" against TX:sql_error_match.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "0" (Variable: TX:sql_error_match)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 951120) Executing operator "Eq" with param "1" against TX:sql_error_match.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "0" (Variable: TX:sql_error_match)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 951130) Executing operator "Eq" with param "1" against TX:sql_error_match.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "0" (Variable: TX:sql_error_match)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 951140) Executing operator "Eq" with param "1" against TX:sql_error_match.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "0" (Variable: TX:sql_error_match)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 951150) Executing operator "Eq" with param "1" against TX:sql_error_match.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "0" (Variable: TX:sql_error_match)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 951160) Executing operator "Eq" with param "1" against TX:sql_error_match.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "0" (Variable: TX:sql_error_match)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 951170) Executing operator "Eq" with param "1" against TX:sql_error_match.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "0" (Variable: TX:sql_error_match)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 951180) Executing operator "Eq" with param "1" against TX:sql_error_match.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "0" (Variable: TX:sql_error_match)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 951190) Executing operator "Eq" with param "1" against TX:sql_error_match.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "0" (Variable: TX:sql_error_match)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 951200) Executing operator "Eq" with param "1" against TX:sql_error_match.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "0" (Variable: TX:sql_error_match)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 951210) Executing operator "Eq" with param "1" against TX:sql_error_match.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "0" (Variable: TX:sql_error_match)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 951220) Executing operator "Eq" with param "1" against TX:sql_error_match.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "0" (Variable: TX:sql_error_match)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 951230) Executing operator "Eq" with param "1" against TX:sql_error_match.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "0" (Variable: TX:sql_error_match)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 951240) Executing operator "Eq" with param "1" against TX:sql_error_match.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "0" (Variable: TX:sql_error_match)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 951250) Executing operator "Eq" with param "1" against TX:sql_error_match.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "0" (Variable: TX:sql_error_match)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 951260) Executing operator "Eq" with param "1" against TX:sql_error_match.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "0" (Variable: TX:sql_error_match)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 951014) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-RESPONSE-951-DATA-LEAKAGES-SQL
[9] Skipped rule id '951016' due to a SecMarker: END-RESPONSE-951-DATA-LEAKAGES-SQL
[9] Rule:
[9] Skipped rule id '951018' due to a SecMarker: END-RESPONSE-951-DATA-LEAKAGES-SQL
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-RESPONSE-951-DATA-LEAKAGES-SQL
[9] Rule: END-RESPONSE-951-DATA-LEAKAGES-SQL
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 952012) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 952100) Executing operator "PmFromFile" with param "java-code-leakages.data" against RESPONSE_BODY.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 952110) Executing operator "PmFromFile" with param "java-errors.data" against RESPONSE_BODY.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 952014) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-RESPONSE-952-DATA-LEAKAGES-JAVA
[9] Skipped rule id '952016' due to a SecMarker: END-RESPONSE-952-DATA-LEAKAGES-JAVA
[9] Rule:
[9] Skipped rule id '952018' due to a SecMarker: END-RESPONSE-952-DATA-LEAKAGES-JAVA
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-RESPONSE-952-DATA-LEAKAGES-JAVA
[9] Rule: END-RESPONSE-952-DATA-LEAKAGES-JAVA
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 953012) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 953100) Executing operator "PmFromFile" with param "php-errors.data" against RESPONSE_BODY.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 953110) Executing operator "Rx" with param "(?:\b(?:f(?:tp_(?:nb_)?f?(?:ge|pu)t|get(?:s?s|c)|scanf|write|open|read)|gz(?:(?:encod|writ)e|compress|open|read)|s(?:ession_start|candir)|read(?:(?:gz)?file|dir)|move_uploaded_file|(?:proc_|bz)open|call_user_func)|\$_(?:(?:pos|ge)t|session))\b" against RESPONSE_BODY.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 953120) Executing operator "Rx" with param "<\?(?!xml)" against RESPONSE_BODY.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 953014) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-RESPONSE-953-DATA-LEAKAGES-PHP
[9] Skipped rule id '953016' due to a SecMarker: END-RESPONSE-953-DATA-LEAKAGES-PHP
[9] Rule:
[9] Skipped rule id '953018' due to a SecMarker: END-RESPONSE-953-DATA-LEAKAGES-PHP
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-RESPONSE-953-DATA-LEAKAGES-PHP
[9] Rule: END-RESPONSE-953-DATA-LEAKAGES-PHP
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 954012) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 954100) Executing operator "Rx" with param "[a-z]:\\\\inetpub\b" against RESPONSE_BODY.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 954110) Executing operator "Rx" with param "(?:Microsoft OLE DB Provider for SQL Server(?:<\/font>.{1,20}?error '800(?:04005|40e31)'.{1,40}?Timeout expired| \(0x80040e31\)<br>Timeout expired<br>)|<h1>internal server error<\/h1>.*?<h2>part of the server has crashed or it has a configuration error\.<\/h2>|cannot connect to the server: timed out)" against RESPONSE_BODY.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 954120) Executing operator "Rx" with param "(?:\b(?:A(?:DODB\.Command\b.{0,100}?\b(?:Application uses a value of the wrong type for the current operation\b|error')| trappable error occurred in an external object\. The script cannot continue running\b)|Microsoft VBScript (?:compilation (?:\(0x8|error)|runtime (?:Error|\(0x8))\b|Object required: '|error '800)|<b>Version Information:<\/b>(?:&nbsp;|\s)(?:Microsoft \.NET Framework|ASP\.NET) Version:|>error 'ASP\b|An Error Has Occurred|>Syntax error in string in query expression|\/[Ee]rror[Mm]essage\.aspx?\?[Ee]rror\b)" against RESPONSE_BODY.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 954130) Executing operator "Rx" with param "^404$" against RESPONSE_STATUS.
[6] Resolving: TX.0 to: content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "403" (Variable: RESPONSE_STATUS)
[9] Matched vars updated.
[4] Running [independent] (non-disruptive) action: msg
[9] Saving msg: IIS Information Leakage
[4] Rule returned 1.
[4] Executing chained rule.
[4] (Rule: 0) Executing operator "Rx" with param "\bServer Error in.{0,50}?\bApplication\b" against RESPONSE_BODY.
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 954014) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-RESPONSE-954-DATA-LEAKAGES-IIS
[9] Skipped rule id '954016' due to a SecMarker: END-RESPONSE-954-DATA-LEAKAGES-IIS
[9] Rule:
[9] Skipped rule id '954018' due to a SecMarker: END-RESPONSE-954-DATA-LEAKAGES-IIS
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-RESPONSE-954-DATA-LEAKAGES-IIS
[9] Rule: END-RESPONSE-954-DATA-LEAKAGES-IIS
[4] Out of a SecMarker after skip 3.000000 rules.
[6] Resolving: tx.outbound_anomaly_score_threshold to: 4
[4] (Rule: 959100) Executing operator "Ge" with param "4" Was: "%{tx.outbound_anomaly_score_threshold}" against TX:OUTBOUND_ANOMALY_SCORE.
[6] Resolving: TX.OUTBOUND_ANOMALY_SCORE to: 0
[9] Target value: "0" (Variable: TX:OUTBOUND_ANOMALY_SCORE)
[6] Resolving: tx.outbound_anomaly_score_threshold to: 4
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 959012) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 959014) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-RESPONSE-959-BLOCKING-EVALUATION
[9] Skipped rule id '959016' due to a SecMarker: END-RESPONSE-959-BLOCKING-EVALUATION
[9] Rule:
[9] Skipped rule id '959018' due to a SecMarker: END-RESPONSE-959-BLOCKING-EVALUATION
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-RESPONSE-959-BLOCKING-EVALUATION
[9] Rule: END-RESPONSE-959-BLOCKING-EVALUATION
[4] Out of a SecMarker after skip 3.000000 rules.
[4] Starting phase LOGGING. (SecRules 5)
[9] This phase consists of 45 rule(s).
[4] (Rule: 912110) Executing operator "Eq" with param "0" against TX:dos_burst_time_slice.
[9] Target value: "0" (Variable: TX:dos_burst_time_slice)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[4] Executing chained rule.
[4] (Rule: 0) Executing operator "Eq" with param "0" against TX:dos_counter_threshold.
[9] Target value: "0" (Variable: TX:dos_counter_threshold)
[9] Matched vars updated.
[4] Rule returned 1.
[4] Executing chained rule.
[4] (Rule: 0) Executing operator "Eq" with param "0" against TX:dos_block_timeout.
[9] Target value: "0" (Variable: TX:dos_block_timeout)
[9] Matched vars updated.
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END_DOS_PROTECTION_CHECKS
[9] Skipped rule id '912140' due to a SecMarker: END_DOS_PROTECTION_CHECKS
[9] Rule:
[9] Skipped rule id '912150' due to a SecMarker: END_DOS_PROTECTION_CHECKS
[9] Rule:
[9] Skipped rule id '912160' due to a SecMarker: END_DOS_PROTECTION_CHECKS
[9] Rule:
[9] Skipped rule id '912161' due to a SecMarker: END_DOS_PROTECTION_CHECKS
[9] Rule:
[9] Skipped rule id '912170' due to a SecMarker: END_DOS_PROTECTION_CHECKS
[9] Rule:
[9] Skipped rule id '912019' due to a SecMarker: END_DOS_PROTECTION_CHECKS
[9] Rule:
[9] Skipped rule id '912171' due to a SecMarker: END_DOS_PROTECTION_CHECKS
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END_DOS_PROTECTION_CHECKS
[9] Rule: END-REQUEST-912-DOS-PROTECTION
[9] Skipped rule id '0' due to a SecMarker: END_DOS_PROTECTION_CHECKS
[9] Rule: END_DOS_PROTECTION_CHECKS
[4] Out of a SecMarker after skip 9.000000 rules.
[4] (Rule: 980100) Executing operator "Ge" with param "1" against TX.
[6] Resolving: tx.anomaly_score to: 5
[6] Resolving: tx.inbound_tx_msg to: Request content type is not allowed by policy
[6] Resolving: TX.INBOUND_ANOMALY_SCORE to: 5
[6] Resolving: tx.msg to: Request content type is not allowed by policy
[6] Resolving: TX.OUTBOUND_ANOMALY_SCORE to: 0
[9] Target value: "0" (Variable: TX)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 980110) Executing operator "Ge" with param "1" against TX.
[6] Resolving: tx.anomaly_score to: 5
[6] Resolving: tx.inbound_tx_msg to: Request content type is not allowed by policy
[6] Resolving: TX.INBOUND_ANOMALY_SCORE to: 5
[6] Resolving: tx.msg to: Request content type is not allowed by policy
[6] Resolving: TX.OUTBOUND_ANOMALY_SCORE to: 0
[9] Target value: "0" (Variable: TX)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 980120) Executing operator "Gt" with param "0" against TX:INBOUND_ANOMALY_SCORE.
[6] Resolving: TX.INBOUND_ANOMALY_SCORE to: 5
[6] Resolving: tx.inbound_tx_msg to: Request content type is not allowed by policy
[9] Target value: "5" (Variable: TX:INBOUND_ANOMALY_SCORE)
[9] Matched vars updated.
[4] Running [independent] (non-disruptive) action: log
[9] Saving transaction to logs
[9] Rule contains a `pass' action
[4] Running [independent] (non-disruptive) action: msg
[6] Resolving: TX.INBOUND_ANOMALY_SCORE to: 5
[6] Resolving: tx.inbound_tx_msg to: Request content type is not allowed by policy
[9] Saving msg: Inbound Anomaly Score (Total Inbound Score: 5): Request content type is not allowed by policy
[4] Rule returned 1.
[4] Executing chained rule.
[6] Resolving: tx.inbound_anomaly_score_threshold to: 5
[4] (Rule: 0) Executing operator "Lt" with param "5" Was: "%{tx.inbound_anomaly_score_threshold}" against TX:INBOUND_ANOMALY_SCORE.
[9] Target value: "5" (Variable: TX:INBOUND_ANOMALY_SCORE)
[6] Resolving: tx.inbound_anomaly_score_threshold to: 5
[4] Rule returned 0.
[9] Matched vars cleaned.
[6] Resolving: tx.inbound_anomaly_score_threshold to: 5
[4] (Rule: 980130) Executing operator "Ge" with param "5" Was: "%{tx.inbound_anomaly_score_threshold}" against TX:INBOUND_ANOMALY_SCORE.
[6] Resolving: TX.INBOUND_ANOMALY_SCORE to: 5
[6] Resolving: tx.sql_injection_score to: 0
[6] Resolving: tx.xss_score to: 0
[6] Resolving: tx.rfi_score to: 0
[6] Resolving: tx.lfi_score to: 0
[6] Resolving: tx.rce_score to: 0
[6] Resolving: tx.php_injection_score to: 0
[6] Resolving: tx.http_violation_score to: 0
[6] Resolving: tx.session_fixation_score to: 0
[6] Resolving: tx.inbound_tx_msg to: Request content type is not allowed by policy
[9] Target value: "5" (Variable: TX:INBOUND_ANOMALY_SCORE)
[6] Resolving: tx.inbound_anomaly_score_threshold to: 5
[9] Matched vars updated.
[4] Running [independent] (non-disruptive) action: log
[9] Saving transaction to logs
[9] Rule contains a `pass' action
[4] Running [independent] (non-disruptive) action: msg
[6] Resolving: TX.INBOUND_ANOMALY_SCORE to: 5
[6] Resolving: tx.sql_injection_score to: 0
[6] Resolving: tx.xss_score to: 0
[6] Resolving: tx.rfi_score to: 0
[6] Resolving: tx.lfi_score to: 0
[6] Resolving: tx.rce_score to: 0
[6] Resolving: tx.php_injection_score to: 0
[6] Resolving: tx.http_violation_score to: 0
[6] Resolving: tx.session_fixation_score to: 0
[6] Resolving: tx.inbound_tx_msg to: Request content type is not allowed by policy
[9] Saving msg: Inbound Anomaly Score Exceeded (Total Inbound Score: 5 - SQLI=0,XSS=0,RFI=0,LFI=0,RCE=0,PHPI=0,HTTP=0,SESS=0): Request content type is not allowed by policy
[4] Rule returned 1.
[4] Running (non-disruptive) action: noauditlog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: tag
[9] Rule tag: event-correlation
[6] Resolving: tx.outbound_anomaly_score_threshold to: 4
[4] (Rule: 980140) Executing operator "Ge" with param "4" Was: "%{tx.outbound_anomaly_score_threshold}" against TX:OUTBOUND_ANOMALY_SCORE.
[6] Resolving: TX.OUTBOUND_ANOMALY_SCORE to: 0
[6] Resolving: tx.msg to: Request content type is not allowed by policy
[9] Target value: "0" (Variable: TX:OUTBOUND_ANOMALY_SCORE)
[6] Resolving: tx.outbound_anomaly_score_threshold to: 4
[4] Rule returned 0.
[9] Matched vars cleaned.
[8] Checking if this request is suitable to be saved as an audit log.
[8] Checking if this request is relevant to be part of the audit logs.
[5] Saving this request as part of the audit logs.
[8] Request was relevant to be saved. Parts: 6006
[9] JSON: Cleaning up JSON results
[9] JSON parser initialization
[9] yajl JSON parsing callback initialization
[4] Initializing transaction
[4] Transaction context created.
[4] Starting phase CONNECTION. (SecRules 0)
[9] This phase consists of 32 rule(s).
[4] Starting phase URI. (SecRules 0 + 1/2)
[4] Starting phase REQUEST_HEADERS. (SecRules 1)
[9] This phase consists of 134 rule(s).
[4] (Rule: 200000) Executing operator "Rx" with param "(?:text|application)/xml" against REQUEST_HEADERS:Content-Type.
[9] T (0) t:lowercase: "application/x-www-form-urlencoded"
[9] Target value: "application/x-www-form-urlencoded" (Variable: REQUEST_HEADERS:Content-Type)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 200001) Executing operator "Rx" with param "application/json" against REQUEST_HEADERS:Content-Type.
[9] T (0) t:lowercase: "application/x-www-form-urlencoded"
[9] Target value: "application/x-www-form-urlencoded" (Variable: REQUEST_HEADERS:Content-Type)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 900990) Executing unconditional rule...
[9] Rule contains a `pass' action
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:crs_setup_version with value: 302
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] (Rule: 901001) Executing operator "Eq" with param "0" against TX:crs_setup_version.
[9] Target value: "1" (Variable: TX:crs_setup_version)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 901100) Executing operator "Eq" with param "0" against TX:inbound_anomaly_score_threshold.
[9] Target value: "0" (Variable: TX:inbound_anomaly_score_threshold)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:inbound_anomaly_score_threshold with value: 5
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] (Rule: 901110) Executing operator "Eq" with param "0" against TX:outbound_anomaly_score_threshold.
[9] Target value: "0" (Variable: TX:outbound_anomaly_score_threshold)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:outbound_anomaly_score_threshold with value: 4
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] (Rule: 901120) Executing operator "Eq" with param "0" against TX:paranoia_level.
[9] Target value: "0" (Variable: TX:paranoia_level)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:paranoia_level with value: 1
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] (Rule: 901130) Executing operator "Eq" with param "0" against TX:sampling_percentage.
[9] Target value: "0" (Variable: TX:sampling_percentage)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:sampling_percentage with value: 100
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] (Rule: 901140) Executing operator "Eq" with param "0" against TX:critical_anomaly_score.
[9] Target value: "0" (Variable: TX:critical_anomaly_score)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:critical_anomaly_score with value: 5
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] (Rule: 901141) Executing operator "Eq" with param "0" against TX:error_anomaly_score.
[9] Target value: "0" (Variable: TX:error_anomaly_score)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:error_anomaly_score with value: 4
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] (Rule: 901142) Executing operator "Eq" with param "0" against TX:warning_anomaly_score.
[9] Target value: "0" (Variable: TX:warning_anomaly_score)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:warning_anomaly_score with value: 3
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] (Rule: 901143) Executing operator "Eq" with param "0" against TX:notice_anomaly_score.
[9] Target value: "0" (Variable: TX:notice_anomaly_score)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:notice_anomaly_score with value: 2
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] (Rule: 901150) Executing operator "Eq" with param "0" against TX:do_reput_block.
[9] Target value: "0" (Variable: TX:do_reput_block)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:do_reput_block with value: 0
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] (Rule: 901152) Executing operator "Eq" with param "0" against TX:reput_block_duration.
[9] Target value: "0" (Variable: TX:reput_block_duration)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:reput_block_duration with value: 300
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] (Rule: 901160) Executing operator "Eq" with param "0" against TX:allowed_methods.
[9] Target value: "0" (Variable: TX:allowed_methods)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:allowed_methods with value: GET HEAD POST OPTIONS'
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] (Rule: 901162) Executing operator "Eq" with param "0" against TX:allowed_request_content_type.
[9] Target value: "0" (Variable: TX:allowed_request_content_type)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:allowed_request_content_type with value: application/x-www-form-urlencoded|multipart/form-data|text/xml|application/xml|application/soap+xml|application/x-amf|application/json|application/octet-stream|text/plain'
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] (Rule: 901163) Executing operator "Eq" with param "0" against TX:allowed_http_versions.
[9] Target value: "0" (Variable: TX:allowed_http_versions)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:allowed_http_versions with value: HTTP/1.0 HTTP/1.1 HTTP/2 HTTP/2.0'
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] (Rule: 901164) Executing operator "Eq" with param "0" against TX:restricted_extensions.
[9] Target value: "0" (Variable: TX:restricted_extensions)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:restricted_extensions with value: .asa/ .asax/ .ascx/ .axd/ .backup/ .bak/ .bat/ .cdx/ .cer/ .cfg/ .cmd/ .com/ .config/ .conf/ .cs/ .csproj/ .csr/ .dat/ .db/ .dbf/ .dll/ .dos/ .htr/ .htw/ .ida/ .idc/ .idq/ .inc/ .ini/ .key/ .licx/ .lnk/ .log/ .mdb/ .old/ .pass/ .pdb/ .pol/ .printer/ .pwd/ .resources/ .resx/ .sql/ .sys/ .vb/ .vbs/ .vbproj/ .vsdisco/ .webinfo/ .xsd/ .xsx/'
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] (Rule: 901165) Executing operator "Eq" with param "0" against TX:restricted_headers.
[9] Target value: "0" (Variable: TX:restricted_headers)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:restricted_headers with value: /proxy/ /lock-token/ /content-range/ /translate/ /if/'
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] (Rule: 901166) Executing operator "Eq" with param "0" against TX:static_extensions.
[9] Target value: "0" (Variable: TX:static_extensions)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:static_extensions with value: /.jpg/ /.jpeg/ /.png/ /.gif/ /.js/ /.css/ /.ico/ /.svg/ /.webp/'
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] (Rule: 901200) Executing unconditional rule...
[9] Rule contains a `pass' action
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:anomaly_score with value: 0
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:sql_injection_score with value: 0
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:xss_score with value: 0
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:rfi_score with value: 0
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:lfi_score with value: 0
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:rce_score with value: 0
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:php_injection_score with value: 0
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:http_violation_score with value: 0
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:session_fixation_score with value: 0
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:inbound_anomaly_score with value: 0
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:outbound_anomaly_score with value: 0
[4] Running [independent] (non-disruptive) action: setvar
[8] Saving variable: TX:sql_error_match with value: 0
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] (Rule: 901318) Executing operator "Rx" with param "^(.*)$" against REQUEST_HEADERS:User-Agent.
[9] T (0) t:sha1: "Á ò∑xak@sȇ´Í,#K+Ü+"
[9] T (1) t:hexEncode: "ffffffe709ffffff98ffffffb778616b4073ffffffe9ffffffe0ffffffabffffffea2c234b2b1dff (8 characters omitted)"
[9] Target value: "ffffffe709ffffff98ffffffb778616b4073ffffffe9ffffffe0ffffffabffffffea2c234b2b1dff (8 characters omitted)" (Variable: REQUEST_HEADERS:User-Agent)
[9] Matched vars updated.
[4] Running [independent] (non-disruptive) action: setvar
[6] Resolving: matched_var to: curl/7.52.1
[8] Saving variable: TX:ua_hash with value: curl/7.52.1
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] (Rule: 901321) Executing unconditional rule...
[4] Running [independent] (non-disruptive) action: setvar
[6] Resolving: remote_addr to: 127.0.0.1
[8] Saving variable: TX:real_ip with value: 127.0.0.1
[9] Rule contains a `pass' action
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: initcol
[5] Collection `global' initialized with value: global
[4] Running (non-disruptive) action: initcol
[6] Resolving: remote_addr to: 127.0.0.1
[6] Resolving: tx.ua_hash to: curl/7.52.1
[5] Collection `ip' initialized with value: 127.0.0.1_curl/7.52.1
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] (Rule: 901400) Executing operator "Eq" with param "100" against TX:sampling_percentage.
[9] Target value: "100" (Variable: TX:sampling_percentage)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-SAMPLING
[9] Skipped rule id '901410' due to a SecMarker: END-SAMPLING
[9] Rule:
[9] Skipped rule id '901420' due to a SecMarker: END-SAMPLING
[9] Rule:
[9] Skipped rule id '901430' due to a SecMarker: END-SAMPLING
[9] Rule:
[9] Skipped rule id '901440' due to a SecMarker: END-SAMPLING
[9] Rule:
[9] Skipped rule id '901450' due to a SecMarker: END-SAMPLING
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-SAMPLING
[9] Rule: END-SAMPLING
[4] Out of a SecMarker after skip 6.000000 rules.
[4] (Rule: 9001180) Executing operator "StrEq" with param "POST" against REQUEST_METHOD.
[9] Target value: "POST" (Variable: REQUEST_METHOD)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[4] Executing chained rule.
[4] (Rule: 0) Executing operator "Rx" with param "/admin/content/assets/add/[a-z]+$" against REQUEST_FILENAME.
[9] Target value: "/modsec-full/" (Variable: REQUEST_FILENAME)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 9001182) Executing operator "StrEq" with param "POST" against REQUEST_METHOD.
[9] Target value: "POST" (Variable: REQUEST_METHOD)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[4] Executing chained rule.
[4] (Rule: 0) Executing operator "Rx" with param "/admin/content/assets/manage/[0-9]+$" against REQUEST_FILENAME.
[9] Target value: "/modsec-full/" (Variable: REQUEST_FILENAME)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 9001184) Executing operator "StrEq" with param "POST" against REQUEST_METHOD.
[9] Target value: "POST" (Variable: REQUEST_METHOD)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[4] Executing chained rule.
