
coreruleset.org/20211209/introducing-the-crs-sandbox
Preview meta tags from the coreruleset.org website.
Linked Hostnames
9- 12 links tocoreruleset.org
- 2 links togithub.com
- 2 links totwitter.com
- 1 link toowasp.org
- 1 link toowasp.slack.com
- 1 link towww.linkedin.com
- 1 link towww.twitter.com
- 1 link towww.youtube.com
Thumbnail
Search Engine Appearance
https://coreruleset.org/20211209/introducing-the-crs-sandbox
Introducing the CRS Sandbox
The OWASP ModSecurity Core Rule Set project is very happy to present the CRS Sandbox. It’s an API that allows you to test an attack payload against CRS …
Bing
Introducing the CRS Sandbox
https://coreruleset.org/20211209/introducing-the-