[4] (Rule: 0) Executing operator "Rx" with param "/file/ajax/field_asset_[a-z0-9_]+/[ua]nd/0/form-[a-z0-9A-Z_-]+$" against REQUEST_FILENAME.
[9] Target value: "/modsec-full/" (Variable: REQUEST_FILENAME)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 9002000) Executing operator "Eq" with param "0" against TX:crs_exclusions_wordpress|TX:crs_exclusions_wordpress.
[9] Target value: "0" (Variable: TX:crs_exclusions_wordpress)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-WORDPRESS
[9] Skipped rule id '9002200' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002300' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002400' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-WORDPRESS
[9] Rule: END-WORDPRESS-ADMIN
[9] Skipped rule id '0' due to a SecMarker: END-WORDPRESS
[9] Rule: END-WORDPRESS
[4] Out of a SecMarker after skip 5.000000 rules.
[4] (Rule: 905100) Executing operator "StrEq" with param "GET /" against REQUEST_LINE.
[9] Target value: "POST /modsec-full/ HTTP/1.1" (Variable: REQUEST_LINE)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 905110) Executing operator "Rx" with param "^(GET /|OPTIONS \*) HTTP/[12]\.[01]$" against REQUEST_LINE.
[9] Target value: "POST /modsec-full/ HTTP/1.1" (Variable: REQUEST_LINE)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 910011) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 910013) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-910-IP-REPUTATION
[9] Skipped rule id '910015' due to a SecMarker: END-REQUEST-910-IP-REPUTATION
[9] Rule:
[9] Skipped rule id '910017' due to a SecMarker: END-REQUEST-910-IP-REPUTATION
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-910-IP-REPUTATION
[9] Rule: END-REQUEST-910-IP-REPUTATION
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 911011) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 911013) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-911-METHOD-ENFORCEMENT
[9] Skipped rule id '911015' due to a SecMarker: END-REQUEST-911-METHOD-ENFORCEMENT
[9] Rule:
[9] Skipped rule id '911017' due to a SecMarker: END-REQUEST-911-METHOD-ENFORCEMENT
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-911-METHOD-ENFORCEMENT
[9] Rule: END-REQUEST-911-METHOD-ENFORCEMENT
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 912100) Executing operator "Eq" with param "0" against TX:dos_burst_time_slice.
[9] Target value: "0" (Variable: TX:dos_burst_time_slice)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[4] Executing chained rule.
[4] (Rule: 0) Executing operator "Eq" with param "0" against TX:dos_counter_threshold.
[9] Target value: "0" (Variable: TX:dos_counter_threshold)
[9] Matched vars updated.
[4] Rule returned 1.
[4] Executing chained rule.
[4] (Rule: 0) Executing operator "Eq" with param "0" against TX:dos_block_timeout.
[9] Target value: "0" (Variable: TX:dos_block_timeout)
[9] Matched vars updated.
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END_DOS_PROTECTION_CHECKS
[9] Skipped rule id '912011' due to a SecMarker: END_DOS_PROTECTION_CHECKS
[9] Rule:
[9] Skipped rule id '912120' due to a SecMarker: END_DOS_PROTECTION_CHECKS
[9] Rule:
[9] Skipped rule id '912130' due to a SecMarker: END_DOS_PROTECTION_CHECKS
[9] Rule:
[9] Skipped rule id '912013' due to a SecMarker: END_DOS_PROTECTION_CHECKS
[9] Rule:
[9] Skipped rule id '912015' due to a SecMarker: END_DOS_PROTECTION_CHECKS
[9] Rule:
[9] Skipped rule id '912017' due to a SecMarker: END_DOS_PROTECTION_CHECKS
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END_DOS_PROTECTION_CHECKS
[9] Rule: END-REQUEST-912-DOS-PROTECTION
[9] Skipped rule id '0' due to a SecMarker: END_DOS_PROTECTION_CHECKS
[9] Rule: END_DOS_PROTECTION_CHECKS
[4] Out of a SecMarker after skip 8.000000 rules.
[4] (Rule: 913011) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 913013) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-913-SCANNER-DETECTION
[9] Skipped rule id '913015' due to a SecMarker: END-REQUEST-913-SCANNER-DETECTION
[9] Rule:
[9] Skipped rule id '913017' due to a SecMarker: END-REQUEST-913-SCANNER-DETECTION
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-913-SCANNER-DETECTION
[9] Rule: END-REQUEST-913-SCANNER-DETECTION
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 920011) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920160) Executing operator "Rx" with param "!^\d+$" against REQUEST_HEADERS:Content-Length.
[6] Resolving: matched_var to: NULL
[9] Target value: "3" (Variable: REQUEST_HEADERS:Content-Length)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920013) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[9] Skipped rule id '920015' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[9] Rule:
[9] Skipped rule id '920017' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[9] Rule: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 921011) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 921013) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-921-PROTOCOL-ATTACK
[9] Skipped rule id '921015' due to a SecMarker: END-REQUEST-921-PROTOCOL-ATTACK
[9] Rule:
[9] Skipped rule id '921017' due to a SecMarker: END-REQUEST-921-PROTOCOL-ATTACK
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-921-PROTOCOL-ATTACK
[9] Rule: END-REQUEST-921-PROTOCOL-ATTACK
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 930011) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 930013) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-930-APPLICATION-ATTACK-LFI
[9] Skipped rule id '930015' due to a SecMarker: END-REQUEST-930-APPLICATION-ATTACK-LFI
[9] Rule:
[9] Skipped rule id '930017' due to a SecMarker: END-REQUEST-930-APPLICATION-ATTACK-LFI
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-930-APPLICATION-ATTACK-LFI
[9] Rule: END-REQUEST-930-APPLICATION-ATTACK-LFI
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 931011) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 931013) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-931-APPLICATION-ATTACK-RFI
[9] Skipped rule id '931015' due to a SecMarker: END-REQUEST-931-APPLICATION-ATTACK-RFI
[9] Rule:
[9] Skipped rule id '931017' due to a SecMarker: END-REQUEST-931-APPLICATION-ATTACK-RFI
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-931-APPLICATION-ATTACK-RFI
[9] Rule: END-REQUEST-931-APPLICATION-ATTACK-RFI
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 932011) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 932013) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-932-APPLICATION-ATTACK-RCE
[9] Skipped rule id '932015' due to a SecMarker: END-REQUEST-932-APPLICATION-ATTACK-RCE
[9] Rule:
[9] Skipped rule id '932017' due to a SecMarker: END-REQUEST-932-APPLICATION-ATTACK-RCE
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-932-APPLICATION-ATTACK-RCE
[9] Rule: END-REQUEST-932-APPLICATION-ATTACK-RCE
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 933011) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 933013) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-933-APPLICATION-ATTACK-PHP
[9] Skipped rule id '933015' due to a SecMarker: END-REQUEST-933-APPLICATION-ATTACK-PHP
[9] Rule:
[9] Skipped rule id '933017' due to a SecMarker: END-REQUEST-933-APPLICATION-ATTACK-PHP
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-933-APPLICATION-ATTACK-PHP
[9] Rule: END-REQUEST-933-APPLICATION-ATTACK-PHP
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 941011) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941013) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-941-APPLICATION-ATTACK-XSS
[9] Skipped rule id '941015' due to a SecMarker: END-REQUEST-941-APPLICATION-ATTACK-XSS
[9] Rule:
[9] Skipped rule id '941017' due to a SecMarker: END-REQUEST-941-APPLICATION-ATTACK-XSS
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-941-APPLICATION-ATTACK-XSS
[9] Rule: END-REQUEST-941-APPLICATION-ATTACK-XSS
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 942011) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 942013) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Skipped rule id '942015' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942017' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 943011) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 943013) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION
[9] Skipped rule id '943015' due to a SecMarker: END-REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION
[9] Rule:
[9] Skipped rule id '943017' due to a SecMarker: END-REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION
[9] Rule: END-REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 949011) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 949013) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-949-BLOCKING-EVALUATION
[9] Skipped rule id '949015' due to a SecMarker: END-REQUEST-949-BLOCKING-EVALUATION
[9] Rule:
[9] Skipped rule id '949017' due to a SecMarker: END-REQUEST-949-BLOCKING-EVALUATION
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-949-BLOCKING-EVALUATION
[9] Rule: END-REQUEST-949-BLOCKING-EVALUATION
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 980011) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 980013) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-RESPONSE-980-CORRELATION
[9] Skipped rule id '980015' due to a SecMarker: END-RESPONSE-980-CORRELATION
[9] Rule:
[9] Skipped rule id '980017' due to a SecMarker: END-RESPONSE-980-CORRELATION
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-RESPONSE-980-CORRELATION
[9] Rule: END-RESPONSE-980-CORRELATION
[4] Out of a SecMarker after skip 3.000000 rules.
[9] Appending request body: 3 bytes. Limit set to: 13107200.000000
[4] Starting phase REQUEST_BODY. (SecRules 2)
[4] Adding request argument (POST): name "d", value "b"
[9] This phase consists of 315 rule(s).
[4] (Rule: 200002) Executing operator "Eq" with param "0" against REQBODY_ERROR.
[6] Resolving: reqbody_error_msg to: NULL
[9] Target value: "" (Variable: REQBODY_ERROR)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 200003) Executing operator "Eq" with param "0" against MULTIPART_STRICT_ERROR.
[6] Resolving: REQBODY_PROCESSOR_ERROR to: NULL
[6] Resolving: MULTIPART_BOUNDARY_QUOTED to: NULL
[6] Resolving: MULTIPART_BOUNDARY_WHITESPACE to: NULL
[6] Resolving: MULTIPART_DATA_BEFORE to: NULL
[6] Resolving: MULTIPART_DATA_AFTER to: NULL
[6] Resolving: MULTIPART_HEADER_FOLDING to: NULL
[6] Resolving: MULTIPART_LF_LINE to: NULL
[6] Resolving: MULTIPART_MISSING_SEMICOLON to: NULL
[6] Resolving: MULTIPART_INVALID_QUOTING to: NULL
[6] Resolving: MULTIPART_INVALID_PART to: NULL
[6] Resolving: MULTIPART_INVALID_HEADER_FOLDING to: NULL
[6] Resolving: MULTIPART_FILE_LIMIT_EXCEEDED to: NULL
[9] Target value: "" (Variable: MULTIPART_STRICT_ERROR)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 200004) Executing operator "Eq" with param "0" against MULTIPART_UNMATCHED_BOUNDARY.
[9] Target value: "" (Variable: MULTIPART_UNMATCHED_BOUNDARY)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 200005) Executing operator "StrEq" with param "0" against TX.
[6] Resolving: MATCHED_VAR_NAME to: NULL
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 9001000) Executing operator "Eq" with param "0" against TX:crs_exclusions_drupal|TX:crs_exclusions_drupal.
[9] Target value: "0" (Variable: TX:crs_exclusions_drupal)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-DRUPAL-RULE-EXCLUSIONS
[9] Skipped rule id '9001100' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '9001110' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '9001112' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '9001114' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '9001116' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '9001122' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '9001124' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '9001126' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '9001128' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '9001140' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '9001160' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '9001170' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '9001200' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '9001202' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '9001204' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '9001206' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '9001208' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '9001210' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '9001212' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '9001214' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '9001216' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-DRUPAL-RULE-EXCLUSIONS
[9] Rule: END-DRUPAL-RULE-EXCLUSIONS
[4] Out of a SecMarker after skip 22.000000 rules.
[4] (Rule: 9002001) Executing operator "Eq" with param "0" against TX:crs_exclusions_wordpress|TX:crs_exclusions_wordpress.
[9] Target value: "0" (Variable: TX:crs_exclusions_wordpress)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-WORDPRESS
[9] Skipped rule id '9002100' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002120' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002130' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002150' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002160' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002401' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002410' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002420' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002520' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002530' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002540' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002600' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002700' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002710' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002720' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002730' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002740' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002750' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002760' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002800' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002810' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002820' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '9002900' due to a SecMarker: END-WORDPRESS
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-WORDPRESS
[9] Rule: END-WORDPRESS-ADMIN
[9] Skipped rule id '0' due to a SecMarker: END-WORDPRESS
[9] Rule: END-WORDPRESS
[4] Out of a SecMarker after skip 25.000000 rules.
[4] (Rule: 910012) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 910000) Executing operator "Eq" with param "1" against TX:DO_REPUT_BLOCK.
[6] Resolving: ip.reput_block_reason to: NULL
[9] Target value: "0" (Variable: TX:DO_REPUT_BLOCK)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 910100) Executing operator "Rx" with param "!^$" against TX:HIGH_RISK_COUNTRY_CODES.
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 910120) Executing operator "Eq" with param "1" against IP.
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 910130) Executing operator "Eq" with param "0" against TX:block_suspicious_ip.
[9] Target value: "0" (Variable: TX:block_suspicious_ip)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[4] Executing chained rule.
[4] (Rule: 0) Executing operator "Eq" with param "0" against TX:block_harvester_ip.
[9] Target value: "0" (Variable: TX:block_harvester_ip)
[9] Matched vars updated.
[4] Rule returned 1.
[4] Executing chained rule.
[4] (Rule: 0) Executing operator "Eq" with param "0" against TX:block_spammer_ip.
[9] Target value: "0" (Variable: TX:block_spammer_ip)
[9] Matched vars updated.
[4] Rule returned 1.
[4] Executing chained rule.
[4] (Rule: 0) Executing operator "Eq" with param "0" against TX:block_search_ip.
[9] Target value: "0" (Variable: TX:block_search_ip)
[9] Matched vars updated.
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END_RBL_CHECK
[9] Skipped rule id '910140' due to a SecMarker: END_RBL_CHECK
[9] Rule:
[9] Skipped rule id '910150' due to a SecMarker: END_RBL_CHECK
[9] Rule:
[9] Skipped rule id '910160' due to a SecMarker: END_RBL_CHECK
[9] Rule:
[9] Skipped rule id '910170' due to a SecMarker: END_RBL_CHECK
[9] Rule:
[9] Skipped rule id '910180' due to a SecMarker: END_RBL_CHECK
[9] Rule:
[9] Skipped rule id '910190' due to a SecMarker: END_RBL_CHECK
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END_RBL_CHECK
[9] Rule: END_RBL_LOOKUP
[9] Skipped rule id '0' due to a SecMarker: END_RBL_CHECK
[9] Rule: END_RBL_CHECK
[4] Out of a SecMarker after skip 8.000000 rules.
[4] (Rule: 910014) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-910-IP-REPUTATION
[9] Skipped rule id '910016' due to a SecMarker: END-REQUEST-910-IP-REPUTATION
[9] Rule:
[9] Skipped rule id '910018' due to a SecMarker: END-REQUEST-910-IP-REPUTATION
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-910-IP-REPUTATION
[9] Rule: END-REQUEST-910-IP-REPUTATION
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 911012) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[6] Resolving: tx.allowed_methods to: GET HEAD POST OPTIONS'
[4] (Rule: 911100) Executing operator "Within" with param "GET HEAD POST OPTIONS'" Was: "%{tx.allowed_methods}" against REQUEST_METHOD.
[6] Resolving: matched_var to: NULL
[9] Target value: "POST" (Variable: REQUEST_METHOD)
[6] Resolving: tx.allowed_methods to: GET HEAD POST OPTIONS'
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 911014) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-911-METHOD-ENFORCEMENT
[9] Skipped rule id '911016' due to a SecMarker: END-REQUEST-911-METHOD-ENFORCEMENT
[9] Rule:
[9] Skipped rule id '911018' due to a SecMarker: END-REQUEST-911-METHOD-ENFORCEMENT
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-911-METHOD-ENFORCEMENT
[9] Rule: END-REQUEST-911-METHOD-ENFORCEMENT
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 912012) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 912014) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-912-DOS-PROTECTION
[9] Skipped rule id '912016' due to a SecMarker: END-REQUEST-912-DOS-PROTECTION
[9] Rule:
[9] Skipped rule id '912018' due to a SecMarker: END-REQUEST-912-DOS-PROTECTION
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-912-DOS-PROTECTION
[9] Rule: END-REQUEST-912-DOS-PROTECTION
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 913012) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 913100) Executing operator "PmFromFile" with param "scanners-user-agents.data" against REQUEST_HEADERS:User-Agent.
[6] Resolving: TX.0 to: NULL
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:lowercase: "curl/7.52.1"
[9] Target value: "curl/7.52.1" (Variable: REQUEST_HEADERS:User-Agent)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 913110) Executing operator "PmFromFile" with param "scanners-headers.data" against REQUEST_HEADERS_NAMES|REQUEST_HEADERS.
[6] Resolving: TX.0 to: NULL
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:lowercase: "host user-agent accept content-length content-type"
[9] Target value: "host user-agent accept content-length content-type" (Variable: REQUEST_HEADERS_NAMES)
[9] T (0) t:lowercase: "localhost"
[9] Target value: "localhost" (Variable: REQUEST_HEADERS:Host)
[9] T (0) t:lowercase: "curl/7.52.1"
[9] Target value: "curl/7.52.1" (Variable: REQUEST_HEADERS:User-Agent)
[9] T (0) t:lowercase: "*/*"
[9] Target value: "*/*" (Variable: REQUEST_HEADERS:Accept)
[9] T (0) t:lowercase: "3"
[9] Target value: "3" (Variable: REQUEST_HEADERS:Content-Length)
[9] T (0) t:lowercase: "application/x-www-form-urlencoded"
[9] Target value: "application/x-www-form-urlencoded" (Variable: REQUEST_HEADERS:Content-Type)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 913120) Executing operator "PmFromFile" with param "scanners-urls.data" against REQUEST_FILENAME|ARGS.
[6] Resolving: TX.0 to: NULL
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:lowercase: "/modsec-full/"
[9] Target value: "/modsec-full/" (Variable: REQUEST_FILENAME)
[9] T (0) t:lowercase: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 913014) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-913-SCANNER-DETECTION
[9] Skipped rule id '913101' due to a SecMarker: END-REQUEST-913-SCANNER-DETECTION
[9] Rule:
[9] Skipped rule id '913102' due to a SecMarker: END-REQUEST-913-SCANNER-DETECTION
[9] Rule:
[9] Skipped rule id '913016' due to a SecMarker: END-REQUEST-913-SCANNER-DETECTION
[9] Rule:
[9] Skipped rule id '913018' due to a SecMarker: END-REQUEST-913-SCANNER-DETECTION
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-913-SCANNER-DETECTION
[9] Rule: END-REQUEST-913-SCANNER-DETECTION
[4] Out of a SecMarker after skip 5.000000 rules.
[4] (Rule: 920012) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920100) Executing operator "Rx" with param "!^(?i:(?:[a-z]{3,10}\s+(?:\w{3,7}?://[\w\-\./]*(?::\d+)?)?/[^?#]*(?:\?[^#\s]*)?(?:#[\S]*)?|connect (?:\d{1,3}\.){3}\d{1,3}\.?(?::\d+)?|options \*)\s+[\w\./]+|get /[^?#]*(?:\?[^#\s]*)?(?:#[\S]*)?)$" against REQUEST_LINE.
[6] Resolving: request_line to: POST /modsec-full/ HTTP/1.1
[9] Target value: "POST /modsec-full/ HTTP/1.1" (Variable: REQUEST_LINE)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920120) Executing operator "Rx" with param "(?<!&(?:[aAoOuUyY]uml)|&(?:[aAeEiIoOuU]circ)|&(?:[eEiIoOuUyY]acute)|&(?:[aAeEiIoOuU]grave)|&(?:[cC]cedil)|&(?:[aAnNoO]tilde)|&(?:amp)|&(?:apos));|['\"=]" against FILES_NAMES|FILES.
[6] Resolving: matched_var to: NULL
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920130) Executing operator "Eq" with param "0" against REQBODY_ERROR.
[6] Resolving: REQBODY_ERROR_MSG to: NULL
[9] Target value: "" (Variable: REQBODY_ERROR)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920140) Executing operator "Eq" with param "0" against MULTIPART_STRICT_ERROR.
[6] Resolving: REQBODY_PROCESSOR_ERROR to: NULL
[6] Resolving: MULTIPART_BOUNDARY_QUOTED to: NULL
[6] Resolving: MULTIPART_BOUNDARY_WHITESPACE to: NULL
[6] Resolving: MULTIPART_DATA_BEFORE to: NULL
[6] Resolving: MULTIPART_DATA_AFTER to: NULL
[6] Resolving: MULTIPART_HEADER_FOLDING to: NULL
[6] Resolving: MULTIPART_LF_LINE to: NULL
[6] Resolving: MULTIPART_SEMICOLON_MISSING to: NULL
[6] Resolving: MULTIPART_INVALID_QUOTING to: NULL
[6] Resolving: MULTIPART_INVALID_HEADER_FOLDING to: NULL
[6] Resolving: MULTIPART_FILE_LIMIT_EXCEEDED to: NULL
[9] Target value: "" (Variable: MULTIPART_STRICT_ERROR)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920170) Executing operator "Rx" with param "^(?:GET|HEAD)$" against REQUEST_METHOD.
[6] Resolving: matched_var to: NULL
[9] Target value: "POST" (Variable: REQUEST_METHOD)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920180) Executing operator "Rx" with param "^POST$" against REQUEST_METHOD.
[6] Resolving: matched_var to: NULL
[9] Target value: "POST" (Variable: REQUEST_METHOD)
[9] Matched vars updated.
[4] Running [independent] (non-disruptive) action: msg
[9] Saving msg: POST request missing Content-Length Header.
[4] Rule returned 1.
[4] Executing chained rule.
[4] (Rule: 0) Executing operator "Eq" with param "0" against REQUEST_HEADERS:Content-Length.
[9] Target value: "1" (Variable: REQUEST_HEADERS:Content-Length)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920190) Executing operator "Rx" with param "(\d+)\-(\d+)\," against REQUEST_HEADERS:Range|REQUEST_HEADERS:Request-Range.
[6] Resolving: matched_var to: NULL
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920210) Executing operator "Rx" with param "\b(keep-alive|close),\s?(keep-alive|close)\b" against REQUEST_HEADERS:Connection.
[6] Resolving: matched_var to: NULL
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920220) Executing operator "Rx" with param "\%((?!$|\W)|[0-9a-fA-F]{2}|u[0-9a-fA-F]{4})" against REQUEST_URI.
[9] Target value: "/modsec-full/" (Variable: REQUEST_URI)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920240) Executing operator "Rx" with param "^(application\/x-www-form-urlencoded|text\/xml)(?:;(?:\s?charset\s?=\s?[\w\d\-]{1,18})?)??$" against REQUEST_HEADERS:Content-Type.
[9] Target value: "application/x-www-form-urlencoded" (Variable: REQUEST_HEADERS:Content-Type)
[9] Matched vars updated.
[4] Running [independent] (non-disruptive) action: msg
[9] Saving msg: URL Encoding Abuse Attack Attempt
[4] Rule returned 1.
[4] Executing chained rule.
[4] (Rule: 0) Executing operator "Rx" with param "\%((?!$|\W)|[0-9a-fA-F]{2}|u[0-9a-fA-F]{4})" against REQUEST_BODY|XML:/*.
[9] Target value: "d=b" (Variable: REQUEST_BODY)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920250) Executing operator "Eq" with param "1" against TX:CRS_VALIDATE_UTF8_ENCODING.
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920260) Executing operator "Rx" with param "\%u[fF]{2}[0-9a-fA-F]{2}" against REQUEST_URI|REQUEST_BODY.
[9] Target value: "/modsec-full/" (Variable: REQUEST_URI)
[9] Target value: "d=b" (Variable: REQUEST_BODY)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920270) Executing operator "ValidadeByteRange" with param "1-255" against REQUEST_URI|REQUEST_HEADERS|ARGS|ARGS_NAMES.
[9] T (0) t:urlDecodeUni: "/modsec-full/"
[9] Target value: "/modsec-full/" (Variable: REQUEST_URI)
[9] T (0) t:urlDecodeUni: "localhost"
[9] Target value: "localhost" (Variable: REQUEST_HEADERS:Host)
[9] T (0) t:urlDecodeUni: "curl/7.52.1"
[9] Target value: "curl/7.52.1" (Variable: REQUEST_HEADERS:User-Agent)
[9] T (0) t:urlDecodeUni: "*/*"
[9] Target value: "*/*" (Variable: REQUEST_HEADERS:Accept)
[9] T (0) t:urlDecodeUni: "3"
[9] Target value: "3" (Variable: REQUEST_HEADERS:Content-Length)
[9] T (0) t:urlDecodeUni: "application/x-www-form-urlencoded"
[9] Target value: "application/x-www-form-urlencoded" (Variable: REQUEST_HEADERS:Content-Type)
[9] T (0) t:urlDecodeUni: "b"
[9] Target value: "b" (Variable: ARGS:d)
[9] T (0) t:urlDecodeUni: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920280) Executing operator "Eq" with param "0" against REQUEST_HEADERS:Host.
[9] Target value: "1" (Variable: REQUEST_HEADERS:Host)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920290) Executing operator "Rx" with param "^$" against REQUEST_HEADERS:Host.
[9] Target value: "localhost" (Variable: REQUEST_HEADERS:Host)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920310) Executing operator "Rx" with param "^$" against REQUEST_HEADERS:Accept.
[9] Target value: "*/*" (Variable: REQUEST_HEADERS:Accept)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920311) Executing operator "Rx" with param "^$" against REQUEST_HEADERS:Accept.
[9] Target value: "*/*" (Variable: REQUEST_HEADERS:Accept)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920330) Executing operator "Rx" with param "^$" against REQUEST_HEADERS:User-Agent.
[9] Target value: "curl/7.52.1" (Variable: REQUEST_HEADERS:User-Agent)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920340) Executing operator "Rx" with param "!^0$" against REQUEST_HEADERS:Content-Length.
[9] Target value: "3" (Variable: REQUEST_HEADERS:Content-Length)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920350) Executing operator "Rx" with param "^[\d.:]+$" against REQUEST_HEADERS:Host.
[6] Resolving: matched_var to: NULL
[9] Target value: "localhost" (Variable: REQUEST_HEADERS:Host)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920380) Executing operator "Eq" with param "1" against TX:MAX_NUM_ARGS.
[9] Target value: "0" (Variable: TX:MAX_NUM_ARGS)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920360) Executing operator "Eq" with param "1" against TX:ARG_NAME_LENGTH.
[9] Target value: "0" (Variable: TX:ARG_NAME_LENGTH)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920370) Executing operator "Eq" with param "1" against TX:ARG_LENGTH.
[9] Target value: "0" (Variable: TX:ARG_LENGTH)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920390) Executing operator "Eq" with param "1" against TX:TOTAL_ARG_LENGTH.
[9] Target value: "0" (Variable: TX:TOTAL_ARG_LENGTH)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920400) Executing operator "Eq" with param "1" against TX:MAX_FILE_SIZE.
[9] Target value: "0" (Variable: TX:MAX_FILE_SIZE)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920410) Executing operator "Eq" with param "1" against TX:COMBINED_FILE_SIZES.
[9] Target value: "0" (Variable: TX:COMBINED_FILE_SIZES)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920420) Executing operator "Rx" with param "!^(?:GET|HEAD|PROPFIND|OPTIONS)$" against REQUEST_METHOD.
[6] Resolving: matched_var to: NULL
[9] Target value: "POST" (Variable: REQUEST_METHOD)
[4] Rule returned 0.
[9] Matched vars cleaned.
[6] Resolving: tx.allowed_http_versions to: HTTP/1.0 HTTP/1.1 HTTP/2 HTTP/2.0'
[4] (Rule: 920430) Executing operator "Within" with param "HTTP/1.0 HTTP/1.1 HTTP/2 HTTP/2.0'" Was: "%{tx.allowed_http_versions}" against REQUEST_PROTOCOL.
[6] Resolving: matched_var to: NULL
[9] Target value: "HTTP/1.1" (Variable: REQUEST_PROTOCOL)
[6] Resolving: tx.allowed_http_versions to: HTTP/1.0 HTTP/1.1 HTTP/2 HTTP/2.0'
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920440) Executing operator "Rx" with param "\.(.*)$" against REQUEST_BASENAME.
[6] Resolving: TX.0 to: NULL
[9] T (0) t:urlDecodeUni: ""
[9] T (1) t:lowercase: ""
[9] Target value: "" (Variable: REQUEST_BASENAME)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920450) Executing operator "Rx" with param "^(.*)$" against REQUEST_HEADERS_NAMES.
[6] Resolving: MATCHED_VAR to: NULL
[6] Resolving: matched_var to: NULL
[9] T (0) t:lowercase: "host user-agent accept content-length content-type"
[9] Target value: "host user-agent accept content-length content-type" (Variable: REQUEST_HEADERS_NAMES)
[7] Added regex subexpression TX.0: host user-agent accept content-length content-type
[7] Added regex subexpression TX.1: host user-agent accept content-length content-type
[9] Matched vars updated.
[4] Running [independent] (non-disruptive) action: msg
[6] Resolving: MATCHED_VAR to: Host User-Agent Accept Content-Length Content-Type
[9] Saving msg: HTTP header is restricted by policy (Host User-Agent Accept Content-Length Content-Type)
[4] Running [independent] (non-disruptive) action: setvar
[6] Resolving: tx.0 to: host user-agent accept content-length content-type
[6] Resolving: tx.0 to: host user-agent accept content-length content-type
[8] Saving variable: TX:header_name_host user-agent accept content-length content-type with value: /host user-agent accept content-length content-type/'
[4] Rule returned 1.
[4] Executing chained rule.
[6] Resolving: tx.restricted_headers to: /proxy/ /lock-token/ /content-range/ /translate/ /if/'
[4] (Rule: 0) Executing operator "Within" with param "/proxy/ /lock-token/ /content-range/ /translate/ /if/'" Was: "%{tx.restricted_headers}" against TX.
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 920014) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[9] Skipped rule id '920200' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[9] Rule:
[9] Skipped rule id '920201' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[9] Rule:
[9] Skipped rule id '920230' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[9] Rule:
[9] Skipped rule id '920300' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[9] Rule:
[9] Skipped rule id '920271' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[9] Rule:
[9] Skipped rule id '920320' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[9] Rule:
[9] Skipped rule id '920121' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[9] Rule:
[9] Skipped rule id '920016' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[9] Rule:
[9] Skipped rule id '920272' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[9] Rule:
[9] Skipped rule id '920018' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[9] Rule:
[9] Skipped rule id '920202' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[9] Rule:
[9] Skipped rule id '920273' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[9] Rule:
[9] Skipped rule id '920274' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[9] Rule:
[9] Skipped rule id '920460' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[9] Rule: END-REQUEST-920-PROTOCOL-ENFORCEMENT
[4] Out of a SecMarker after skip 15.000000 rules.
[4] (Rule: 921012) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 921100) Executing operator "Rx" with param "," against REQUEST_HEADERS.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "3" (Variable: REQUEST_HEADERS:Content-Length)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 921110) Executing operator "Rx" with param "(?:\n|\r)+(?:get|post|head|options|connect|put|delete|trace|propfind|propatch|mkcol|copy|move|lock|unlock)\s+" against ARGS_NAMES|ARGS|XML:/*.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] T (1) t:htmlEntityDecode: "d"
[9] T (2) t:lowercase: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:urlDecodeUni: "b"
[9] T (1) t:htmlEntityDecode: "b"
[9] T (2) t:lowercase: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 921120) Executing operator "Rx" with param "[\r\n]\W*?(?:content-(type|length)|set-cookie|location):" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] T (1) t:lowercase: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:urlDecodeUni: "b"
[9] T (1) t:lowercase: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 921130) Executing operator "Rx" with param "(?:\bhttp\/(?:0\.9|1\.[01])|<(?:html|meta)\b)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] T (1) t:htmlEntityDecode: "d"
[9] T (2) t:lowercase: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:urlDecodeUni: "b"
[9] T (1) t:htmlEntityDecode: "b"
[9] T (2) t:lowercase: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 921140) Executing operator "Rx" with param "(\n|\r)" against REQUEST_HEADERS_NAMES|REQUEST_HEADERS.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:htmlEntityDecode: "Host User-Agent Accept Content-Length Content-Type"
[9] T (1) t:lowercase: "host user-agent accept content-length content-type"
[9] Target value: "host user-agent accept content-length content-type" (Variable: REQUEST_HEADERS_NAMES)
[9] T (0) t:htmlEntityDecode: "localhost"
[9] T (1) t:lowercase: "localhost"
[9] Target value: "localhost" (Variable: REQUEST_HEADERS:Host)
[9] T (0) t:htmlEntityDecode: "curl/7.52.1"
[9] T (1) t:lowercase: "curl/7.52.1"
[9] Target value: "curl/7.52.1" (Variable: REQUEST_HEADERS:User-Agent)
[9] T (0) t:htmlEntityDecode: "*/*"
[9] T (1) t:lowercase: "*/*"
[9] Target value: "*/*" (Variable: REQUEST_HEADERS:Accept)
[9] T (0) t:htmlEntityDecode: "3"
[9] T (1) t:lowercase: "3"
[9] Target value: "3" (Variable: REQUEST_HEADERS:Content-Length)
[9] T (0) t:htmlEntityDecode: "application/x-www-form-urlencoded"
[9] T (1) t:lowercase: "application/x-www-form-urlencoded"
[9] Target value: "application/x-www-form-urlencoded" (Variable: REQUEST_HEADERS:Content-Type)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 921150) Executing operator "Rx" with param "(\n|\r)" against ARGS_NAMES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] T (1) t:htmlEntityDecode: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 921160) Executing operator "Rx" with param "(?:\n|\r)+(?:\s+|location|refresh|(?:set-)?cookie|(X-)?(?:forwarded-(?:for|host|server)|host|via|remote-ip|remote-addr|originating-IP))\s*:" against ARGS_NAMES|ARGS|XML:/*.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] T (1) t:htmlEntityDecode: "d"
[9] T (2) t:lowercase: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:urlDecodeUni: "b"
[9] T (1) t:htmlEntityDecode: "b"
[9] T (2) t:lowercase: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 921014) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-921-PROTOCOL-ATTACK
[9] Skipped rule id '921151' due to a SecMarker: END-REQUEST-921-PROTOCOL-ATTACK
[9] Rule:
[9] Skipped rule id '921016' due to a SecMarker: END-REQUEST-921-PROTOCOL-ATTACK
[9] Rule:
[9] Skipped rule id '921170' due to a SecMarker: END-REQUEST-921-PROTOCOL-ATTACK
[9] Rule:
[9] Skipped rule id '921180' due to a SecMarker: END-REQUEST-921-PROTOCOL-ATTACK
[9] Rule:
[9] Skipped rule id '921018' due to a SecMarker: END-REQUEST-921-PROTOCOL-ATTACK
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-921-PROTOCOL-ATTACK
[9] Rule: END-REQUEST-921-PROTOCOL-ATTACK
[4] Out of a SecMarker after skip 6.000000 rules.
[4] (Rule: 930012) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 930100) Executing operator "Rx" with param "(?i)(?:\x5c|(?:%(?:c(?:0%(?:[2aq]f|5c|9v)|1%(?:[19p]c|8s|af))|2(?:5(?:c(?:0%25af|1%259c)|2f|5c)|%46|f)|(?:(?:f(?:8%8)?0%8|e)0%80%a|bg%q)f|%3(?:2(?:%(?:%6|4)6|F)|5%%63)|u(?:221[56]|002f|EFC8|F025)|1u|5c)|0x(?:2f|5c)|\/))(?:%(?:(?:f(?:(?:c%80|8)%8)?0%8|e)0%80%ae|2(?:(?:5(?:c0%25a|2))?e|%45)|u(?:(?:002|ff0)e|2024)|%32(?:%(?:%6|4)5|E)|c0(?:%[256aef]e|\.))|\.(?:%0[01]|\?)?|\?\.?|0x2e){2}(?:\x5c|(?:%(?:c(?:0%(?:[2aq]f|5c|9v)|1%(?:[19p]c|8s|af))|2(?:5(?:c(?:0%25af|1%259c)|2f|5c)|%46|f)|(?:(?:f(?:8%8)?0%8|e)0%80%a|bg%q)f|%3(?:2(?:%(?:%6|4)6|F)|5%%63)|u(?:221[56]|002f|EFC8|F025)|1u|5c)|0x(?:2f|5c)|\/))" against REQUEST_URI_RAW|REQUEST_BODY|REQUEST_HEADERS|XML:/*, except for: REQUEST_HEADERS:Referer.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "/modsec-full/" (Variable: REQUEST_URI_RAW)
[9] Target value: "d=b" (Variable: REQUEST_BODY)
[9] Target value: "localhost" (Variable: REQUEST_HEADERS:Host)
[9] Target value: "curl/7.52.1" (Variable: REQUEST_HEADERS:User-Agent)
[9] Target value: "*/*" (Variable: REQUEST_HEADERS:Accept)
[9] Target value: "3" (Variable: REQUEST_HEADERS:Content-Length)
[9] Target value: "application/x-www-form-urlencoded" (Variable: REQUEST_HEADERS:Content-Type)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 930110) Executing operator "Pm" with param "..\ ../" against REQUEST_URI|REQUEST_BODY|REQUEST_HEADERS|XML:/*, except for: REQUEST_HEADERS:Referer.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "/modsec-full/"
[9] T (1) t:urlDecodeUni: "/modsec-full/"
[9] T (2) t:removeNulls: "/modsec-full/"
[9] T (3) t:cmdLine: "/modsec-full/"
[9] Target value: "/modsec-full/" (Variable: REQUEST_URI)
[9] T (0) t:utf8toUnicode: "d=b"
[9] T (1) t:urlDecodeUni: "d=b"
[9] T (2) t:removeNulls: "d=b"
[9] T (3) t:cmdLine: "d=b"
[9] Target value: "d=b" (Variable: REQUEST_BODY)
[9] T (0) t:utf8toUnicode: "localhost"
[9] T (1) t:urlDecodeUni: "localhost"
[9] T (2) t:removeNulls: "localhost"
[9] T (3) t:cmdLine: "localhost"
[9] Target value: "localhost" (Variable: REQUEST_HEADERS:Host)
[9] T (0) t:utf8toUnicode: "curl/7.52.1"
[9] T (1) t:urlDecodeUni: "curl/7.52.1"
[9] T (2) t:removeNulls: "curl/7.52.1"
[9] T (3) t:cmdLine: "curl/7.52.1"
[9] Target value: "curl/7.52.1" (Variable: REQUEST_HEADERS:User-Agent)
[9] T (0) t:utf8toUnicode: "*/*"
[9] T (1) t:urlDecodeUni: "*/*"
[9] T (2) t:removeNulls: "*/*"
[9] T (3) t:cmdLine: "*/*"
[9] Target value: "*/*" (Variable: REQUEST_HEADERS:Accept)
[9] T (0) t:utf8toUnicode: "3"
[9] T (1) t:urlDecodeUni: "3"
[9] T (2) t:removeNulls: "3"
[9] T (3) t:cmdLine: "3"
[9] Target value: "3" (Variable: REQUEST_HEADERS:Content-Length)
[9] T (0) t:utf8toUnicode: "application/x-www-form-urlencoded"
[9] T (1) t:urlDecodeUni: "application/x-www-form-urlencoded"
[9] T (2) t:removeNulls: "application/x-www-form-urlencoded"
[9] T (3) t:cmdLine: "application/x-www-form-urlencoded"
[9] Target value: "application/x-www-form-urlencoded" (Variable: REQUEST_HEADERS:Content-Type)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 930120) Executing operator "PmFromFile" with param "lfi-os-files.data" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:normalizePathWin: "d"
[9] T (3) t:lowercase: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:normalizePathWin: "b"
[9] T (3) t:lowercase: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 930130) Executing operator "PmFromFile" with param "restricted-files.data" against REQUEST_FILENAME.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "/modsec-full/"
[9] T (1) t:urlDecodeUni: "/modsec-full/"
[9] T (2) t:normalizePathWin: "/modsec-full/"
[9] T (3) t:lowercase: "/modsec-full/"
[9] Target value: "/modsec-full/" (Variable: REQUEST_FILENAME)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 930014) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-930-APPLICATION-ATTACK-LFI
[9] Skipped rule id '930016' due to a SecMarker: END-REQUEST-930-APPLICATION-ATTACK-LFI
[9] Rule:
[9] Skipped rule id '930018' due to a SecMarker: END-REQUEST-930-APPLICATION-ATTACK-LFI
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-930-APPLICATION-ATTACK-LFI
[9] Rule: END-REQUEST-930-APPLICATION-ATTACK-LFI
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 931012) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 931100) Executing operator "Rx" with param "^(?i)(?:file|ftps?|https?):\/\/(\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})" against ARGS.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 931110) Executing operator "Rx" with param "(?i:(\binclude\s*\([^)]*|mosConfig_absolute_path|_CONF\[path\]|_SERVER\[DOCUMENT_ROOT\]|GALLERY_BASEDIR|path\[docroot\]|appserv_root|config\[root_dir\])=(file|ftps?|https?):\/\/)" against QUERY_STRING|REQUEST_BODY.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: ""
[9] Target value: "" (Variable: QUERY_STRING)
[9] T (0) t:urlDecodeUni: "d=b"
[9] Target value: "d=b" (Variable: REQUEST_BODY)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 931120) Executing operator "Rx" with param "^(?i)(?:file|ftps?|https?)(.*?)\?+$" against ARGS.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 931014) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-931-APPLICATION-ATTACK-RFI
[9] Skipped rule id '931130' due to a SecMarker: END-REQUEST-931-APPLICATION-ATTACK-RFI
[9] Rule:
[9] Skipped rule id '931016' due to a SecMarker: END-REQUEST-931-APPLICATION-ATTACK-RFI
[9] Rule:
[9] Skipped rule id '931018' due to a SecMarker: END-REQUEST-931-APPLICATION-ATTACK-RFI
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-931-APPLICATION-ATTACK-RFI
[9] Rule: END-REQUEST-931-APPLICATION-ATTACK-RFI
[4] Out of a SecMarker after skip 4.000000 rules.
[4] (Rule: 932012) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 932100) Executing operator "Rx" with param "(?:;|\{|\||\|\||&|&&|\n|\r|\$\(|\$\(\(|`|\${|<\(|>\(|\(\s*\))\s*(?:{|\s*\(\s*|\w+=(?:[^\s]*|\$.*|\$.*|<.*|>.*|\'.*\'|\".*\")\s+|!\s*|\$)*\s*(?:'|\")*(?:[\?\*\[\]\(\)\-\|+\w'\"\./\\\\]+/)?[\\\\'\"]*(?:l[\\\\'\"]*(?:w[\\\\'\"]*p[\\\\'\"]*-[\\\\'\"]*(?:d[\\\\'\"]*(?:o[\\\\'\"]*w[\\\\'\"]*n[\\\\'\"]*l[\\\\'\"]*o[\\\\'\"]*a[\\\\'\"]*d|u[\\\\'\"]*m[\\\\'\"]*p)|r[\\\\'\"]*e[\\\\'\"]*q[\\\\'\"]*u[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*t|m[\\\\'\"]*i[\\\\'\"]*r[\\\\'\"]*r[\\\\'\"]*o[\\\\'\"]*r)|s(?:[\\\\'\"]*(?:b[\\\\'\"]*_[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*l[\\\\'\"]*e[\\\\'\"]*a[\\\\'\"]*s[\\\\'\"]*e|c[\\\\'\"]*p[\\\\'\"]*u|m[\\\\'\"]*o[\\\\'\"]*d|p[\\\\'\"]*c[\\\\'\"]*i|u[\\\\'\"]*s[\\\\'\"]*b|-[\\\\'\"]*F|h[\\\\'\"]*w|o[\\\\'\"]*f))?|z[\\\\'\"]*(?:(?:[ef][\\\\'\"]*)?g[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*p|c[\\\\'\"]*(?:a[\\\\'\"]*t|m[\\\\'\"]*p)|m[\\\\'\"]*(?:o[\\\\'\"]*r[\\\\'\"]*e|a)|d[\\\\'\"]*i[\\\\'\"]*f[\\\\'\"]*f|l[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*s)|e[\\\\'\"]*s[\\\\'\"]*s[\\\\'\"]*(?:(?:f[\\\\'\"]*i[\\\\'\"]*l|p[\\\\'\"]*i[\\\\'\"]*p)[\\\\'\"]*e|e[\\\\'\"]*c[\\\\'\"]*h[\\\\'\"]*o|(?:\s|<|>).*)|a[\\\\'\"]*s[\\\\'\"]*t[\\\\'\"]*(?:l[\\\\'\"]*o[\\\\'\"]*g(?:[\\\\'\"]*i[\\\\'\"]*n)?|c[\\\\'\"]*o[\\\\'\"]*m[\\\\'\"]*m|(?:\s|<|>).*)|o[\\\\'\"]*(?:c[\\\\'\"]*a[\\\\'\"]*(?:t[\\\\'\"]*e|l)[\\\\'\"]*(?:\s|<|>).*|g[\\\\'\"]*n[\\\\'\"]*a[\\\\'\"]*m[\\\\'\"]*e)|d[\\\\'\"]*(?:c[\\\\'\"]*o[\\\\'\"]*n[\\\\'\"]*f[\\\\'\"]*i[\\\\'\"]*g|d[\\\\'\"]*(?:\s|<|>).*)|f[\\\\'\"]*t[\\\\'\"]*p(?:[\\\\'\"]*g[\\\\'\"]*e[\\\\'\"]*t)?|(?:[np]|y[\\\\'\"]*n[\\\\'\"]*x)[\\\\'\"]*(?:\s|<|>).*)|b[\\\\'\"]*(?:z[\\\\'\"]*(?:(?:[ef][\\\\'\"]*)?g[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*p|d[\\\\'\"]*i[\\\\'\"]*f[\\\\'\"]*f|l[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*s|m[\\\\'\"]*o[\\\\'\"]*r[\\\\'\"]*e|c[\\\\'\"]*a[\\\\'\"]*t|i[\\\\'\"]*p[\\\\'\"]*2)|s[\\\\'\"]*d[\\\\'\"]*(?:c[\\\\'\"]*a[\\\\'\"]*t|i[\\\\'\"]*f[\\\\'\"]*f|t[\\\\'\"]*a[\\\\'\"]*r)|a[\\\\'\"]*(?:t[\\\\'\"]*c[\\\\'\"]*h[\\\\'\"]*(?:\s|<|>).*|s[\\\\'\"]*h)|r[\\\\'\"]*e[\\\\'\"]*a[\\\\'\"]*k[\\\\'\"]*s[\\\\'\"]*w|u[\\\\'\"]*i[\\\\'\"]*l[\\\\'\"]*t[\\\\'\"]*i[\\\\'\"]*n)|c[\\\\'\"]*(?:o[\\\\'\"]*(?:m[\\\\'\"]*(?:p[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*s|m[\\\\'\"]*a[\\\\'\"]*n[\\\\'\"]*d)[\\\\'\"]*(?:\s|<|>).*|p[\\\\'\"]*r[\\\\'\"]*o[\\\\'\"]*c)|h[\\\\'\"]*(?:d[\\\\'\"]*i[\\\\'\"]*r[\\\\'\"]*(?:\s|<|>).*|f[\\\\'\"]*l[\\\\'\"]*a[\\\\'\"]*g[\\\\'\"]*s|a[\\\\'\"]*t[\\\\'\"]*t[\\\\'\"]*r|m[\\\\'\"]*o[\\\\'\"]*d)|r[\\\\'\"]*o[\\\\'\"]*n[\\\\'\"]*t[\\\\'\"]*a[\\\\'\"]*b|(?:[cp]|a[\\\\'\"]*t)[\\\\'\"]*(?:\s|<|>).*|u[\\\\'\"]*r[\\\\'\"]*l|s[\\\\'\"]*h)|f[\\\\'\"]*(?:i(?:[\\\\'\"]*(?:l[\\\\'\"]*e[\\\\'\"]*(?:t[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*t|(?:\s|<|>).*)|n[\\\\'\"]*d[\\\\'\"]*(?:\s|<|>).*))?|t[\\\\'\"]*p[\\\\'\"]*(?:s[\\\\'\"]*t[\\\\'\"]*a[\\\\'\"]*t[\\\\'\"]*s|w[\\\\'\"]*h[\\\\'\"]*o|(?:\s|<|>).*)|u[\\\\'\"]*n[\\\\'\"]*c[\\\\'\"]*t[\\\\'\"]*i[\\\\'\"]*o[\\\\'\"]*n|(?:e[\\\\'\"]*t[\\\\'\"]*c[\\\\'\"]*h|c)[\\\\'\"]*(?:\s|<|>).*|o[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*a[\\\\'\"]*c[\\\\'\"]*h|g[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*p)|e[\\\\'\"]*(?:n[\\\\'\"]*(?:v(?:[\\\\'\"]*-[\\\\'\"]*u[\\\\'\"]*p[\\\\'\"]*d[\\\\'\"]*a[\\\\'\"]*t[\\\\'\"]*e)?|d[\\\\'\"]*(?:i[\\\\'\"]*f|s[\\\\'\"]*w))|x[\\\\'\"]*(?:p[\\\\'\"]*(?:a[\\\\'\"]*n[\\\\'\"]*d|o[\\\\'\"]*r[\\\\'\"]*t|r)|e[\\\\'\"]*c[\\\\'\"]*(?:\s|<|>).*|i[\\\\'\"]*t)|c[\\\\'\"]*h[\\\\'\"]*o[\\\\'\"]*(?:\s|<|>).*|g[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*p|s[\\\\'\"]*a[\\\\'\"]*c|v[\\\\'\"]*a[\\\\'\"]*l)|h[\\\\'\"]*(?:t[\\\\'\"]*(?:d[\\\\'\"]*i[\\\\'\"]*g[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*t|p[\\\\'\"]*a[\\\\'\"]*s[\\\\'\"]*s[\\\\'\"]*w[\\\\'\"]*d)|o[\\\\'\"]*s[\\\\'\"]*t[\\\\'\"]*(?:n[\\\\'\"]*a[\\\\'\"]*m[\\\\'\"]*e|i[\\\\'\"]*d)|(?:e[\\\\'\"]*a[\\\\'\"]*d|u[\\\\'\"]*p)[\\\\'\"]*(?:\s|<|>).*|i[\\\\'\"]*s[\\\\'\"]*t[\\\\'\"]*o[\\\\'\"]*r[\\\\'\"]*y)|i[\\\\'\"]*(?:p[\\\\'\"]*(?:(?:6[\\\\'\"]*)?t[\\\\'\"]*a[\\\\'\"]*b[\\\\'\"]*l[\\\\'\"]*e[\\\\'\"]*s|c[\\\\'\"]*o[\\\\'\"]*n[\\\\'\"]*f[\\\\'\"]*i[\\\\'\"]*g)|r[\\\\'\"]*b(?:[\\\\'\"]*(?:1(?:[\\\\'\"]*[89])?|2[\\\\'\"]*[012]))?|f[\\\\'\"]*c[\\\\'\"]*o[\\\\'\"]*n[\\\\'\"]*f[\\\\'\"]*i[\\\\'\"]*g|d[\\\\'\"]*(?:\s|<|>).*)|g[\\\\'\"]*(?:(?:e[\\\\'\"]*t[\\\\'\"]*f[\\\\'\"]*a[\\\\'\"]*c[\\\\'\"]*l|r[\\\\'\"]*e[\\\\'\"]*p|c[\\\\'\"]*c|i[\\\\'\"]*t)[\\\\'\"]*(?:\s|<|>).*|z[\\\\'\"]*(?:c[\\\\'\"]*a[\\\\'\"]*t|i[\\\\'\"]*p)|u[\\\\'\"]*n[\\\\'\"]*z[\\\\'\"]*i[\\\\'\"]*p|d[\\\\'\"]*b)|a[\\\\'\"]*(?:(?:l[\\\\'\"]*i[\\\\'\"]*a[\\\\'\"]*s|w[\\\\'\"]*k)[\\\\'\"]*(?:\s|<|>).*|d[\\\\'\"]*d[\\\\'\"]*u[\\\\'\"]*s[\\\\'\"]*e[\\\\'\"]*r|p[\\\\'\"]*t[\\\\'\"]*-[\\\\'\"]*g[\\\\'\"]*e[\\\\'\"]*t|r[\\\\'\"]*(?:c[\\\\'\"]*h[\\\\'\"]*(?:\s|<|>).*|p))|d[\\\\'\"]*(?:h[\\\\'\"]*c[\\\\'\"]*l[\\\\'\"]*i[\\\\'\"]*e[\\\\'\"]*n[\\\\'\"]*t|(?:i[\\\\'\"]*f[\\\\'\"]*f|u)[\\\\'\"]*(?:\s|<|>).*|(?:m[\\\\'\"]*e[\\\\'\"]*s|p[\\\\'\"]*k)[\\\\'\"]*g|o[\\\\'\"]*(?:a[\\\\'\"]*s|n[\\\\'\"]*e)|a[\\\\'\"]*s[\\\\'\"]*h)|m[\\\\'\"]*(?:(?:k[\\\\'\"]*d[\\\\'\"]*i[\\\\'\"]*r|o[\\\\'\"]*r[\\\\'\"]*e)[\\\\'\"]*(?:\s|<|>).*|a[\\\\'\"]*i[\\\\'\"]*l[\\\\'\"]*(?:x[\\\\'\"]*(?:\s|<|>).*|q)|l[\\\\'\"]*o[\\\\'\"]*c[\\\\'\"]*a[\\\\'\"]*t[\\\\'\"]*e)|j[\\\\'\"]*(?:(?:a[\\\\'\"]*v[\\\\'\"]*a|o[\\\\'\"]*b[\\\\'\"]*s)[\\\\'\"]*(?:\s|<|>).*|e[\\\\'\"]*x[\\\\'\"]*e[\\\\'\"]*c)|k[\\\\'\"]*i[\\\\'\"]*l[\\\\'\"]*l[\\\\'\"]*(?:a[\\\\'\"]*l[\\\\'\"]*l|(?:\s|<|>).*)|(?:G[\\\\'\"]*E[\\\\'\"]*T[\\\\'\"]*(?:\s|<|>)|\.\s).*|7[\\\\'\"]*z(?:[\\\\'\"]*[ar])?)\b" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 932105) Executing operator "Rx" with param "(?:;|\{|\||\|\||&|&&|\n|\r|\$\(|\$\(\(|`|\${|<\(|>\(|\(\s*\))\s*(?:{|\s*\(\s*|\w+=(?:[^\s]*|\$.*|\$.*|<.*|>.*|\'.*\'|\".*\")\s+|!\s*|\$)*\s*(?:'|\")*(?:[\?\*\[\]\(\)\-\|+\w'\"\./\\\\]+/)?[\\\\'\"]*(?:s[\\\\'\"]*(?:e[\\\\'\"]*(?:t[\\\\'\"]*(?:(?:f[\\\\'\"]*a[\\\\'\"]*c[\\\\'\"]*l[\\\\'\"]*)?(?:\s|<|>).*|e[\\\\'\"]*n[\\\\'\"]*v|s[\\\\'\"]*i[\\\\'\"]*d)|n[\\\\'\"]*d[\\\\'\"]*m[\\\\'\"]*a[\\\\'\"]*i[\\\\'\"]*l|d[\\\\'\"]*(?:\s|<|>).*)|h[\\\\'\"]*(?:\.[\\\\'\"]*d[\\\\'\"]*i[\\\\'\"]*s[\\\\'\"]*t[\\\\'\"]*r[\\\\'\"]*i[\\\\'\"]*b|u[\\\\'\"]*t[\\\\'\"]*d[\\\\'\"]*o[\\\\'\"]*w[\\\\'\"]*n|(?:\s|<|>).*)|o[\\\\'\"]*(?:(?:u[\\\\'\"]*r[\\\\'\"]*c[\\\\'\"]*e|r[\\\\'\"]*t)[\\\\'\"]*(?:\s|<|>).*|c[\\\\'\"]*a[\\\\'\"]*t)|c[\\\\'\"]*(?:h[\\\\'\"]*e[\\\\'\"]*d|p[\\\\'\"]*(?:\s|<|>).*)|t[\\\\'\"]*r[\\\\'\"]*i[\\\\'\"]*n[\\\\'\"]*g[\\\\'\"]*s|(?:l[\\\\'\"]*e[\\\\'\"]*e|f[\\\\'\"]*t)[\\\\'\"]*p|y[\\\\'\"]*s[\\\\'\"]*c[\\\\'\"]*t[\\\\'\"]*l|u[\\\\'\"]*(?:(?:\s|<|>).*|d[\\\\'\"]*o)|d[\\\\'\"]*i[\\\\'\"]*f[\\\\'\"]*f|s[\\\\'\"]*h|v[\\\\'\"]*n)|p[\\\\'\"]*(?:k[\\\\'\"]*(?:g(?:(?:[\\\\'\"]*_)?[\\\\'\"]*i[\\\\'\"]*n[\\\\'\"]*f[\\\\'\"]*o)?|e[\\\\'\"]*x[\\\\'\"]*e[\\\\'\"]*c|i[\\\\'\"]*l[\\\\'\"]*l)|t[\\\\'\"]*a[\\\\'\"]*r(?:[\\\\'\"]*(?:d[\\\\'\"]*i[\\\\'\"]*f[\\\\'\"]*f|g[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*p))?|a[\\\\'\"]*(?:t[\\\\'\"]*c[\\\\'\"]*h[\\\\'\"]*(?:\s|<|>).*|s[\\\\'\"]*s[\\\\'\"]*w[\\\\'\"]*d)|r[\\\\'\"]*i[\\\\'\"]*n[\\\\'\"]*t[\\\\'\"]*(?:e[\\\\'\"]*n[\\\\'\"]*v|f[\\\\'\"]*(?:\s|<|>).*)|y[\\\\'\"]*t[\\\\'\"]*h[\\\\'\"]*o[\\\\'\"]*n(?:[\\\\'\"]*(?:3(?:[\\\\'\"]*m)?|2))?|e[\\\\'\"]*r[\\\\'\"]*(?:l(?:[\\\\'\"]*(?:s[\\\\'\"]*h|5))?|m[\\\\'\"]*s)|(?:g[\\\\'\"]*r[\\\\'\"]*e|f[\\\\'\"]*t)[\\\\'\"]*p|(?:u[\\\\'\"]*s[\\\\'\"]*h|o[\\\\'\"]*p)[\\\\'\"]*d|h[\\\\'\"]*p(?:[\\\\'\"]*[57])?|i[\\\\'\"]*n[\\\\'\"]*g|s[\\\\'\"]*(?:\s|<|>).*)|n[\\\\'\"]*(?:c[\\\\'\"]*(?:\.[\\\\'\"]*(?:t[\\\\'\"]*r[\\\\'\"]*a[\\\\'\"]*d[\\\\'\"]*i[\\\\'\"]*t[\\\\'\"]*i[\\\\'\"]*o[\\\\'\"]*n[\\\\'\"]*a[\\\\'\"]*l|o[\\\\'\"]*p[\\\\'\"]*e[\\\\'\"]*n[\\\\'\"]*b[\\\\'\"]*s[\\\\'\"]*d)|(?:\s|<|>).*|a[\\\\'\"]*t)|e[\\\\'\"]*t[\\\\'\"]*(?:k[\\\\'\"]*i[\\\\'\"]*t[\\\\'\"]*-[\\\\'\"]*f[\\\\'\"]*t[\\\\'\"]*p|(?:s[\\\\'\"]*t|c)[\\\\'\"]*a[\\\\'\"]*t|(?:\s|<|>).*)|s[\\\\'\"]*(?:l[\\\\'\"]*o[\\\\'\"]*o[\\\\'\"]*k[\\\\'\"]*u[\\\\'\"]*p|t[\\\\'\"]*a[\\\\'\"]*t)|(?:a[\\\\'\"]*n[\\\\'\"]*o|i[\\\\'\"]*c[\\\\'\"]*e)[\\\\'\"]*(?:\s|<|>).*|(?:o[\\\\'\"]*h[\\\\'\"]*u|m[\\\\'\"]*a)[\\\\'\"]*p|p[\\\\'\"]*i[\\\\'\"]*n[\\\\'\"]*g)|r[\\\\'\"]*(?:e[\\\\'\"]*(?:(?:p[\\\\'\"]*(?:l[\\\\'\"]*a[\\\\'\"]*c[\\\\'\"]*e|e[\\\\'\"]*a[\\\\'\"]*t)|n[\\\\'\"]*a[\\\\'\"]*m[\\\\'\"]*e)[\\\\'\"]*(?:\s|<|>).*|a[\\\\'\"]*l[\\\\'\"]*p[\\\\'\"]*a[\\\\'\"]*t[\\\\'\"]*h)|m[\\\\'\"]*(?:(?:d[\\\\'\"]*i[\\\\'\"]*r[\\\\'\"]*)?(?:\s|<|>).*|u[\\\\'\"]*s[\\\\'\"]*e[\\\\'\"]*r)|u[\\\\'\"]*b[\\\\'\"]*y(?:[\\\\'\"]*(?:1(?:[\\\\'\"]*[89])?|2[\\\\'\"]*[012]))?|(?:a[\\\\'\"]*r|c[\\\\'\"]*p|p[\\\\'\"]*m)[\\\\'\"]*(?:\s|<|>).*|n[\\\\'\"]*a[\\\\'\"]*n[\\\\'\"]*o|o[\\\\'\"]*u[\\\\'\"]*t[\\\\'\"]*e|s[\\\\'\"]*y[\\\\'\"]*n[\\\\'\"]*c)|t[\\\\'\"]*(?:c[\\\\'\"]*(?:p[\\\\'\"]*(?:t[\\\\'\"]*r[\\\\'\"]*a[\\\\'\"]*c[\\\\'\"]*e[\\\\'\"]*r[\\\\'\"]*o[\\\\'\"]*u[\\\\'\"]*t[\\\\'\"]*e|i[\\\\'\"]*n[\\\\'\"]*g)|s[\\\\'\"]*h)|r[\\\\'\"]*a[\\\\'\"]*c[\\\\'\"]*e[\\\\'\"]*r[\\\\'\"]*o[\\\\'\"]*u[\\\\'\"]*t[\\\\'\"]*e(?:[\\\\'\"]*6)?|e[\\\\'\"]*(?:l[\\\\'\"]*n[\\\\'\"]*e[\\\\'\"]*t|e[\\\\'\"]*(?:\s|<|>).*)|i[\\\\'\"]*m[\\\\'\"]*e[\\\\'\"]*(?:o[\\\\'\"]*u[\\\\'\"]*t|(?:\s|<|>).*)|a[\\\\'\"]*(?:i[\\\\'\"]*l(?:[\\\\'\"]*f)?|r[\\\\'\"]*(?:\s|<|>).*)|o[\\\\'\"]*(?:u[\\\\'\"]*c[\\\\'\"]*h[\\\\'\"]*(?:\s|<|>).*|p))|u[\\\\'\"]*(?:n[\\\\'\"]*(?:l[\\\\'\"]*(?:i[\\\\'\"]*n[\\\\'\"]*k[\\\\'\"]*(?:\s|<|>).*|z[\\\\'\"]*m[\\\\'\"]*a)|c[\\\\'\"]*o[\\\\'\"]*m[\\\\'\"]*p[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*s|a[\\\\'\"]*m[\\\\'\"]*e|r[\\\\'\"]*a[\\\\'\"]*r|s[\\\\'\"]*e[\\\\'\"]*t|z[\\\\'\"]*i[\\\\'\"]*p|x[\\\\'\"]*z)|s[\\\\'\"]*e[\\\\'\"]*r[\\\\'\"]*(?:(?:a[\\\\'\"]*d|m[\\\\'\"]*o)[\\\\'\"]*d|d[\\\\'\"]*e[\\\\'\"]*l)|l[\\\\'\"]*i[\\\\'\"]*m[\\\\'\"]*i[\\\\'\"]*t[\\\\'\"]*(?:\s|<|>).*)|m[\\\\'\"]*(?:y[\\\\'\"]*s[\\\\'\"]*q[\\\\'\"]*l(?:[\\\\'\"]*(?:d[\\\\'\"]*u[\\\\'\"]*m[\\\\'\"]*p(?:[\\\\'\"]*s[\\\\'\"]*l[\\\\'\"]*o[\\\\'\"]*w)?|h[\\\\'\"]*o[\\\\'\"]*t[\\\\'\"]*c[\\\\'\"]*o[\\\\'\"]*p[\\\\'\"]*y|a[\\\\'\"]*d[\\\\'\"]*m[\\\\'\"]*i[\\\\'\"]*n|s[\\\\'\"]*h[\\\\'\"]*o[\\\\'\"]*w))?|(?:(?:o[\\\\'\"]*u[\\\\'\"]*n|u[\\\\'\"]*t)[\\\\'\"]*t|v)[\\\\'\"]*(?:\s|<|>).*)|x[\\\\'\"]*(?:z[\\\\'\"]*(?:(?:[ef][\\\\'\"]*)?g[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*p|d[\\\\'\"]*(?:i[\\\\'\"]*f[\\\\'\"]*f|e[\\\\'\"]*c)|c[\\\\'\"]*(?:a[\\\\'\"]*t|m[\\\\'\"]*p)|l[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*s|m[\\\\'\"]*o[\\\\'\"]*r[\\\\'\"]*e|(?:\s|<|>).*)|a[\\\\'\"]*r[\\\\'\"]*g[\\\\'\"]*s|t[\\\\'\"]*e[\\\\'\"]*r[\\\\'\"]*m|x[\\\\'\"]*d[\\\\'\"]*(?:\s|<|>).*)|z[\\\\'\"]*(?:(?:[ef][\\\\'\"]*)?g[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*p|c[\\\\'\"]*(?:a[\\\\'\"]*t|m[\\\\'\"]*p)|d[\\\\'\"]*i[\\\\'\"]*f[\\\\'\"]*f|i[\\\\'\"]*p[\\\\'\"]*(?:\s|<|>).*|l[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*s|m[\\\\'\"]*o[\\\\'\"]*r[\\\\'\"]*e|r[\\\\'\"]*u[\\\\'\"]*n|s[\\\\'\"]*h)|o[\\\\'\"]*(?:p[\\\\'\"]*e[\\\\'\"]*n[\\\\'\"]*s[\\\\'\"]*s[\\\\'\"]*l|n[\\\\'\"]*i[\\\\'\"]*n[\\\\'\"]*t[\\\\'\"]*r)|w[\\\\'\"]*(?:h[\\\\'\"]*o[\\\\'\"]*(?:a[\\\\'\"]*m[\\\\'\"]*i|(?:\s|<|>).*)|g[\\\\'\"]*e[\\\\'\"]*t|3[\\\\'\"]*m)|v[\\\\'\"]*i[\\\\'\"]*(?:m[\\\\'\"]*(?:\s|<|>).*|g[\\\\'\"]*r|p[\\\\'\"]*w)|y[\\\\'\"]*u[\\\\'\"]*m)\b" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 932110) Executing operator "Rx" with param "(?i)(?:;|\{|\||\|\||&|&&|\n|\r|`)\s*[\(,@\'\"\s]*(?:[\w'\"\./]+/|[\\\\'\"\^]*\w[\\\\'\"\^]*:.*\\\\|[\^\.\w '\"/\\\\]*\\\\)?[\"\^]*(?:m[\"\^]*(?:y[\"\^]*s[\"\^]*q[\"\^]*l(?:[\"\^]*(?:d[\"\^]*u[\"\^]*m[\"\^]*p(?:[\"\^]*s[\"\^]*l[\"\^]*o[\"\^]*w)?|h[\"\^]*o[\"\^]*t[\"\^]*c[\"\^]*o[\"\^]*p[\"\^]*y|a[\"\^]*d[\"\^]*m[\"\^]*i[\"\^]*n|s[\"\^]*h[\"\^]*o[\"\^]*w))?|s[\"\^]*(?:i[\"\^]*(?:n[\"\^]*f[\"\^]*o[\"\^]*3[\"\^]*2|e[\"\^]*x[\"\^]*e[\"\^]*c)|c[\"\^]*o[\"\^]*n[\"\^]*f[\"\^]*i[\"\^]*g|g[\"\^]*(?:[\s,;]|\.|/|<|>).*|t[\"\^]*s[\"\^]*c)|o[\"\^]*(?:u[\"\^]*n[\"\^]*t[\"\^]*(?:(?:[\s,;]|\.|/|<|>).*|v[\"\^]*o[\"\^]*l)|v[\"\^]*e[\"\^]*u[\"\^]*s[\"\^]*e[\"\^]*r|[dr][\"\^]*e[\"\^]*(?:[\s,;]|\.|/|<|>).*)|k[\"\^]*(?:d[\"\^]*i[\"\^]*r[\"\^]*(?:[\s,;]|\.|/|<|>).*|l[\"\^]*i[\"\^]*n[\"\^]*k)|d[\"\^]*(?:s[\"\^]*c[\"\^]*h[\"\^]*e[\"\^]*d|(?:[\s,;]|\.|/|<|>).*)|a[\"\^]*p[\"\^]*i[\"\^]*s[\"\^]*e[\"\^]*n[\"\^]*d|b[\"\^]*s[\"\^]*a[\"\^]*c[\"\^]*l[\"\^]*i|e[\"\^]*a[\"\^]*s[\"\^]*u[\"\^]*r[\"\^]*e|m[\"\^]*s[\"\^]*y[\"\^]*s)|d[\"\^]*(?:i[\"\^]*(?:s[\"\^]*k[\"\^]*(?:(?:m[\"\^]*g[\"\^]*m|p[\"\^]*a[\"\^]*r)[\"\^]*t|s[\"\^]*h[\"\^]*a[\"\^]*d[\"\^]*o[\"\^]*w)|r[\"\^]*(?:(?:[\s,;]|\.|/|<|>).*|u[\"\^]*s[\"\^]*e)|f[\"\^]*f[\"\^]*(?:[\s,;]|\.|/|<|>).*)|e[\"\^]*(?:l[\"\^]*(?:p[\"\^]*r[\"\^]*o[\"\^]*f|t[\"\^]*r[\"\^]*e[\"\^]*e|(?:[\s,;]|\.|/|<|>).*)|v[\"\^]*(?:m[\"\^]*g[\"\^]*m[\"\^]*t|c[\"\^]*o[\"\^]*n)|(?:f[\"\^]*r[\"\^]*a|b[\"\^]*u)[\"\^]*g)|s[\"\^]*(?:a[\"\^]*(?:c[\"\^]*l[\"\^]*s|d[\"\^]*d)|q[\"\^]*u[\"\^]*e[\"\^]*r[\"\^]*y|m[\"\^]*o[\"\^]*(?:v[\"\^]*e|d)|g[\"\^]*e[\"\^]*t|r[\"\^]*m)|(?:r[\"\^]*i[\"\^]*v[\"\^]*e[\"\^]*r[\"\^]*q[\"\^]*u[\"\^]*e[\"\^]*r|o[\"\^]*s[\"\^]*k[\"\^]*e)[\"\^]*y|(?:c[\"\^]*o[\"\^]*m[\"\^]*c[\"\^]*n[\"\^]*f|x[\"\^]*d[\"\^]*i[\"\^]*a)[\"\^]*g|a[\"\^]*t[\"\^]*e[\"\^]*(?:[\s,;]|\.|/|<|>).*|n[\"\^]*s[\"\^]*s[\"\^]*t[\"\^]*a[\"\^]*t)|c[\"\^]*(?:o[\"\^]*(?:m[\"\^]*(?:p[\"\^]*(?:(?:a[\"\^]*c[\"\^]*t[\"\^]*)?(?:[\s,;]|\.|/|<|>).*|m[\"\^]*g[\"\^]*m[\"\^]*t)|e[\"\^]*x[\"\^]*p)|n[\"\^]*(?:2[\"\^]*p|v[\"\^]*e)[\"\^]*r[\"\^]*t|p[\"\^]*y)|l[\"\^]*(?:e[\"\^]*a[\"\^]*(?:n[\"\^]*m[\"\^]*g[\"\^]*r|r[\"\^]*m[\"\^]*e[\"\^]*m)|u[\"\^]*s[\"\^]*t[\"\^]*e[\"\^]*r)|h[\"\^]*(?:k[\"\^]*(?:n[\"\^]*t[\"\^]*f[\"\^]*s|d[\"\^]*s[\"\^]*k)|d[\"\^]*i[\"\^]*r[\"\^]*(?:[\s,;]|\.|/|<|>).*)|s[\"\^]*(?:c[\"\^]*(?:r[\"\^]*i[\"\^]*p[\"\^]*t|c[\"\^]*m[\"\^]*d)|v[\"\^]*d[\"\^]*e)|e[\"\^]*r[\"\^]*t[\"\^]*(?:u[\"\^]*t[\"\^]*i[\"\^]*l|r[\"\^]*e[\"\^]*q)|a[\"\^]*(?:l[\"\^]*l[\"\^]*(?:[\s,;]|\.|/|<|>).*|c[\"\^]*l[\"\^]*s)|m[\"\^]*d(?:[\"\^]*k[\"\^]*e[\"\^]*y)?|i[\"\^]*p[\"\^]*h[\"\^]*e[\"\^]*r|u[\"\^]*r[\"\^]*l)|f[\"\^]*(?:o[\"\^]*r[\"\^]*(?:m[\"\^]*a[\"\^]*t[\"\^]*(?:[\s,;]|\.|/|<|>).*|f[\"\^]*i[\"\^]*l[\"\^]*e[\"\^]*s|e[\"\^]*a[\"\^]*c[\"\^]*h)|i[\"\^]*n[\"\^]*d[\"\^]*(?:(?:[\s,;]|\.|/|<|>).*|s[\"\^]*t[\"\^]*r)|s[\"\^]*(?:m[\"\^]*g[\"\^]*m[\"\^]*t|u[\"\^]*t[\"\^]*i[\"\^]*l)|t[\"\^]*(?:p[\"\^]*(?:[\s,;]|\.|/|<|>).*|y[\"\^]*p[\"\^]*e)|r[\"\^]*e[\"\^]*e[\"\^]*d[\"\^]*i[\"\^]*s[\"\^]*k|c[\"\^]*(?:[\s,;]|\.|/|<|>).*|g[\"\^]*r[\"\^]*e[\"\^]*p)|n[\"\^]*(?:e[\"\^]*t[\"\^]*(?:s[\"\^]*(?:t[\"\^]*a[\"\^]*t|v[\"\^]*c|h)|(?:[\s,;]|\.|/|<|>).*|c[\"\^]*a[\"\^]*t|d[\"\^]*o[\"\^]*m)|t[\"\^]*(?:b[\"\^]*a[\"\^]*c[\"\^]*k[\"\^]*u[\"\^]*p|r[\"\^]*i[\"\^]*g[\"\^]*h[\"\^]*t[\"\^]*s)|(?:s[\"\^]*l[\"\^]*o[\"\^]*o[\"\^]*k[\"\^]*u|m[\"\^]*a)[\"\^]*p|c[\"\^]*(?:(?:[\s,;]|\.|/|<|>).*|a[\"\^]*t)|b[\"\^]*t[\"\^]*s[\"\^]*t[\"\^]*a[\"\^]*t)|e[\"\^]*(?:x[\"\^]*(?:p[\"\^]*(?:a[\"\^]*n[\"\^]*d[\"\^]*(?:[\s,;]|\.|/|<|>).*|l[\"\^]*o[\"\^]*r[\"\^]*e[\"\^]*r)|i[\"\^]*t)|v[\"\^]*e[\"\^]*n[\"\^]*t[\"\^]*(?:c[\"\^]*r[\"\^]*e[\"\^]*a[\"\^]*t[\"\^]*e|v[\"\^]*w[\"\^]*r)|n[\"\^]*d[\"\^]*l[\"\^]*o[\"\^]*c[\"\^]*a[\"\^]*l|g[\"\^]*r[\"\^]*e[\"\^]*p|r[\"\^]*a[\"\^]*s[\"\^]*e|c[\"\^]*h[\"\^]*o)|g[\"\^]*(?:a[\"\^]*t[\"\^]*h[\"\^]*e[\"\^]*r[\"\^]*n[\"\^]*e[\"\^]*t[\"\^]*w[\"\^]*o[\"\^]*r[\"\^]*k[\"\^]*i[\"\^]*n[\"\^]*f[\"\^]*o|p[\"\^]*(?:(?:r[\"\^]*e[\"\^]*s[\"\^]*u[\"\^]*l|e[\"\^]*d[\"\^]*i)[\"\^]*t|u[\"\^]*p[\"\^]*d[\"\^]*a[\"\^]*t[\"\^]*e)|i[\"\^]*t[\"\^]*(?:[\s,;]|\.|/|<|>).*|e[\"\^]*t[\"\^]*m[\"\^]*a[\"\^]*c)|i[\"\^]*(?:r[\"\^]*b(?:[\"\^]*(?:1(?:[\"\^]*[89])?|2[\"\^]*[012]))?|f[\"\^]*m[\"\^]*e[\"\^]*m[\"\^]*b[\"\^]*e[\"\^]*r|p[\"\^]*c[\"\^]*o[\"\^]*n[\"\^]*f[\"\^]*i[\"\^]*g|n[\"\^]*e[\"\^]*t[\"\^]*c[\"\^]*p[\"\^]*l|c[\"\^]*a[\"\^]*c[\"\^]*l[\"\^]*s)|a[\"\^]*(?:d[\"\^]*(?:d[\"\^]*u[\"\^]*s[\"\^]*e[\"\^]*r[\"\^]*s|m[\"\^]*o[\"\^]*d[\"\^]*c[\"\^]*m[\"\^]*d)|r[\"\^]*p[\"\^]*(?:[\s,;]|\.|/|<|>).*|t[\"\^]*t[\"\^]*r[\"\^]*i[\"\^]*b|s[\"\^]*s[\"\^]*o[\"\^]*c|z[\"\^]*m[\"\^]*a[\"\^]*n)|l[\"\^]*(?:o[\"\^]*g[\"\^]*(?:e[\"\^]*v[\"\^]*e[\"\^]*n[\"\^]*t|t[\"\^]*i[\"\^]*m[\"\^]*e|m[\"\^]*a[\"\^]*n|o[\"\^]*f[\"\^]*f)|a[\"\^]*b[\"\^]*e[\"\^]*l[\"\^]*(?:[\s,;]|\.|/|<|>).*|u[\"\^]*s[\"\^]*r[\"\^]*m[\"\^]*g[\"\^]*r)|b[\"\^]*(?:(?:c[\"\^]*d[\"\^]*(?:b[\"\^]*o[\"\^]*o|e[\"\^]*d[\"\^]*i)|r[\"\^]*o[\"\^]*w[\"\^]*s[\"\^]*t[\"\^]*a)[\"\^]*t|i[\"\^]*t[\"\^]*s[\"\^]*a[\"\^]*d[\"\^]*m[\"\^]*i[\"\^]*n|o[\"\^]*o[\"\^]*t[\"\^]*c[\"\^]*f[\"\^]*g)|h[\"\^]*(?:o[\"\^]*s[\"\^]*t[\"\^]*n[\"\^]*a[\"\^]*m[\"\^]*e|d[\"\^]*w[\"\^]*w[\"\^]*i[\"\^]*z)|j[\"\^]*a[\"\^]*v[\"\^]*a[\"\^]*(?:[\s,;]|\.|/|<|>).*|7[\"\^]*z(?:[\"\^]*[ar])?)(?:\.[\"\^]*\w+)?\b" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 932115) Executing operator "Rx" with param "(?i)(?:;|\{|\||\|\||&|&&|\n|\r|`)\s*[\(,@\'\"\s]*(?:[\w'\"\./]+/|[\\\\'\"\^]*\w[\\\\'\"\^]*:.*\\\\|[\^\.\w '\"/\\\\]*\\\\)?[\"\^]*(?:s[\"\^]*(?:y[\"\^]*s[\"\^]*(?:t[\"\^]*e[\"\^]*m[\"\^]*(?:p[\"\^]*r[\"\^]*o[\"\^]*p[\"\^]*e[\"\^]*r[\"\^]*t[\"\^]*i[\"\^]*e[\"\^]*s[\"\^]*(?:d[\"\^]*a[\"\^]*t[\"\^]*a[\"\^]*e[\"\^]*x[\"\^]*e[\"\^]*c[\"\^]*u[\"\^]*t[\"\^]*i[\"\^]*o[\"\^]*n[\"\^]*p[\"\^]*r[\"\^]*e[\"\^]*v[\"\^]*e[\"\^]*n[\"\^]*t[\"\^]*i[\"\^]*o[\"\^]*n|(?:p[\"\^]*e[\"\^]*r[\"\^]*f[\"\^]*o[\"\^]*r[\"\^]*m[\"\^]*a[\"\^]*n[\"\^]*c|h[\"\^]*a[\"\^]*r[\"\^]*d[\"\^]*w[\"\^]*a[\"\^]*r)[\"\^]*e|a[\"\^]*d[\"\^]*v[\"\^]*a[\"\^]*n[\"\^]*c[\"\^]*e[\"\^]*d)|i[\"\^]*n[\"\^]*f[\"\^]*o)|k[\"\^]*e[\"\^]*y|d[\"\^]*m)|h[\"\^]*(?:o[\"\^]*(?:w[\"\^]*(?:g[\"\^]*r[\"\^]*p|m[\"\^]*b[\"\^]*r)[\"\^]*s|r[\"\^]*t[\"\^]*c[\"\^]*u[\"\^]*t)|e[\"\^]*l[\"\^]*l[\"\^]*r[\"\^]*u[\"\^]*n[\"\^]*a[\"\^]*s|u[\"\^]*t[\"\^]*d[\"\^]*o[\"\^]*w[\"\^]*n|r[\"\^]*p[\"\^]*u[\"\^]*b[\"\^]*w|a[\"\^]*r[\"\^]*e|i[\"\^]*f[\"\^]*t)|e[\"\^]*(?:t[\"\^]*(?:(?:x[\"\^]*)?(?:[\s,;]|\.|/|<|>).*|l[\"\^]*o[\"\^]*c[\"\^]*a[\"\^]*l)|c[\"\^]*p[\"\^]*o[\"\^]*l|l[\"\^]*e[\"\^]*c[\"\^]*t)|c[\"\^]*(?:h[\"\^]*t[\"\^]*a[\"\^]*s[\"\^]*k[\"\^]*s|l[\"\^]*i[\"\^]*s[\"\^]*t)|u[\"\^]*b[\"\^]*(?:i[\"\^]*n[\"\^]*a[\"\^]*c[\"\^]*l|s[\"\^]*t)|t[\"\^]*a[\"\^]*r[\"\^]*t[\"\^]*(?:[\s,;]|\.|/|<|>).*|i[\"\^]*g[\"\^]*v[\"\^]*e[\"\^]*r[\"\^]*i[\"\^]*f|l[\"\^]*(?:e[\"\^]*e[\"\^]*p|m[\"\^]*g[\"\^]*r)|o[\"\^]*r[\"\^]*t|f[\"\^]*c|v[\"\^]*n)|p[\"\^]*(?:s[\"\^]*(?:s[\"\^]*(?:h[\"\^]*u[\"\^]*t[\"\^]*d[\"\^]*o[\"\^]*w[\"\^]*n|e[\"\^]*r[\"\^]*v[\"\^]*i[\"\^]*c[\"\^]*e|u[\"\^]*s[\"\^]*p[\"\^]*e[\"\^]*n[\"\^]*d)|l[\"\^]*(?:o[\"\^]*g[\"\^]*(?:g[\"\^]*e[\"\^]*d[\"\^]*o[\"\^]*n|l[\"\^]*i[\"\^]*s[\"\^]*t)|i[\"\^]*s[\"\^]*t)|p[\"\^]*(?:a[\"\^]*s[\"\^]*s[\"\^]*w[\"\^]*d|i[\"\^]*n[\"\^]*g)|g[\"\^]*e[\"\^]*t[\"\^]*s[\"\^]*i[\"\^]*d|e[\"\^]*x[\"\^]*e[\"\^]*c|f[\"\^]*i[\"\^]*l[\"\^]*e|i[\"\^]*n[\"\^]*f[\"\^]*o|k[\"\^]*i[\"\^]*l[\"\^]*l)|o[\"\^]*(?:w[\"\^]*e[\"\^]*r[\"\^]*(?:s[\"\^]*h[\"\^]*e[\"\^]*l[\"\^]*l(?:[\"\^]*_[\"\^]*i[\"\^]*s[\"\^]*e)?|c[\"\^]*f[\"\^]*g)|r[\"\^]*t[\"\^]*q[\"\^]*r[\"\^]*y|p[\"\^]*d)|r[\"\^]*(?:i[\"\^]*n[\"\^]*t[\"\^]*(?:(?:[\s,;]|\.|/|<|>).*|b[\"\^]*r[\"\^]*m)|n[\"\^]*(?:c[\"\^]*n[\"\^]*f[\"\^]*g|m[\"\^]*n[\"\^]*g[\"\^]*r)|o[\"\^]*m[\"\^]*p[\"\^]*t)|a[\"\^]*t[\"\^]*h[\"\^]*(?:p[\"\^]*i[\"\^]*n[\"\^]*g|(?:[\s,;]|\.|/|<|>).*)|e[\"\^]*r[\"\^]*(?:l(?:[\"\^]*(?:s[\"\^]*h|5))?|f[\"\^]*m[\"\^]*o[\"\^]*n)|y[\"\^]*t[\"\^]*h[\"\^]*o[\"\^]*n(?:[\"\^]*(?:3(?:[\"\^]*m)?|2))?|k[\"\^]*g[\"\^]*m[\"\^]*g[\"\^]*r|h[\"\^]*p(?:[\"\^]*[57])?|u[\"\^]*s[\"\^]*h[\"\^]*d|i[\"\^]*n[\"\^]*g)|r[\"\^]*(?:e[\"\^]*(?:(?:p[\"\^]*l[\"\^]*a[\"\^]*c[\"\^]*e|n(?:[\"\^]*a[\"\^]*m[\"\^]*e)?|s[\"\^]*e[\"\^]*t)[\"\^]*(?:[\s,;]|\.|/|<|>).*|g[\"\^]*(?:s[\"\^]*v[\"\^]*r[\"\^]*3[\"\^]*2|e[\"\^]*d[\"\^]*i[\"\^]*t|(?:[\s,;]|\.|/|<|>).*|i[\"\^]*n[\"\^]*i)|c[\"\^]*(?:d[\"\^]*i[\"\^]*s[\"\^]*c|o[\"\^]*v[\"\^]*e[\"\^]*r)|k[\"\^]*e[\"\^]*y[\"\^]*w[\"\^]*i[\"\^]*z)|u[\"\^]*(?:n[\"\^]*(?:d[\"\^]*l[\"\^]*l[\"\^]*3[\"\^]*2|a[\"\^]*s)|b[\"\^]*y[\"\^]*(?:1(?:[\"\^]*[89])?|2[\"\^]*[012]))|a[\"\^]*(?:s[\"\^]*(?:p[\"\^]*h[\"\^]*o[\"\^]*n[\"\^]*e|d[\"\^]*i[\"\^]*a[\"\^]*l)|r[\"\^]*(?:[\s,;]|\.|/|<|>).*)|m[\"\^]*(?:(?:d[\"\^]*i[\"\^]*r[\"\^]*)?(?:[\s,;]|\.|/|<|>).*|t[\"\^]*s[\"\^]*h[\"\^]*a[\"\^]*r[\"\^]*e)|o[\"\^]*(?:u[\"\^]*t[\"\^]*e[\"\^]*(?:[\s,;]|\.|/|<|>).*|b[\"\^]*o[\"\^]*c[\"\^]*o[\"\^]*p[\"\^]*y)|s[\"\^]*(?:t[\"\^]*r[\"\^]*u[\"\^]*i|y[\"\^]*n[\"\^]*c)|d[\"\^]*(?:[\s,;]|\.|/|<|>).*)|t[\"\^]*(?:a[\"\^]*(?:s[\"\^]*k[\"\^]*(?:k[\"\^]*i[\"\^]*l[\"\^]*l|l[\"\^]*i[\"\^]*s[\"\^]*t|s[\"\^]*c[\"\^]*h[\"\^]*d|m[\"\^]*g[\"\^]*r)|k[\"\^]*e[\"\^]*o[\"\^]*w[\"\^]*n)|(?:i[\"\^]*m[\"\^]*e[\"\^]*o[\"\^]*u|p[\"\^]*m[\"\^]*i[\"\^]*n[\"\^]*i|e[\"\^]*l[\"\^]*n[\"\^]*e|l[\"\^]*i[\"\^]*s)[\"\^]*t|s[\"\^]*(?:d[\"\^]*i[\"\^]*s[\"\^]*c[\"\^]*o|s[\"\^]*h[\"\^]*u[\"\^]*t[\"\^]*d)[\"\^]*n|y[\"\^]*p[\"\^]*e[\"\^]*(?:p[\"\^]*e[\"\^]*r[\"\^]*f|(?:[\s,;]|\.|/|<|>).*)|r[\"\^]*(?:a[\"\^]*c[\"\^]*e[\"\^]*r[\"\^]*t|e[\"\^]*e))|w[\"\^]*(?:i[\"\^]*n[\"\^]*(?:d[\"\^]*i[\"\^]*f[\"\^]*f|m[\"\^]*s[\"\^]*d[\"\^]*p|v[\"\^]*a[\"\^]*r|r[\"\^]*[ms])|u[\"\^]*(?:a[\"\^]*(?:u[\"\^]*c[\"\^]*l[\"\^]*t|p[\"\^]*p)|s[\"\^]*a)|s[\"\^]*c[\"\^]*(?:r[\"\^]*i[\"\^]*p[\"\^]*t|u[\"\^]*i)|e[\"\^]*v[\"\^]*t[\"\^]*u[\"\^]*t[\"\^]*i[\"\^]*l|m[\"\^]*i[\"\^]*(?:m[\"\^]*g[\"\^]*m[\"\^]*t|c)|a[\"\^]*i[\"\^]*t[\"\^]*f[\"\^]*o[\"\^]*r|h[\"\^]*o[\"\^]*a[\"\^]*m[\"\^]*i|g[\"\^]*e[\"\^]*t)|u[\"\^]*(?:s[\"\^]*(?:e[\"\^]*r[\"\^]*a[\"\^]*c[\"\^]*c[\"\^]*o[\"\^]*u[\"\^]*n[\"\^]*t[\"\^]*c[\"\^]*o[\"\^]*n[\"\^]*t[\"\^]*r[\"\^]*o[\"\^]*l[\"\^]*s[\"\^]*e[\"\^]*t[\"\^]*t[\"\^]*i[\"\^]*n[\"\^]*g[\"\^]*s|r[\"\^]*s[\"\^]*t[\"\^]*a[\"\^]*t)|n[\"\^]*(?:r[\"\^]*a[\"\^]*r|z[\"\^]*i[\"\^]*p))|q[\"\^]*(?:u[\"\^]*e[\"\^]*r[\"\^]*y[\"\^]*(?:[\s,;]|\.|/|<|>).*|p[\"\^]*r[\"\^]*o[\"\^]*c[\"\^]*e[\"\^]*s[\"\^]*s|w[\"\^]*i[\"\^]*n[\"\^]*s[\"\^]*t[\"\^]*a|g[\"\^]*r[\"\^]*e[\"\^]*p)|o[\"\^]*(?:d[\"\^]*b[\"\^]*c[\"\^]*(?:a[\"\^]*d[\"\^]*3[\"\^]*2|c[\"\^]*o[\"\^]*n[\"\^]*f)|p[\"\^]*e[\"\^]*n[\"\^]*f[\"\^]*i[\"\^]*l[\"\^]*e[\"\^]*s)|v[\"\^]*(?:o[\"\^]*l[\"\^]*(?:[\s,;]|\.|/|<|>).*|e[\"\^]*r[\"\^]*i[\"\^]*f[\"\^]*y)|x[\"\^]*c[\"\^]*(?:a[\"\^]*c[\"\^]*l[\"\^]*s|o[\"\^]*p[\"\^]*y)|z[\"\^]*i[\"\^]*p[\"\^]*(?:[\s,;]|\.|/|<|>).*)(?:\.[\"\^]*\w+)?\b" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 932120) Executing operator "PmFromFile" with param "windows-powershell-commands.data" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] T (1) t:cmdLine: "d"
[9] T (2) t:lowercase: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:urlDecodeUni: "b"
[9] T (1) t:cmdLine: "b"
[9] T (2) t:lowercase: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 932130) Executing operator "Rx" with param "(?:\$(?:\((?:\(.*\)|.*)\)|\{.*\})|[<>]\(.*\))" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] T (1) t:cmdLine: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:urlDecodeUni: "b"
[9] T (1) t:cmdLine: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 932140) Executing operator "Rx" with param "\b(?:if(?:/i)?(?: not)?(?: exist\b| defined\b| errorlevel\b| cmdextversion\b|(?: |\().*(?:\bgeq\b|\bequ\b|\bneq\b|\bleq\b|\bgtr\b|\blss\b|==))|for(/[dflr].*)* %+[^ ]+ in\(.*\)\s?do)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] T (1) t:cmdLine: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:urlDecodeUni: "b"
[9] T (1) t:cmdLine: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 932150) Executing operator "Rx" with param "(?:^|=)\s*(?:{|\s*\(\s*|\w+=(?:[^\s]*|\$.*|\$.*|<.*|>.*|\'.*\'|\".*\")\s+|!\s*|\$)*\s*(?:'|\")*(?:[\?\*\[\]\(\)\-\|+\w'\"\./\\\\]+/)?[\\\\'\"]*(?:l[\\\\'\"]*(?:s(?:[\\\\'\"]*(?:b[\\\\'\"]*_[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*l[\\\\'\"]*e[\\\\'\"]*a[\\\\'\"]*s[\\\\'\"]*e|c[\\\\'\"]*p[\\\\'\"]*u|m[\\\\'\"]*o[\\\\'\"]*d|p[\\\\'\"]*c[\\\\'\"]*i|u[\\\\'\"]*s[\\\\'\"]*b|-[\\\\'\"]*F|o[\\\\'\"]*f))?|z[\\\\'\"]*(?:(?:[ef][\\\\'\"]*)?g[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*p|c[\\\\'\"]*(?:a[\\\\'\"]*t|m[\\\\'\"]*p)|m[\\\\'\"]*(?:o[\\\\'\"]*r[\\\\'\"]*e|a)|d[\\\\'\"]*i[\\\\'\"]*f[\\\\'\"]*f|l[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*s)|e[\\\\'\"]*s[\\\\'\"]*s[\\\\'\"]*(?:(?:f[\\\\'\"]*i[\\\\'\"]*l|p[\\\\'\"]*i[\\\\'\"]*p)[\\\\'\"]*e|e[\\\\'\"]*c[\\\\'\"]*h[\\\\'\"]*o)|a[\\\\'\"]*s[\\\\'\"]*t[\\\\'\"]*(?:l[\\\\'\"]*o[\\\\'\"]*g(?:[\\\\'\"]*i[\\\\'\"]*n)?|c[\\\\'\"]*o[\\\\'\"]*m[\\\\'\"]*m)|w[\\\\'\"]*p(?:[\\\\'\"]*-[\\\\'\"]*d[\\\\'\"]*o[\\\\'\"]*w[\\\\'\"]*n[\\\\'\"]*l[\\\\'\"]*o[\\\\'\"]*a[\\\\'\"]*d)?|f[\\\\'\"]*t[\\\\'\"]*p(?:[\\\\'\"]*g[\\\\'\"]*e[\\\\'\"]*t)?|y[\\\\'\"]*n[\\\\'\"]*x)|s[\\\\'\"]*(?:e[\\\\'\"]*(?:t[\\\\'\"]*(?:e[\\\\'\"]*n[\\\\'\"]*v|s[\\\\'\"]*i[\\\\'\"]*d)|n[\\\\'\"]*d[\\\\'\"]*m[\\\\'\"]*a[\\\\'\"]*i[\\\\'\"]*l|d)|h(?:[\\\\'\"]*\.[\\\\'\"]*d[\\\\'\"]*i[\\\\'\"]*s[\\\\'\"]*t[\\\\'\"]*r[\\\\'\"]*i[\\\\'\"]*b)?|o[\\\\'\"]*(?:u[\\\\'\"]*r[\\\\'\"]*c[\\\\'\"]*e|c[\\\\'\"]*a[\\\\'\"]*t)|t[\\\\'\"]*r[\\\\'\"]*i[\\\\'\"]*n[\\\\'\"]*g[\\\\'\"]*s|y[\\\\'\"]*s[\\\\'\"]*c[\\\\'\"]*t[\\\\'\"]*l|c[\\\\'\"]*(?:h[\\\\'\"]*e[\\\\'\"]*d|p)|d[\\\\'\"]*i[\\\\'\"]*f[\\\\'\"]*f|f[\\\\'\"]*t[\\\\'\"]*p|u[\\\\'\"]*d[\\\\'\"]*o|s[\\\\'\"]*h|v[\\\\'\"]*n)|p[\\\\'\"]*(?:t[\\\\'\"]*a[\\\\'\"]*r(?:[\\\\'\"]*(?:d[\\\\'\"]*i[\\\\'\"]*f[\\\\'\"]*f|g[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*p))?|y[\\\\'\"]*t[\\\\'\"]*h[\\\\'\"]*o[\\\\'\"]*n(?:[\\\\'\"]*(?:3(?:[\\\\'\"]*m)?|2))?|k[\\\\'\"]*(?:e[\\\\'\"]*x[\\\\'\"]*e[\\\\'\"]*c|i[\\\\'\"]*l[\\\\'\"]*l)|r[\\\\'\"]*i[\\\\'\"]*n[\\\\'\"]*t[\\\\'\"]*e[\\\\'\"]*n[\\\\'\"]*v|(?:g[\\\\'\"]*r[\\\\'\"]*e|f[\\\\'\"]*t)[\\\\'\"]*p|e[\\\\'\"]*r[\\\\'\"]*l(?:[\\\\'\"]*5)?|h[\\\\'\"]*p(?:[\\\\'\"]*[57])?|i[\\\\'\"]*n[\\\\'\"]*g)|n[\\\\'\"]*(?:c(?:[\\\\'\"]*(?:\.[\\\\'\"]*(?:t[\\\\'\"]*r[\\\\'\"]*a[\\\\'\"]*d[\\\\'\"]*i[\\\\'\"]*t[\\\\'\"]*i[\\\\'\"]*o[\\\\'\"]*n[\\\\'\"]*a[\\\\'\"]*l|o[\\\\'\"]*p[\\\\'\"]*e[\\\\'\"]*n[\\\\'\"]*b[\\\\'\"]*s[\\\\'\"]*d)|a[\\\\'\"]*t))?|e[\\\\'\"]*t[\\\\'\"]*(?:k[\\\\'\"]*i[\\\\'\"]*t[\\\\'\"]*-[\\\\'\"]*f[\\\\'\"]*t[\\\\'\"]*p|(?:s[\\\\'\"]*t|c)[\\\\'\"]*a[\\\\'\"]*t)|o[\\\\'\"]*h[\\\\'\"]*u[\\\\'\"]*p|p[\\\\'\"]*i[\\\\'\"]*n[\\\\'\"]*g|s[\\\\'\"]*t[\\\\'\"]*a[\\\\'\"]*t)|t[\\\\'\"]*(?:c[\\\\'\"]*(?:p[\\\\'\"]*(?:t[\\\\'\"]*r[\\\\'\"]*a[\\\\'\"]*c[\\\\'\"]*e[\\\\'\"]*r[\\\\'\"]*o[\\\\'\"]*u[\\\\'\"]*t[\\\\'\"]*e|i[\\\\'\"]*n[\\\\'\"]*g)|s[\\\\'\"]*h)|r[\\\\'\"]*a[\\\\'\"]*c[\\\\'\"]*e[\\\\'\"]*r[\\\\'\"]*o[\\\\'\"]*u[\\\\'\"]*t[\\\\'\"]*e(?:[\\\\'\"]*6)?|i[\\\\'\"]*m[\\\\'\"]*e(?:[\\\\'\"]*o[\\\\'\"]*u[\\\\'\"]*t)?|a[\\\\'\"]*(?:i[\\\\'\"]*l(?:[\\\\'\"]*f)?|r)|e[\\\\'\"]*l[\\\\'\"]*n[\\\\'\"]*e[\\\\'\"]*t)|r[\\\\'\"]*(?:e[\\\\'\"]*(?:p[\\\\'\"]*(?:l[\\\\'\"]*a[\\\\'\"]*c[\\\\'\"]*e|e[\\\\'\"]*a[\\\\'\"]*t)|a[\\\\'\"]*l[\\\\'\"]*p[\\\\'\"]*a[\\\\'\"]*t[\\\\'\"]*h|n[\\\\'\"]*a[\\\\'\"]*m[\\\\'\"]*e)|u[\\\\'\"]*b[\\\\'\"]*y(?:[\\\\'\"]*(?:1(?:[\\\\'\"]*[89])?|2[\\\\'\"]*[012]))?|m[\\\\'\"]*(?:u[\\\\'\"]*s[\\\\'\"]*e|d[\\\\'\"]*i)[\\\\'\"]*r|n[\\\\'\"]*a[\\\\'\"]*n[\\\\'\"]*o|s[\\\\'\"]*y[\\\\'\"]*n[\\\\'\"]*c|c[\\\\'\"]*p)|b[\\\\'\"]*(?:z[\\\\'\"]*(?:(?:[ef][\\\\'\"]*)?g[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*p|d[\\\\'\"]*i[\\\\'\"]*f[\\\\'\"]*f|l[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*s|m[\\\\'\"]*o[\\\\'\"]*r[\\\\'\"]*e|c[\\\\'\"]*a[\\\\'\"]*t)|s[\\\\'\"]*d[\\\\'\"]*(?:c[\\\\'\"]*a[\\\\'\"]*t|i[\\\\'\"]*f[\\\\'\"]*f|t[\\\\'\"]*a[\\\\'\"]*r)|u[\\\\'\"]*i[\\\\'\"]*l[\\\\'\"]*t[\\\\'\"]*i[\\\\'\"]*n|a[\\\\'\"]*s[\\\\'\"]*h)|m[\\\\'\"]*(?:y[\\\\'\"]*s[\\\\'\"]*q[\\\\'\"]*l[\\\\'\"]*(?:d[\\\\'\"]*u[\\\\'\"]*m[\\\\'\"]*p(?:[\\\\'\"]*s[\\\\'\"]*l[\\\\'\"]*o[\\\\'\"]*w)?|h[\\\\'\"]*o[\\\\'\"]*t[\\\\'\"]*c[\\\\'\"]*o[\\\\'\"]*p[\\\\'\"]*y|a[\\\\'\"]*d[\\\\'\"]*m[\\\\'\"]*i[\\\\'\"]*n|s[\\\\'\"]*h[\\\\'\"]*o[\\\\'\"]*w)|l[\\\\'\"]*o[\\\\'\"]*c[\\\\'\"]*a[\\\\'\"]*t[\\\\'\"]*e|a[\\\\'\"]*i[\\\\'\"]*l[\\\\'\"]*q)|u[\\\\'\"]*(?:n[\\\\'\"]*(?:c[\\\\'\"]*o[\\\\'\"]*m[\\\\'\"]*p[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*s|l[\\\\'\"]*z[\\\\'\"]*m[\\\\'\"]*a|a[\\\\'\"]*m[\\\\'\"]*e|r[\\\\'\"]*a[\\\\'\"]*r|s[\\\\'\"]*e[\\\\'\"]*t|z[\\\\'\"]*i[\\\\'\"]*p|x[\\\\'\"]*z)|s[\\\\'\"]*e[\\\\'\"]*r[\\\\'\"]*(?:(?:a[\\\\'\"]*d|m[\\\\'\"]*o)[\\\\'\"]*d|d[\\\\'\"]*e[\\\\'\"]*l))|x[\\\\'\"]*(?:z(?:[\\\\'\"]*(?:(?:[ef][\\\\'\"]*)?g[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*p|d[\\\\'\"]*(?:i[\\\\'\"]*f[\\\\'\"]*f|e[\\\\'\"]*c)|c[\\\\'\"]*(?:a[\\\\'\"]*t|m[\\\\'\"]*p)|l[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*s|m[\\\\'\"]*o[\\\\'\"]*r[\\\\'\"]*e))?|a[\\\\'\"]*r[\\\\'\"]*g[\\\\'\"]*s)|z[\\\\'\"]*(?:(?:(?:[ef][\\\\'\"]*)?g[\\\\'\"]*r[\\\\'\"]*e|i)[\\\\'\"]*p|c[\\\\'\"]*(?:a[\\\\'\"]*t|m[\\\\'\"]*p)|d[\\\\'\"]*i[\\\\'\"]*f[\\\\'\"]*f|l[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*s|m[\\\\'\"]*o[\\\\'\"]*r[\\\\'\"]*e|r[\\\\'\"]*u[\\\\'\"]*n|s[\\\\'\"]*h)|f[\\\\'\"]*(?:t[\\\\'\"]*p[\\\\'\"]*(?:s[\\\\'\"]*t[\\\\'\"]*a[\\\\'\"]*t[\\\\'\"]*s|w[\\\\'\"]*h[\\\\'\"]*o)|i[\\\\'\"]*l[\\\\'\"]*e[\\\\'\"]*t[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*t|e[\\\\'\"]*t[\\\\'\"]*c[\\\\'\"]*h|g[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*p)|c[\\\\'\"]*(?:o[\\\\'\"]*(?:m[\\\\'\"]*m[\\\\'\"]*a[\\\\'\"]*n[\\\\'\"]*d|p[\\\\'\"]*r[\\\\'\"]*o[\\\\'\"]*c)|u[\\\\'\"]*r[\\\\'\"]*l|s[\\\\'\"]*h|c)|e[\\\\'\"]*(?:g[\\\\'\"]*r[\\\\'\"]*e[\\\\'\"]*p|c[\\\\'\"]*h[\\\\'\"]*o|v[\\\\'\"]*a[\\\\'\"]*l|x[\\\\'\"]*e[\\\\'\"]*c|n[\\\\'\"]*v)|d[\\\\'\"]*(?:m[\\\\'\"]*e[\\\\'\"]*s[\\\\'\"]*g|a[\\\\'\"]*s[\\\\'\"]*h|i[\\\\'\"]*f[\\\\'\"]*f|o[\\\\'\"]*a[\\\\'\"]*s)|g[\\\\'\"]*(?:z[\\\\'\"]*(?:c[\\\\'\"]*a[\\\\'\"]*t|i[\\\\'\"]*p)|r[\\\\'\"]*e[\\\\'\"]*p|c[\\\\'\"]*c)|w[\\\\'\"]*(?:h[\\\\'\"]*o[\\\\'\"]*a[\\\\'\"]*m[\\\\'\"]*i|g[\\\\'\"]*e[\\\\'\"]*t|3[\\\\'\"]*m)|j[\\\\'\"]*(?:o[\\\\'\"]*b[\\\\'\"]*s[\\\\'\"]*\s[\\\\'\"]*-[\\\\'\"]*x|a[\\\\'\"]*v[\\\\'\"]*a)|i[\\\\'\"]*r[\\\\'\"]*b(?:[\\\\'\"]*(?:1(?:[\\\\'\"]*[89])?|2[\\\\'\"]*[012]))?|o[\\\\'\"]*n[\\\\'\"]*i[\\\\'\"]*n[\\\\'\"]*t[\\\\'\"]*r|h[\\\\'\"]*(?:e[\\\\'\"]*a[\\\\'\"]*d|u[\\\\'\"]*p)|v[\\\\'\"]*i[\\\\'\"]*(?:g[\\\\'\"]*r|p[\\\\'\"]*w)|G[\\\\'\"]*E[\\\\'\"]*T)[\\\\'\"]*(?:\s|;|\||&|<|>)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 932160) Executing operator "PmFromFile" with param "unix-shell.data" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] T (1) t:cmdLine: "d"
[9] T (2) t:normalizePath: "d"
[9] T (3) t:lowercase: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:urlDecodeUni: "b"
[9] T (1) t:cmdLine: "b"
[9] T (2) t:normalizePath: "b"
[9] T (3) t:lowercase: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 932170) Executing operator "Rx" with param "^\(\s*\)\s+{" against REQUEST_HEADERS|REQUEST_LINE.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecode: "localhost"
[9] Target value: "localhost" (Variable: REQUEST_HEADERS:Host)
[9] T (0) t:urlDecode: "curl/7.52.1"
[9] Target value: "curl/7.52.1" (Variable: REQUEST_HEADERS:User-Agent)
[9] T (0) t:urlDecode: "*/*"
[9] Target value: "*/*" (Variable: REQUEST_HEADERS:Accept)
[9] T (0) t:urlDecode: "3"
[9] Target value: "3" (Variable: REQUEST_HEADERS:Content-Length)
[9] T (0) t:urlDecode: "application/x-www-form-urlencoded"
[9] Target value: "application/x-www-form-urlencoded" (Variable: REQUEST_HEADERS:Content-Type)
[9] T (0) t:urlDecode: "POST /modsec-full/ HTTP/1.1"
[9] Target value: "POST /modsec-full/ HTTP/1.1" (Variable: REQUEST_LINE)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 932171) Executing operator "Rx" with param "^\(\s*\)\s+{" against ARGS_NAMES|ARGS|FILES_NAMES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:urlDecode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 932014) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-932-APPLICATION-ATTACK-RCE
[9] Skipped rule id '932016' due to a SecMarker: END-REQUEST-932-APPLICATION-ATTACK-RCE
[9] Rule:
[9] Skipped rule id '932018' due to a SecMarker: END-REQUEST-932-APPLICATION-ATTACK-RCE
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-932-APPLICATION-ATTACK-RCE
[9] Rule: END-REQUEST-932-APPLICATION-ATTACK-RCE
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 933012) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 933100) Executing operator "Rx" with param "(?:<\?(?!xml\s)|<\?php|\[(?:/|\\\\)?php\])" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] T (1) t:lowercase: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:urlDecodeUni: "b"
[9] T (1) t:lowercase: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 933110) Executing operator "Rx" with param ".*\.(?:php\d*|phtml)\.*$" against FILES|REQUEST_HEADERS:X-Filename|REQUEST_HEADERS:X_Filename|REQUEST_HEADERS:X-File-Name.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 933120) Executing operator "PmFromFile" with param "php-config-directives.data" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] T (1) t:normalisePath: "d"
[9] T (2) t:lowercase: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:urlDecodeUni: "b"
[9] T (1) t:normalisePath: "b"
[9] T (2) t:lowercase: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 933130) Executing operator "PmFromFile" with param "php-variables.data" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:normalisePath: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:lowercase: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:normalisePath: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:lowercase: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 933140) Executing operator "Rx" with param "(?i)php://(std(in|out|err)|(in|out)put|fd|memory|temp|filter)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 933150) Executing operator "PmFromFile" with param "php-function-names-933150.data" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|REQUEST_FILENAME|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:lowercase: "/modsec-full/"
[9] Target value: "/modsec-full/" (Variable: REQUEST_FILENAME)
[9] T (0) t:lowercase: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:lowercase: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 933160) Executing operator "Rx" with param "(?i)\b(?:s(?:e(?:t(?:_(?:e(?:xception|rror)_handler|magic_quotes_runtime|include_path)|defaultstub)|ssion_s(?:et_save_handler|tart))|qlite_(?:(?:(?:unbuffered|single|array)_)?query|create_(?:aggregate|function)|p?open|exec)|tr(?:eam_(?:context_create|socket_client)|ipc?slashes|rev)|implexml_load_(?:string|file)|ocket_c(?:onnect|reate)|h(?:ow_sourc|a1_fil)e|pl_autoload_register|ystem)|p(?:r(?:eg_(?:replace(?:_callback(?:_array)?)?|match(?:_all)?|split)|oc_(?:(?:terminat|clos|nic)e|get_status|open)|int_r)|o(?:six_(?:get(?:(?:e[gu]|g)id|login|pwnam)|mk(?:fifo|nod)|ttyname|kill)|pen)|hp(?:_(?:strip_whitespac|unam)e|version|info)|g_(?:(?:execut|prepar)e|connect|query)|a(?:rse_(?:ini_file|str)|ssthru)|utenv)|r(?:unkit_(?:function_(?:re(?:defin|nam)e|copy|add)|method_(?:re(?:defin|nam)e|copy|add)|constant_(?:redefine|add))|e(?:(?:gister_(?:shutdown|tick)|name)_function|ad(?:(?:gz)?file|_exif_data|dir))|awurl(?:de|en)code)|i(?:mage(?:createfrom(?:(?:jpe|pn)g|x[bp]m|wbmp|gif)|(?:jpe|pn)g|g(?:d2?|if)|2?wbmp|xbm)|s_(?:(?:(?:execut|write?|read)ab|fi)le|dir)|ni_(?:get(?:_all)?|set)|terator_apply|ptcembed)|g(?:et(?:_(?:c(?:urrent_use|fg_va)r|meta_tags)|my(?:[gpu]id|inode)|(?:lastmo|cw)d|imagesize|env)|z(?:(?:(?:defla|wri)t|encod|fil)e|compress|open|read)|lob)|a(?:rray_(?:u(?:intersect(?:_u?assoc)?|diff(?:_u?assoc)?)|intersect_u(?:assoc|key)|diff_u(?:assoc|key)|filter|reduce|map)|ssert(?:_options)?)|h(?:tml(?:specialchars(?:_decode)?|_entity_decode|entities)|(?:ash(?:_(?:update|hmac))?|ighlight)_file|e(?:ader_register_callback|x2bin))|f(?:i(?:le(?:(?:[acm]tim|inod)e|(?:_exist|perm)s|group)?|nfo_open)|tp_(?:nb_(?:ge|pu)|connec|ge|pu)t|(?:unction_exis|pu)ts|write|open)|o(?:b_(?:get_(?:c(?:ontents|lean)|flush)|end_(?:clean|flush)|clean|flush|start)|dbc_(?:result(?:_all)?|exec(?:ute)?|connect)|pendir)|m(?:b_(?:ereg(?:_(?:replace(?:_callback)?|match)|i(?:_replace)?)?|parse_str)|(?:ove_uploaded|d5)_file|ethod_exists|ysql_query|kdir)|e(?:x(?:if_(?:t(?:humbnail|agname)|imagetype|read_data)|ec)|scapeshell(?:arg|cmd)|rror_reporting|val)|c(?:url_(?:file_create|exec|init)|onvert_uuencode|reate_function|hr)|u(?:n(?:serialize|pack)|rl(?:de|en)code|[ak]?sort)|(?:json_(?:de|en)cod|debug_backtrac|tmpfil)e|b(?:(?:son_(?:de|en)|ase64_en)code|zopen)|var_dump)(?:\s|/\*.*\*/|//.*|#.*)*\(.*\)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|REQUEST_FILENAME|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "/modsec-full/" (Variable: REQUEST_FILENAME)
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 933170) Executing operator "Rx" with param "[oOcC]:\d+:\".+?\":\d+:{.*}" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|REQUEST_HEADERS|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "localhost" (Variable: REQUEST_HEADERS:Host)
[9] Target value: "curl/7.52.1" (Variable: REQUEST_HEADERS:User-Agent)
[9] Target value: "*/*" (Variable: REQUEST_HEADERS:Accept)
[9] Target value: "3" (Variable: REQUEST_HEADERS:Content-Length)
[9] Target value: "application/x-www-form-urlencoded" (Variable: REQUEST_HEADERS:Content-Type)
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 933180) Executing operator "Rx" with param "\$+(?:[a-zA-Z_\x7f-\xff][a-zA-Z0-9_\x7f-\xff]*|\s*{.+})(?:\s|\[.+\]|{.+}|/\*.*\*/|//.*|#.*)*\(.*\)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|REQUEST_FILENAME|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "/modsec-full/" (Variable: REQUEST_FILENAME)
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 933014) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-933-APPLICATION-ATTACK-PHP
[9] Skipped rule id '933151' due to a SecMarker: END-REQUEST-933-APPLICATION-ATTACK-PHP
[9] Rule:
[9] Skipped rule id '933016' due to a SecMarker: END-REQUEST-933-APPLICATION-ATTACK-PHP
[9] Rule:
[9] Skipped rule id '933131' due to a SecMarker: END-REQUEST-933-APPLICATION-ATTACK-PHP
[9] Rule:
[9] Skipped rule id '933161' due to a SecMarker: END-REQUEST-933-APPLICATION-ATTACK-PHP
[9] Rule:
[9] Skipped rule id '933111' due to a SecMarker: END-REQUEST-933-APPLICATION-ATTACK-PHP
[9] Rule:
[9] Skipped rule id '933018' due to a SecMarker: END-REQUEST-933-APPLICATION-ATTACK-PHP
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-933-APPLICATION-ATTACK-PHP
[9] Rule: END-REQUEST-933-APPLICATION-ATTACK-PHP
[4] Out of a SecMarker after skip 7.000000 rules.
[4] (Rule: 941012) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941100) Executing operator "DetectXSS" with param "" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|REQUEST_HEADERS:User-Agent|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "curl/7.52.1"
[9] T (1) t:urlDecodeUni: "curl/7.52.1"
[9] T (2) t:htmlEntityDecode: "curl/7.52.1"
[9] T (3) t:jsDecode: "curl/7.52.1"
[9] T (4) t:cssDecode: "curl/7.52.1"
[9] T (5) t:removeNulls: "curl/7.52.1"
[9] Target value: "curl/7.52.1" (Variable: REQUEST_HEADERS:User-Agent)
[9] libinjection was not able to find any XSS in: curl/7.52.1
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:htmlEntityDecode: "d"
[9] T (3) t:jsDecode: "d"
[9] T (4) t:cssDecode: "d"
[9] T (5) t:removeNulls: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] libinjection was not able to find any XSS in: d
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:htmlEntityDecode: "b"
[9] T (3) t:jsDecode: "b"
[9] T (4) t:cssDecode: "b"
[9] T (5) t:removeNulls: "b"
[9] Target value: "b" (Variable: ARGS:d)
[9] libinjection was not able to find any XSS in: b
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941110) Executing operator "Rx" with param "(?i)([<Ôºú]script[^>Ôºû]*[>Ôºû][\s\S]*?)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|REQUEST_HEADERS:User-Agent|REQUEST_HEADERS:Referer|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "curl/7.52.1"
[9] T (1) t:urlDecodeUni: "curl/7.52.1"
[9] T (2) t:htmlEntityDecode: "curl/7.52.1"
[9] T (3) t:jsDecode: "curl/7.52.1"
[9] T (4) t:cssDecode: "curl/7.52.1"
[9] T (5) t:removeNulls: "curl/7.52.1"
[9] Target value: "curl/7.52.1" (Variable: REQUEST_HEADERS:User-Agent)
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:htmlEntityDecode: "d"
[9] T (3) t:jsDecode: "d"
[9] T (4) t:cssDecode: "d"
[9] T (5) t:removeNulls: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:htmlEntityDecode: "b"
[9] T (3) t:jsDecode: "b"
[9] T (4) t:cssDecode: "b"
[9] T (5) t:removeNulls: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941120) Executing operator "Rx" with param "(?i)([\s\"'`;\/0-9\=\x0B\x09\x0C\x3B\x2C\x28\x3B]+on[a-zA-Z]+[\s\x0B\x09\x0C\x3B\x2C\x28\x3B]*?=)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|REQUEST_HEADERS:User-Agent|REQUEST_HEADERS:Referer|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "curl/7.52.1"
[9] T (1) t:urlDecodeUni: "curl/7.52.1"
[9] T (2) t:htmlEntityDecode: "curl/7.52.1"
[9] T (3) t:jsDecode: "curl/7.52.1"
[9] T (4) t:cssDecode: "curl/7.52.1"
[9] T (5) t:removeNulls: "curl/7.52.1"
[9] Target value: "curl/7.52.1" (Variable: REQUEST_HEADERS:User-Agent)
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:htmlEntityDecode: "d"
[9] T (3) t:jsDecode: "d"
[9] T (4) t:cssDecode: "d"
[9] T (5) t:removeNulls: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:htmlEntityDecode: "b"
[9] T (3) t:jsDecode: "b"
[9] T (4) t:cssDecode: "b"
[9] T (5) t:removeNulls: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941130) Executing operator "Rx" with param "(?i)[\s\S](?:x(?:link:href|html|mlns)|!ENTITY.*?SYSTEM|data:text\/html|pattern(?=.*?=)|formaction|\@import|base64)\b" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|REQUEST_HEADERS:User-Agent|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "curl/7.52.1"
[9] T (1) t:urlDecodeUni: "curl/7.52.1"
[9] T (2) t:htmlEntityDecode: "curl/7.52.1"
[9] T (3) t:jsDecode: "curl/7.52.1"
[9] T (4) t:cssDecode: "curl/7.52.1"
[9] T (5) t:removeNulls: "curl/7.52.1"
[9] Target value: "curl/7.52.1" (Variable: REQUEST_HEADERS:User-Agent)
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:htmlEntityDecode: "d"
[9] T (3) t:jsDecode: "d"
[9] T (4) t:cssDecode: "d"
[9] T (5) t:removeNulls: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:htmlEntityDecode: "b"
[9] T (3) t:jsDecode: "b"
[9] T (4) t:cssDecode: "b"
[9] T (5) t:removeNulls: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941140) Executing operator "Rx" with param "(?i)(?:<(?:(?:apple|objec)t|isindex|embed|style|form|meta)\b[^>]*?>[\s\S]*?|(?:=|U\s*?R\s*?L\s*?\()\s*?[^>]*?\s*?S\s*?C\s*?R\s*?I\s*?P\s*?T\s*?:)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|REQUEST_HEADERS:User-Agent|REQUEST_HEADERS:Referer|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "curl/7.52.1"
[9] T (1) t:urlDecodeUni: "curl/7.52.1"
[9] T (2) t:htmlEntityDecode: "curl/7.52.1"
[9] T (3) t:jsDecode: "curl/7.52.1"
[9] T (4) t:cssDecode: "curl/7.52.1"
[9] T (5) t:removeNulls: "curl/7.52.1"
[9] Target value: "curl/7.52.1" (Variable: REQUEST_HEADERS:User-Agent)
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:htmlEntityDecode: "d"
[9] T (3) t:jsDecode: "d"
[9] T (4) t:cssDecode: "d"
[9] T (5) t:removeNulls: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:htmlEntityDecode: "b"
[9] T (3) t:jsDecode: "b"
[9] T (4) t:cssDecode: "b"
[9] T (5) t:removeNulls: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941160) Executing operator "Rx" with param "(?i)<[^\w<>]*(?:[^<>\"'\s]*:)?[^\w<>]*(?:\W*?s\W*?c\W*?r\W*?i\W*?p\W*?t|\W*?f\W*?o\W*?r\W*?m|\W*?s\W*?t\W*?y\W*?l\W*?e|\W*?s\W*?v\W*?g|\W*?m\W*?a\W*?r\W*?q\W*?u\W*?e\W*?e|(?:\W*?l\W*?i\W*?n\W*?k|\W*?o\W*?b\W*?j\W*?e\W*?c\W*?t|\W*?e\W*?m\W*?b\W*?e\W*?d|\W*?a\W*?p\W*?p\W*?l\W*?e\W*?t|\W*?p\W*?a\W*?r\W*?a\W*?m|\W*?i?\W*?f\W*?r\W*?a\W*?m\W*?e|\W*?b\W*?a\W*?s\W*?e|\W*?b\W*?o\W*?d\W*?y|\W*?m\W*?e\W*?t\W*?a|\W*?i\W*?m\W*?a?\W*?g\W*?e?|\W*?v\W*?i\W*?d\W*?e\W*?o|\W*?a\W*?u\W*?d\W*?i\W*?o|\W*?b\W*?i\W*?n\W*?d\W*?i\W*?n\W*?g\W*?s|\W*?s\W*?e\W*?t|\W*?a\W*?n\W*?i\W*?m\W*?a\W*?t\W*?e)[^>\w])|(?:<\w[\s\S]*[\s\/]|['\"](?:[\s\S]*[\s\/])?)(?:formaction|style|background|src|lowsrc|ping|on(?:d(?:e(?:vice(?:(?:orienta|mo)tion|proximity|found|light)|livery(?:success|error)|activate)|r(?:ag(?:e(?:n(?:ter|d)|xit)|(?:gestur|leav)e|start|drop|over)?|op)|i(?:s(?:c(?:hargingtimechange|onnect(?:ing|ed))|abled)|aling)|ata(?:setc(?:omplete|hanged)|(?:availabl|chang)e|error)|urationchange|ownloading|blclick)|Moz(?:M(?:agnifyGesture(?:Update|Start)?|ouse(?:PixelScroll|Hittest))|S(?:wipeGesture(?:Update|Start|End)?|crolledAreaChanged)|(?:(?:Press)?TapGestur|BeforeResiz)e|EdgeUI(?:C(?:omplet|ancel)|Start)ed|RotateGesture(?:Update|Start)?|A(?:udioAvailable|fterPaint))|c(?:o(?:m(?:p(?:osition(?:update|start|end)|lete)|mand(?:update)?)|n(?:t(?:rolselect|extmenu)|nect(?:ing|ed))|py)|a(?:(?:llschang|ch)ed|nplay(?:through)?|rdstatechange)|h(?:(?:arging(?:time)?ch)?ange|ecking)|(?:fstate|ell)change|u(?:echange|t)|l(?:ick|ose))|m(?:o(?:z(?:pointerlock(?:change|error)|(?:orientation|time)change|fullscreen(?:change|error)|network(?:down|up)load)|use(?:(?:lea|mo)ve|o(?:ver|ut)|enter|wheel|down|up)|ve(?:start|end)?)|essage|ark)|s(?:t(?:a(?:t(?:uschanged|echange)|lled|rt)|k(?:sessione|comma)nd|op)|e(?:ek(?:complete|ing|ed)|(?:lec(?:tstar)?)?t|n(?:ding|t))|u(?:ccess|spend|bmit)|peech(?:start|end)|ound(?:start|end)|croll|how)|b(?:e(?:for(?:e(?:(?:scriptexecu|activa)te|u(?:nload|pdate)|p(?:aste|rint)|c(?:opy|ut)|editfocus)|deactivate)|gin(?:Event)?)|oun(?:dary|ce)|l(?:ocked|ur)|roadcast|usy)|a(?:n(?:imation(?:iteration|start|end)|tennastatechange)|fter(?:(?:scriptexecu|upda)te|print)|udio(?:process|start|end)|d(?:apteradded|dtrack)|ctivate|lerting|bort)|DOM(?:Node(?:Inserted(?:IntoDocument)?|Removed(?:FromDocument)?)|(?:CharacterData|Subtree)Modified|A(?:ttrModified|ctivate)|Focus(?:Out|In)|MouseScroll)|r(?:e(?:s(?:u(?:m(?:ing|e)|lt)|ize|et)|adystatechange|pea(?:tEven)?t|movetrack|trieving|ceived)|ow(?:s(?:inserted|delete)|e(?:nter|xit))|atechange)|p(?:op(?:up(?:hid(?:den|ing)|show(?:ing|n))|state)|a(?:ge(?:hide|show)|(?:st|us)e|int)|ro(?:pertychange|gress)|lay(?:ing)?)|t(?:ouch(?:(?:lea|mo)ve|en(?:ter|d)|cancel|start)|ime(?:update|out)|ransitionend|ext)|u(?:s(?:erproximity|sdreceived)|p(?:gradeneeded|dateready)|n(?:derflow|load))|f(?:o(?:rm(?:change|input)|cus(?:out|in)?)|i(?:lterchange|nish)|ailed)|l(?:o(?:ad(?:e(?:d(?:meta)?data|nd)|start)?|secapture)|evelchange|y)|g(?:amepad(?:(?:dis)?connected|button(?:down|up)|axismove)|et)|e(?:n(?:d(?:Event|ed)?|abled|ter)|rror(?:update)?|mptied|xit)|i(?:cc(?:cardlockerror|infochange)|n(?:coming|valid|put))|o(?:(?:(?:ff|n)lin|bsolet)e|verflow(?:changed)?|pen)|SVG(?:(?:Unl|L)oad|Resize|Scroll|Abort|Error|Zoom)|h(?:e(?:adphoneschange|l[dp])|ashchange|olding)|v(?:o(?:lum|ic)e|ersion)change|w(?:a(?:it|rn)ing|heel)|key(?:press|down|up)|(?:AppComman|Loa)d|no(?:update|match)|Request|zoom))[\s\x08]*?=" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|REQUEST_HEADERS:User-Agent|REQUEST_HEADERS:Referer|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "curl/7.52.1"
[9] T (1) t:urlDecodeUni: "curl/7.52.1"
[9] T (2) t:htmlEntityDecode: "curl/7.52.1"
[9] T (3) t:jsDecode: "curl/7.52.1"
[9] T (4) t:cssDecode: "curl/7.52.1"
[9] T (5) t:removeNulls: "curl/7.52.1"
[9] Target value: "curl/7.52.1" (Variable: REQUEST_HEADERS:User-Agent)
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:htmlEntityDecode: "d"
[9] T (3) t:jsDecode: "d"
[9] T (4) t:cssDecode: "d"
[9] T (5) t:removeNulls: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:htmlEntityDecode: "b"
[9] T (3) t:jsDecode: "b"
[9] T (4) t:cssDecode: "b"
[9] T (5) t:removeNulls: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941170) Executing operator "Rx" with param "(?i)(?:\W|^)(?:javascript:(?:[\s\S]+[=\\\(\[\.<]|[\s\S]*?(?:\bname\b|\\[ux]\d))|data:(?:(?:[a-z]\w+\/\w[\w+-]+\w)?[;,]|[\s\S]*?;[\s\S]*?\b(?:base64|charset=)|[\s\S]*?,[\s\S]*?<[\s\S]*?\w[\s\S]*?>))|@\W*?i\W*?m\W*?p\W*?o\W*?r\W*?t\W*?(?:\/\*[\s\S]*?)?(?:[\"']|\W*?u\W*?r\W*?l[\s\S]*?\()|\W*?-\W*?m\W*?o\W*?z\W*?-\W*?b\W*?i\W*?n\W*?d\W*?i\W*?n\W*?g[\s\S]*?:[\s\S]*?\W*?u\W*?r\W*?l[\s\S]*?\(" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|REQUEST_HEADERS:User-Agent|REQUEST_HEADERS:Referer|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "curl/7.52.1"
[9] T (1) t:urlDecodeUni: "curl/7.52.1"
[9] T (2) t:htmlEntityDecode: "curl/7.52.1"
[9] T (3) t:jsDecode: "curl/7.52.1"
[9] T (4) t:cssDecode: "curl/7.52.1"
[9] T (5) t:removeNulls: "curl/7.52.1"
[9] Target value: "curl/7.52.1" (Variable: REQUEST_HEADERS:User-Agent)
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:htmlEntityDecode: "d"
[9] T (3) t:jsDecode: "d"
[9] T (4) t:cssDecode: "d"
[9] T (5) t:removeNulls: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:htmlEntityDecode: "b"
[9] T (3) t:jsDecode: "b"
[9] T (4) t:cssDecode: "b"
[9] T (5) t:removeNulls: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941180) Executing operator "Pm" with param "document.cookie document.write .parentnode .innerhtml window.location -moz-binding <!-- --> <![cdata[" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:htmlEntityDecode: "d"
[9] T (3) t:jsDecode: "d"
[9] T (4) t:cssDecode: "d"
[9] T (5) t:lowercase: "d"
[9] T (6) t:removeNulls: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:htmlEntityDecode: "b"
[9] T (3) t:jsDecode: "b"
[9] T (4) t:cssDecode: "b"
[9] T (5) t:lowercase: "b"
[9] T (6) t:removeNulls: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941190) Executing operator "Rx" with param "(?i:<style.*?>.*?((@[i\\\\])|(([:=]|(&#x?0*((58)|(3A)|(61)|(3D));?)).*?([(\\\\]|(&#x?0*((40)|(28)|(92)|(5C));?)))))" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:htmlEntityDecode: "d"
[9] T (3) t:jsDecode: "d"
[9] T (4) t:cssDecode: "d"
[9] T (5) t:removeNulls: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:htmlEntityDecode: "b"
[9] T (3) t:jsDecode: "b"
[9] T (4) t:cssDecode: "b"
[9] T (5) t:removeNulls: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941200) Executing operator "Rx" with param "(?i:<.*[:]?vmlframe.*?[\s/+]*?src[\s/+]*=)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:htmlEntityDecode: "d"
[9] T (3) t:jsDecode: "d"
[9] T (4) t:cssDecode: "d"
[9] T (5) t:removeNulls: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:htmlEntityDecode: "b"
[9] T (3) t:jsDecode: "b"
[9] T (4) t:cssDecode: "b"
[9] T (5) t:removeNulls: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941210) Executing operator "Rx" with param "(?i:(j|(&#x?0*((74)|(4A)|(106)|(6A));?))([\t]|(&((#x?0*(9|(13)|(10)|A|D);?)|(tab;)|(newline;))))*(a|(&#x?0*((65)|(41)|(97)|(61));?))([\t]|(&((#x?0*(9|(13)|(10)|A|D);?)|(tab;)|(newline;))))*(v|(&#x?0*((86)|(56)|(118)|(76));?))([\t]|(&((#x?0*(9|(13)|(10)|A|D);?)|(tab;)|(newline;))))*(a|(&#x?0*((65)|(41)|(97)|(61));?))([\t]|(&((#x?0*(9|(13)|(10)|A|D);?)|(tab;)|(newline;))))*(s|(&#x?0*((83)|(53)|(115)|(73));?))([\t]|(&((#x?0*(9|(13)|(10)|A|D);?)|(tab;)|(newline;))))*(c|(&#x?0*((67)|(43)|(99)|(63));?))([\t]|(&((#x?0*(9|(13)|(10)|A|D);?)|(tab;)|(newline;))))*(r|(&#x?0*((82)|(52)|(114)|(72));?))([\t]|(&((#x?0*(9|(13)|(10)|A|D);?)|(tab;)|(newline;))))*(i|(&#x?0*((73)|(49)|(105)|(69));?))([\t]|(&((#x?0*(9|(13)|(10)|A|D);?)|(tab;)|(newline;))))*(p|(&#x?0*((80)|(50)|(112)|(70));?))([\t]|(&((#x?0*(9|(13)|(10)|A|D);?)|(tab;)|(newline;))))*(t|(&#x?0*((84)|(54)|(116)|(74));?))([\t]|(&((#x?0*(9|(13)|(10)|A|D);?)|(tab;)|(newline;))))*(:|(&((#x?0*((58)|(3A));?)|(colon;)))).)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:htmlEntityDecode: "d"
[9] T (3) t:jsDecode: "d"
[9] T (4) t:cssDecode: "d"
[9] T (5) t:removeNulls: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:htmlEntityDecode: "b"
[9] T (3) t:jsDecode: "b"
[9] T (4) t:cssDecode: "b"
[9] T (5) t:removeNulls: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941220) Executing operator "Rx" with param "(?i:(v|(&#x?0*((86)|(56)|(118)|(76));?))([\t]|(&((#x?0*(9|(13)|(10)|A|D);?)|(tab;)|(newline;))))*(b|(&#x?0*((66)|(42)|(98)|(62));?))([\t]|(&((#x?0*(9|(13)|(10)|A|D);?)|(tab;)|(newline;))))*(s|(&#x?0*((83)|(53)|(115)|(73));?))([\t]|(&((#x?0*(9|(13)|(10)|A|D);?)|(tab;)|(newline;))))*(c|(&#x?0*((67)|(43)|(99)|(63));?))([\t]|(&((#x?0*(9|(13)|(10)|A|D);?)|(tab;)|(newline;))))*(r|(&#x?0*((82)|(52)|(114)|(72));?))([\t]|(&((#x?0*(9|(13)|(10)|A|D);?)|(tab;)|(newline;))))*(i|(&#x?0*((73)|(49)|(105)|(69));?))([\t]|(&((#x?0*(9|(13)|(10)|A|D);?)|(tab;)|(newline;))))*(p|(&#x?0*((80)|(50)|(112)|(70));?))([\t]|(&((#x?0*(9|(13)|(10)|A|D);?)|(tab;)|(newline;))))*(t|(&#x?0*((84)|(54)|(116)|(74));?))([\t]|(&((#x?0*(9|(13)|(10)|A|D);?)|(tab;)|(newline;))))*(:|(&((#x?0*((58)|(3A));?)|(colon;)))).)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:htmlEntityDecode: "d"
[9] T (3) t:jsDecode: "d"
[9] T (4) t:cssDecode: "d"
[9] T (5) t:removeNulls: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:htmlEntityDecode: "b"
[9] T (3) t:jsDecode: "b"
[9] T (4) t:cssDecode: "b"
[9] T (5) t:removeNulls: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941230) Executing operator "Rx" with param "(?i:<EMBED[\s/+].*?((src)|(type)).*?=)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:htmlEntityDecode: "d"
[9] T (3) t:jsDecode: "d"
[9] T (4) t:cssDecode: "d"
[9] T (5) t:removeNulls: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:htmlEntityDecode: "b"
[9] T (3) t:jsDecode: "b"
[9] T (4) t:cssDecode: "b"
[9] T (5) t:removeNulls: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941240) Executing operator "Rx" with param "<[?]?import[\s\/+\S]*?implementation[\s\/+]*?=" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:htmlEntityDecode: "d"
[9] T (3) t:jsDecode: "d"
[9] T (4) t:cssDecode: "d"
[9] T (5) t:lowercase: "d"
[9] T (6) t:removeNulls: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:htmlEntityDecode: "b"
[9] T (3) t:jsDecode: "b"
[9] T (4) t:cssDecode: "b"
[9] T (5) t:lowercase: "b"
[9] T (6) t:removeNulls: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941250) Executing operator "Rx" with param "(?i:<META[\s/+].*?http-equiv[\s/+]*=[\s/+]*[\"\'`]?(((c|(&#x?0*((67)|(43)|(99)|(63));?)))|((r|(&#x?0*((82)|(52)|(114)|(72));?)))|((s|(&#x?0*((83)|(53)|(115)|(73));?)))))" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:htmlEntityDecode: "d"
[9] T (3) t:jsDecode: "d"
[9] T (4) t:cssDecode: "d"
[9] T (5) t:removeNulls: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:htmlEntityDecode: "b"
[9] T (3) t:jsDecode: "b"
[9] T (4) t:cssDecode: "b"
[9] T (5) t:removeNulls: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941260) Executing operator "Rx" with param "(?i:<META[\s/+].*?charset[\s/+]*=)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:htmlEntityDecode: "d"
[9] T (3) t:jsDecode: "d"
[9] T (4) t:cssDecode: "d"
[9] T (5) t:removeNulls: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:htmlEntityDecode: "b"
[9] T (3) t:jsDecode: "b"
[9] T (4) t:cssDecode: "b"
[9] T (5) t:removeNulls: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941270) Executing operator "Rx" with param "(?i:<LINK[\s/+].*?href[\s/+]*=)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:htmlEntityDecode: "d"
[9] T (3) t:jsDecode: "d"
[9] T (4) t:cssDecode: "d"
[9] T (5) t:removeNulls: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:htmlEntityDecode: "b"
[9] T (3) t:jsDecode: "b"
[9] T (4) t:cssDecode: "b"
[9] T (5) t:removeNulls: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941280) Executing operator "Rx" with param "(?i:<BASE[\s/+].*?href[\s/+]*=)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:htmlEntityDecode: "d"
[9] T (3) t:jsDecode: "d"
[9] T (4) t:cssDecode: "d"
[9] T (5) t:removeNulls: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:htmlEntityDecode: "b"
[9] T (3) t:jsDecode: "b"
[9] T (4) t:cssDecode: "b"
[9] T (5) t:removeNulls: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941290) Executing operator "Rx" with param "(?i:<APPLET[\s/+>])" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:htmlEntityDecode: "d"
[9] T (3) t:jsDecode: "d"
[9] T (4) t:cssDecode: "d"
[9] T (5) t:removeNulls: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:htmlEntityDecode: "b"
[9] T (3) t:jsDecode: "b"
[9] T (4) t:cssDecode: "b"
[9] T (5) t:removeNulls: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941300) Executing operator "Rx" with param "(?i:<OBJECT[\s/+].*?((type)|(codetype)|(classid)|(code)|(data))[\s/+]*=)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:htmlEntityDecode: "d"
[9] T (3) t:jsDecode: "d"
[9] T (4) t:cssDecode: "d"
[9] T (5) t:removeNulls: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:htmlEntityDecode: "b"
[9] T (3) t:jsDecode: "b"
[9] T (4) t:cssDecode: "b"
[9] T (5) t:removeNulls: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941310) Executing operator "Rx" with param "(?:¾|¼).*(?:¾|¼|>)|(?:¾|¼|<).*(?:¾|¼)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] T (1) t:lowercase: "d"
[9] T (2) t:urlDecode: "d"
[9] T (3) t:htmlEntityDecode: "d"
[9] T (4) t:jsDecode: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:urlDecodeUni: "b"
[9] T (1) t:lowercase: "b"
[9] T (2) t:urlDecode: "b"
[9] T (3) t:htmlEntityDecode: "b"
[9] T (4) t:jsDecode: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941350) Executing operator "Rx" with param "(?:\+ADw\-|\+AD4\-).*(?:\+ADw\-|\+AD4\-|>)|(?:\+ADw\-|\+AD4\-|<).*(?:\+ADw\-|\+AD4\-)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] T (1) t:lowercase: "d"
[9] T (2) t:urlDecode: "d"
[9] T (3) t:htmlEntityDecode: "d"
[9] T (4) t:jsDecode: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:urlDecodeUni: "b"
[9] T (1) t:lowercase: "b"
[9] T (2) t:urlDecode: "b"
[9] T (3) t:htmlEntityDecode: "b"
[9] T (4) t:jsDecode: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 941014) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-941-APPLICATION-ATTACK-XSS
[9] Skipped rule id '941101' due to a SecMarker: END-REQUEST-941-APPLICATION-ATTACK-XSS
[9] Rule:
[9] Skipped rule id '941150' due to a SecMarker: END-REQUEST-941-APPLICATION-ATTACK-XSS
[9] Rule:
[9] Skipped rule id '941320' due to a SecMarker: END-REQUEST-941-APPLICATION-ATTACK-XSS
[9] Rule:
[9] Skipped rule id '941330' due to a SecMarker: END-REQUEST-941-APPLICATION-ATTACK-XSS
[9] Rule:
[9] Skipped rule id '941340' due to a SecMarker: END-REQUEST-941-APPLICATION-ATTACK-XSS
[9] Rule:
[9] Skipped rule id '941016' due to a SecMarker: END-REQUEST-941-APPLICATION-ATTACK-XSS
[9] Rule:
[9] Skipped rule id '941018' due to a SecMarker: END-REQUEST-941-APPLICATION-ATTACK-XSS
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-941-APPLICATION-ATTACK-XSS
[9] Rule: END-REQUEST-941-APPLICATION-ATTACK-XSS
[4] Out of a SecMarker after skip 8.000000 rules.
[4] (Rule: 942012) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 942100) Executing operator "DetectSQLi" with param "" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|REQUEST_HEADERS:User-Agent|REQUEST_HEADERS:Referer|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:utf8toUnicode: "curl/7.52.1"
[9] T (1) t:urlDecodeUni: "curl/7.52.1"
[9] T (2) t:removeNulls: "curl/7.52.1"
[9] T (3) t:removeComments: "curl/7.52.1"
[9] Target value: "curl/7.52.1" (Variable: REQUEST_HEADERS:User-Agent)
[9] detected SQLi: not able to find an inject on 'curl/7.52.1'
[9] T (0) t:utf8toUnicode: "d"
[9] T (1) t:urlDecodeUni: "d"
[9] T (2) t:removeNulls: "d"
[9] T (3) t:removeComments: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] detected SQLi: not able to find an inject on 'd'
[9] T (0) t:utf8toUnicode: "b"
[9] T (1) t:urlDecodeUni: "b"
[9] T (2) t:removeNulls: "b"
[9] T (3) t:removeComments: "b"
[9] Target value: "b" (Variable: ARGS:d)
[9] detected SQLi: not able to find an inject on 'b'
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 942140) Executing operator "Rx" with param "(?i:\b(?:m(?:s(?:ysaccessobjects|ysaces|ysobjects|ysqueries|ysrelationships|ysaccessstorage|ysaccessxml|ysmodules|ysmodules2|db)|aster\.\.sysdatabases|ysql\.db)\b|s(?:ys(?:\.database_name|aux)\b|chema(?:\W*\(|_name\b)|qlite(_temp)?_master\b)|d(?:atabas|b_nam)e\W*\(|information_schema\b|pg_(catalog|toast)\b|northwind\b|tempdb\b))" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:urlDecodeUni: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 942160) Executing operator "Rx" with param "(?i:(sleep\((\s*?)(\d*?)(\s*?)\)|benchmark\((.*?)\,(.*?)\)))" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:urlDecodeUni: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 942170) Executing operator "Rx" with param "(?i:(?:(select|;)\s+(?:benchmark|if|sleep)\s*?\(\s*?\(?\s*?\w+))" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:urlDecodeUni: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 942190) Executing operator "Rx" with param "(?i:(?:\s*?(?:exec|execute).*?(?:\W)xp_cmdshell)|(?:[\"'`]\s*?!\s*?[\"'`\w])|(?:from\W+information_schema\W)|(?:(?:(?:current_)?user|database|schema|connection_id)\s*?\([^\)]*?)|(?:[\"'`];?\s*?(?:select|union|having)\b\s*?[^\s])|(?:\wiif\s*?\()|(?:(?:exec|execute)\s+master\.)|(?:union select @)|(?:union[\w(\s]*?select)|(?:select.*?\w?user\()|(?:into[\s+]+(?:dump|out)file\s*?[\"'`]))" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:urlDecodeUni: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 942220) Executing operator "Rx" with param "(?i:(?:^(-0000023456|4294967295|4294967296|2147483648|2147483647|0000012345|-2147483648|-2147483649|0000023456|3.0.00738585072007e-308|1e309)$))" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:urlDecodeUni: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 942230) Executing operator "Rx" with param "(?i:(?:[\s()]case\s*?\()|(?:\)\s*?like\s*?\()|(?:having\s*?[^\s]+\s*?[^\w\s])|(?:if\s?\([\d\w]\s*?[=<>~]))" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:urlDecodeUni: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 942240) Executing operator "Rx" with param "(?i:(?:alter\s*?\w+.*?(?:character|char)\s+set\s+\w+)|([\"'`];*?\s*?waitfor\s+(?:time|delay)\s+[\"'`])|(?:[\"'`];.*?:\s*?goto))" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:urlDecodeUni: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 942250) Executing operator "Rx" with param "(?i:(?:merge.*?using\s*?\()|(execute\s*?immediate\s*?[\"'`])|(?:match\s*?[\w(),+-]+\s*?against\s*?\())" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:urlDecodeUni: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 942270) Executing operator "Rx" with param "(?i:(?:(union(.*?)select(.*?)from)))" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:urlDecodeUni: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 942280) Executing operator "Rx" with param "(?i:(?:select\s*?pg_sleep)|(?:waitfor\s*?delay\s?[\"'`]+\s?\d)|(?:;\s*?shutdown\s*?(?:;|--|#|\/\*|{)))" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:urlDecodeUni: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 942290) Executing operator "Rx" with param "(?i:(?:\[\$(?:ne|eq|lte?|gte?|n?in|mod|all|size|exists|type|slice|x?or|div|like|between|and)\]))" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:urlDecodeUni: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 942320) Executing operator "Rx" with param "(?i:(?:procedure\s+analyse\s*?\()|(?:;\s*?(declare|open)\s+[\w-]+)|(?:create\s+(procedure|function)\s*?\w+\s*?\(\s*?\)\s*?-)|(?:declare[^\w]+[@#]\s*?\w+)|(exec\s*?\(\s*?@))" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:urlDecodeUni: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 942350) Executing operator "Rx" with param "(?i:(?:create\s+function\s+.+\s+returns)|(?:;\s*?(?:select|create|rename|truncate|load|alter|delete|update|insert|desc)\s*?[\[(]?\w{2,}))" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:urlDecodeUni: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 942360) Executing operator "Rx" with param "(?i:(?:[\d\W]\s+as\s*?[\"'`\w]+\s*?from)|(?:^[\W\d]+\s*?(?:union|select|create|rename|truncate|load|alter|delete|update|insert|desc)\b)|(?:(?:select|create|rename|truncate|load|alter|delete|update|insert|desc)\s+(?:(?:group_)concat|char|load_file)\s?\(?)|(?:end\s*?\);)|([\"'`]\s+regexp\W)|(?:[\s(]load_file\s*?\())" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:urlDecodeUni: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 942014) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Skipped rule id '942110' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942120' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942130' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942150' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942180' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942200' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942210' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942260' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942300' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942310' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942330' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942340' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942370' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942380' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942390' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942400' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942410' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942430' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942440' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942450' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942016' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942251' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942420' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942431' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942460' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942018' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942421' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '942432' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[9] Rule: END-REQUEST-942-APPLICATION-ATTACK-SQLI
[4] Out of a SecMarker after skip 29.000000 rules.
[4] (Rule: 943012) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 943100) Executing operator "Rx" with param "(?i)(?:\.cookie\b.*?;\W*?(?:expires|domain)\W*?=|\bhttp-equiv\W+set-cookie\b)" against REQUEST_COOKIES|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*, except for: REQUEST_COOKIES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[9] T (0) t:urlDecodeUni: "b"
[9] Target value: "b" (Variable: ARGS:d)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 943110) Executing operator "Rx" with param "^(jsessionid|aspsessionid|asp.net_sessionid|phpsession|phpsessid|weblogicsession|session_id|session-id|cfid|cftoken|cfsid|jservsession|jwsession)$" against ARGS_NAMES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] T (1) t:lowercase: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 943120) Executing operator "Rx" with param "^(jsessionid|aspsessionid|asp.net_sessionid|phpsession|phpsessid|weblogicsession|session_id|session-id|cfid|cftoken|cfsid|jservsession|jwsession)$" against ARGS_NAMES.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:urlDecodeUni: "d"
[9] T (1) t:lowercase: "d"
[9] Target value: "d" (Variable: ARGS_NAMES)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 943014) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION
[9] Skipped rule id '943016' due to a SecMarker: END-REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION
[9] Rule:
[9] Skipped rule id '943018' due to a SecMarker: END-REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION
[9] Rule: END-REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 949100) Executing operator "Eq" with param "1" against IP.
[6] Resolving: ip.reput_block_reason to: NULL
[4] Rule returned 0.
[9] Matched vars cleaned.
[6] Resolving: tx.inbound_anomaly_score_threshold to: 5
[4] (Rule: 949110) Executing operator "Ge" with param "5" Was: "%{tx.inbound_anomaly_score_threshold}" against TX:ANOMALY_SCORE.
[6] Resolving: TX.ANOMALY_SCORE to: 0
[9] Target value: "0" (Variable: TX:ANOMALY_SCORE)
[6] Resolving: tx.inbound_anomaly_score_threshold to: 5
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 949012) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 949014) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-REQUEST-949-BLOCKING-EVALUATION
[9] Skipped rule id '949016' due to a SecMarker: END-REQUEST-949-BLOCKING-EVALUATION
[9] Rule:
[9] Skipped rule id '949018' due to a SecMarker: END-REQUEST-949-BLOCKING-EVALUATION
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-REQUEST-949-BLOCKING-EVALUATION
[9] Rule: END-REQUEST-949-BLOCKING-EVALUATION
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 980012) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 980014) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-RESPONSE-980-CORRELATION
[9] Skipped rule id '980016' due to a SecMarker: END-RESPONSE-980-CORRELATION
[9] Rule:
[9] Skipped rule id '980018' due to a SecMarker: END-RESPONSE-980-CORRELATION
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-RESPONSE-980-CORRELATION
[9] Rule: END-RESPONSE-980-CORRELATION
[4] Out of a SecMarker after skip 3.000000 rules.
[4] Starting phase RESPONSE_HEADERS. (SecRules 3)
[9] This phase consists of 56 rule(s).
[4] (Rule: 950020) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 950013) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-RESPONSE-950-DATA-LEAKAGES
[9] Skipped rule id '950015' due to a SecMarker: END-RESPONSE-950-DATA-LEAKAGES
[9] Rule:
[9] Skipped rule id '950017' due to a SecMarker: END-RESPONSE-950-DATA-LEAKAGES
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-RESPONSE-950-DATA-LEAKAGES
[9] Rule: END-RESPONSE-950-DATA-LEAKAGES
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 951011) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 951013) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-RESPONSE-951-DATA-LEAKAGES-SQL
[9] Skipped rule id '951015' due to a SecMarker: END-RESPONSE-951-DATA-LEAKAGES-SQL
[9] Rule:
[9] Skipped rule id '951017' due to a SecMarker: END-RESPONSE-951-DATA-LEAKAGES-SQL
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-RESPONSE-951-DATA-LEAKAGES-SQL
[9] Rule: END-RESPONSE-951-DATA-LEAKAGES-SQL
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 952011) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 952013) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-RESPONSE-952-DATA-LEAKAGES-JAVA
[9] Skipped rule id '952015' due to a SecMarker: END-RESPONSE-952-DATA-LEAKAGES-JAVA
[9] Rule:
[9] Skipped rule id '952017' due to a SecMarker: END-RESPONSE-952-DATA-LEAKAGES-JAVA
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-RESPONSE-952-DATA-LEAKAGES-JAVA
[9] Rule: END-RESPONSE-952-DATA-LEAKAGES-JAVA
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 953011) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 953013) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-RESPONSE-953-DATA-LEAKAGES-PHP
[9] Skipped rule id '953015' due to a SecMarker: END-RESPONSE-953-DATA-LEAKAGES-PHP
[9] Rule:
[9] Skipped rule id '953017' due to a SecMarker: END-RESPONSE-953-DATA-LEAKAGES-PHP
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-RESPONSE-953-DATA-LEAKAGES-PHP
[9] Rule: END-RESPONSE-953-DATA-LEAKAGES-PHP
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 954011) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 954013) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-RESPONSE-954-DATA-LEAKAGES-IIS
[9] Skipped rule id '954015' due to a SecMarker: END-RESPONSE-954-DATA-LEAKAGES-IIS
[9] Rule:
[9] Skipped rule id '954017' due to a SecMarker: END-RESPONSE-954-DATA-LEAKAGES-IIS
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-RESPONSE-954-DATA-LEAKAGES-IIS
[9] Rule: END-RESPONSE-954-DATA-LEAKAGES-IIS
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 959011) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 959013) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-RESPONSE-959-BLOCKING-EVALUATION
[9] Skipped rule id '959015' due to a SecMarker: END-RESPONSE-959-BLOCKING-EVALUATION
[9] Rule:
[9] Skipped rule id '959017' due to a SecMarker: END-RESPONSE-959-BLOCKING-EVALUATION
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-RESPONSE-959-BLOCKING-EVALUATION
[9] Rule: END-RESPONSE-959-BLOCKING-EVALUATION
[4] Out of a SecMarker after skip 3.000000 rules.
[9] Appending response body: 0 bytes. Limit set to: 524288.000000
[4] Starting phase RESPONSE_BODY. (SecRules 4)
[9] This phase consists of 85 rule(s).
[4] (Rule: 950021) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 950130) Executing operator "Rx" with param "(?:<(?:TITLE>Index of.*?<H|title>Index of.*?<h)1>Index of|>\[To Parent Directory\]<\/[Aa]><br>)" against RESPONSE_BODY.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "" (Variable: RESPONSE_BODY)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 950014) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-RESPONSE-950-DATA-LEAKAGES
[9] Skipped rule id '950100' due to a SecMarker: END-RESPONSE-950-DATA-LEAKAGES
[9] Rule:
[9] Skipped rule id '950016' due to a SecMarker: END-RESPONSE-950-DATA-LEAKAGES
[9] Rule:
[9] Skipped rule id '950022' due to a SecMarker: END-RESPONSE-950-DATA-LEAKAGES
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-RESPONSE-950-DATA-LEAKAGES
[9] Rule: END-RESPONSE-950-DATA-LEAKAGES
[4] Out of a SecMarker after skip 4.000000 rules.
[4] (Rule: 951012) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 951100) Executing operator "PmFromFile" with param "sql-errors.data" against RESPONSE_BODY.
[9] Target value: "" (Variable: RESPONSE_BODY)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 951110) Executing operator "Eq" with param "1" against TX:sql_error_match.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "0" (Variable: TX:sql_error_match)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 951120) Executing operator "Eq" with param "1" against TX:sql_error_match.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "0" (Variable: TX:sql_error_match)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 951130) Executing operator "Eq" with param "1" against TX:sql_error_match.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "0" (Variable: TX:sql_error_match)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 951140) Executing operator "Eq" with param "1" against TX:sql_error_match.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "0" (Variable: TX:sql_error_match)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 951150) Executing operator "Eq" with param "1" against TX:sql_error_match.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "0" (Variable: TX:sql_error_match)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 951160) Executing operator "Eq" with param "1" against TX:sql_error_match.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "0" (Variable: TX:sql_error_match)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 951170) Executing operator "Eq" with param "1" against TX:sql_error_match.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "0" (Variable: TX:sql_error_match)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 951180) Executing operator "Eq" with param "1" against TX:sql_error_match.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "0" (Variable: TX:sql_error_match)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 951190) Executing operator "Eq" with param "1" against TX:sql_error_match.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "0" (Variable: TX:sql_error_match)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 951200) Executing operator "Eq" with param "1" against TX:sql_error_match.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "0" (Variable: TX:sql_error_match)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 951210) Executing operator "Eq" with param "1" against TX:sql_error_match.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "0" (Variable: TX:sql_error_match)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 951220) Executing operator "Eq" with param "1" against TX:sql_error_match.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "0" (Variable: TX:sql_error_match)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 951230) Executing operator "Eq" with param "1" against TX:sql_error_match.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "0" (Variable: TX:sql_error_match)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 951240) Executing operator "Eq" with param "1" against TX:sql_error_match.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "0" (Variable: TX:sql_error_match)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 951250) Executing operator "Eq" with param "1" against TX:sql_error_match.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "0" (Variable: TX:sql_error_match)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 951260) Executing operator "Eq" with param "1" against TX:sql_error_match.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "0" (Variable: TX:sql_error_match)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 951014) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-RESPONSE-951-DATA-LEAKAGES-SQL
[9] Skipped rule id '951016' due to a SecMarker: END-RESPONSE-951-DATA-LEAKAGES-SQL
[9] Rule:
[9] Skipped rule id '951018' due to a SecMarker: END-RESPONSE-951-DATA-LEAKAGES-SQL
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-RESPONSE-951-DATA-LEAKAGES-SQL
[9] Rule: END-RESPONSE-951-DATA-LEAKAGES-SQL
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 952012) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 952100) Executing operator "PmFromFile" with param "java-code-leakages.data" against RESPONSE_BODY.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "" (Variable: RESPONSE_BODY)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 952110) Executing operator "PmFromFile" with param "java-errors.data" against RESPONSE_BODY.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "" (Variable: RESPONSE_BODY)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 952014) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-RESPONSE-952-DATA-LEAKAGES-JAVA
[9] Skipped rule id '952016' due to a SecMarker: END-RESPONSE-952-DATA-LEAKAGES-JAVA
[9] Rule:
[9] Skipped rule id '952018' due to a SecMarker: END-RESPONSE-952-DATA-LEAKAGES-JAVA
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-RESPONSE-952-DATA-LEAKAGES-JAVA
[9] Rule: END-RESPONSE-952-DATA-LEAKAGES-JAVA
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 953012) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 953100) Executing operator "PmFromFile" with param "php-errors.data" against RESPONSE_BODY.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "" (Variable: RESPONSE_BODY)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 953110) Executing operator "Rx" with param "(?:\b(?:f(?:tp_(?:nb_)?f?(?:ge|pu)t|get(?:s?s|c)|scanf|write|open|read)|gz(?:(?:encod|writ)e|compress|open|read)|s(?:ession_start|candir)|read(?:(?:gz)?file|dir)|move_uploaded_file|(?:proc_|bz)open|call_user_func)|\$_(?:(?:pos|ge)t|session))\b" against RESPONSE_BODY.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "" (Variable: RESPONSE_BODY)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 953120) Executing operator "Rx" with param "<\?(?!xml)" against RESPONSE_BODY.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "" (Variable: RESPONSE_BODY)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 953014) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-RESPONSE-953-DATA-LEAKAGES-PHP
[9] Skipped rule id '953016' due to a SecMarker: END-RESPONSE-953-DATA-LEAKAGES-PHP
[9] Rule:
[9] Skipped rule id '953018' due to a SecMarker: END-RESPONSE-953-DATA-LEAKAGES-PHP
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-RESPONSE-953-DATA-LEAKAGES-PHP
[9] Rule: END-RESPONSE-953-DATA-LEAKAGES-PHP
[4] Out of a SecMarker after skip 3.000000 rules.
[4] (Rule: 954012) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 954100) Executing operator "Rx" with param "[a-z]:\\\\inetpub\b" against RESPONSE_BODY.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] T (0) t:lowercase: ""
[9] Target value: "" (Variable: RESPONSE_BODY)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 954110) Executing operator "Rx" with param "(?:Microsoft OLE DB Provider for SQL Server(?:<\/font>.{1,20}?error '800(?:04005|40e31)'.{1,40}?Timeout expired| \(0x80040e31\)<br>Timeout expired<br>)|<h1>internal server error<\/h1>.*?<h2>part of the server has crashed or it has a configuration error\.<\/h2>|cannot connect to the server: timed out)" against RESPONSE_BODY.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "" (Variable: RESPONSE_BODY)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 954120) Executing operator "Rx" with param "(?:\b(?:A(?:DODB\.Command\b.{0,100}?\b(?:Application uses a value of the wrong type for the current operation\b|error')| trappable error occurred in an external object\. The script cannot continue running\b)|Microsoft VBScript (?:compilation (?:\(0x8|error)|runtime (?:Error|\(0x8))\b|Object required: '|error '800)|<b>Version Information:<\/b>(?:&nbsp;|\s)(?:Microsoft \.NET Framework|ASP\.NET) Version:|>error 'ASP\b|An Error Has Occurred|>Syntax error in string in query expression|\/[Ee]rror[Mm]essage\.aspx?\?[Ee]rror\b)" against RESPONSE_BODY.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "" (Variable: RESPONSE_BODY)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 954130) Executing operator "Rx" with param "!^404$" against RESPONSE_STATUS.
[6] Resolving: TX.0 to: host user-agent accept content-length content-type
[6] Resolving: MATCHED_VAR_NAME to: NULL
[6] Resolving: MATCHED_VAR to: NULL
[9] Target value: "200" (Variable: RESPONSE_STATUS)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 954014) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-RESPONSE-954-DATA-LEAKAGES-IIS
[9] Skipped rule id '954016' due to a SecMarker: END-RESPONSE-954-DATA-LEAKAGES-IIS
[9] Rule:
[9] Skipped rule id '954018' due to a SecMarker: END-RESPONSE-954-DATA-LEAKAGES-IIS
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-RESPONSE-954-DATA-LEAKAGES-IIS
[9] Rule: END-RESPONSE-954-DATA-LEAKAGES-IIS
[4] Out of a SecMarker after skip 3.000000 rules.
[6] Resolving: tx.outbound_anomaly_score_threshold to: 4
[4] (Rule: 959100) Executing operator "Ge" with param "4" Was: "%{tx.outbound_anomaly_score_threshold}" against TX:OUTBOUND_ANOMALY_SCORE.
[6] Resolving: TX.OUTBOUND_ANOMALY_SCORE to: 0
[9] Target value: "0" (Variable: TX:OUTBOUND_ANOMALY_SCORE)
[6] Resolving: tx.outbound_anomaly_score_threshold to: 4
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 959012) Executing operator "Lt" with param "1" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 959014) Executing operator "Lt" with param "2" against TX:PARANOIA_LEVEL.
[9] Target value: "1" (Variable: TX:PARANOIA_LEVEL)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END-RESPONSE-959-BLOCKING-EVALUATION
[9] Skipped rule id '959016' due to a SecMarker: END-RESPONSE-959-BLOCKING-EVALUATION
[9] Rule:
[9] Skipped rule id '959018' due to a SecMarker: END-RESPONSE-959-BLOCKING-EVALUATION
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END-RESPONSE-959-BLOCKING-EVALUATION
[9] Rule: END-RESPONSE-959-BLOCKING-EVALUATION
[4] Out of a SecMarker after skip 3.000000 rules.
[4] Starting phase LOGGING. (SecRules 5)
[9] This phase consists of 45 rule(s).
[4] (Rule: 912110) Executing operator "Eq" with param "0" against TX:dos_burst_time_slice.
[9] Target value: "0" (Variable: TX:dos_burst_time_slice)
[9] Matched vars updated.
[9] Rule contains a `pass' action
[4] Rule returned 1.
[4] Executing chained rule.
[4] (Rule: 0) Executing operator "Eq" with param "0" against TX:dos_counter_threshold.
[9] Target value: "0" (Variable: TX:dos_counter_threshold)
[9] Matched vars updated.
[4] Rule returned 1.
[4] Executing chained rule.
[4] (Rule: 0) Executing operator "Eq" with param "0" against TX:dos_block_timeout.
[9] Target value: "0" (Variable: TX:dos_block_timeout)
[9] Matched vars updated.
[4] Rule returned 1.
[9] (SecDefaultAction) Running action: log
[9] Saving transaction to logs
[9] (SecDefaultAction) Running action: auditlog
[4] (SecDefaultAction) Running action: pass (rule does not contain a disruptive action)
[8] Running action pass
[4] Running (non-disruptive) action: nolog
[4] Running (disruptive) action: pass
[8] Running action pass
[4] Running (non-disruptive) action: skipAfter
[5] Setting skipAfter for: END_DOS_PROTECTION_CHECKS
[9] Skipped rule id '912140' due to a SecMarker: END_DOS_PROTECTION_CHECKS
[9] Rule:
[9] Skipped rule id '912150' due to a SecMarker: END_DOS_PROTECTION_CHECKS
[9] Rule:
[9] Skipped rule id '912160' due to a SecMarker: END_DOS_PROTECTION_CHECKS
[9] Rule:
[9] Skipped rule id '912161' due to a SecMarker: END_DOS_PROTECTION_CHECKS
[9] Rule:
[9] Skipped rule id '912170' due to a SecMarker: END_DOS_PROTECTION_CHECKS
[9] Rule:
[9] Skipped rule id '912019' due to a SecMarker: END_DOS_PROTECTION_CHECKS
[9] Rule:
[9] Skipped rule id '912171' due to a SecMarker: END_DOS_PROTECTION_CHECKS
[9] Rule:
[9] Skipped rule id '0' due to a SecMarker: END_DOS_PROTECTION_CHECKS
[9] Rule: END-REQUEST-912-DOS-PROTECTION
[9] Skipped rule id '0' due to a SecMarker: END_DOS_PROTECTION_CHECKS
[9] Rule: END_DOS_PROTECTION_CHECKS
[4] Out of a SecMarker after skip 9.000000 rules.
[4] (Rule: 980100) Executing operator "Ge" with param "1" against TX.
[6] Resolving: tx.anomaly_score to: 0
[6] Resolving: tx.inbound_tx_msg to: NULL
[6] Resolving: TX.INBOUND_ANOMALY_SCORE to: 0
[6] Resolving: tx.msg to: NULL
[6] Resolving: TX.OUTBOUND_ANOMALY_SCORE to: 0
[9] Target value: "0" (Variable: TX)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 980110) Executing operator "Ge" with param "1" against TX.
[6] Resolving: tx.anomaly_score to: 0
[6] Resolving: tx.inbound_tx_msg to: NULL
[6] Resolving: TX.INBOUND_ANOMALY_SCORE to: 0
[6] Resolving: tx.msg to: NULL
[6] Resolving: TX.OUTBOUND_ANOMALY_SCORE to: 0
[9] Target value: "0" (Variable: TX)
[4] Rule returned 0.
[9] Matched vars cleaned.
[4] (Rule: 980120) Executing operator "Gt" with param "0" against TX:INBOUND_ANOMALY_SCORE.
[6] Resolving: TX.INBOUND_ANOMALY_SCORE to: 0
[6] Resolving: tx.inbound_tx_msg to: NULL
[9] Target value: "0" (Variable: TX:INBOUND_ANOMALY_SCORE)
[4] Rule returned 0.
[9] Matched vars cleaned.
[6] Resolving: tx.inbound_anomaly_score_threshold to: 5
[4] (Rule: 980130) Executing operator "Ge" with param "5" Was: "%{tx.inbound_anomaly_score_threshold}" against TX:INBOUND_ANOMALY_SCORE.
[6] Resolving: TX.INBOUND_ANOMALY_SCORE to: 0
[6] Resolving: tx.sql_injection_score to: 0
[6] Resolving: tx.xss_score to: 0
[6] Resolving: tx.rfi_score to: 0
[6] Resolving: tx.lfi_score to: 0
[6] Resolving: tx.rce_score to: 0
[6] Resolving: tx.php_injection_score to: 0
[6] Resolving: tx.http_violation_score to: 0
[6] Resolving: tx.session_fixation_score to: 0
[6] Resolving: tx.inbound_tx_msg to: NULL
[9] Target value: "0" (Variable: TX:INBOUND_ANOMALY_SCORE)
[6] Resolving: tx.inbound_anomaly_score_threshold to: 5
[4] Rule returned 0.
[9] Matched vars cleaned.
[6] Resolving: tx.outbound_anomaly_score_threshold to: 4
[4] (Rule: 980140) Executing operator "Ge" with param "4" Was: "%{tx.outbound_anomaly_score_threshold}" against TX:OUTBOUND_ANOMALY_SCORE.
[6] Resolving: TX.OUTBOUND_ANOMALY_SCORE to: 0
[6] Resolving: tx.msg to: NULL
[9] Target value: "0" (Variable: TX:OUTBOUND_ANOMALY_SCORE)
[6] Resolving: tx.outbound_anomaly_score_threshold to: 4
[4] Rule returned 0.
[9] Matched vars cleaned.
[8] Checking if this request is suitable to be saved as an audit log.
[8] Checking if this request is relevant to be part of the audit logs.
[9] Return code `200' is not interesting to audit logs, relevant code(s): `^(?:5|4(?!04))'.
[9] JSON: Cleaning up JSON results
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment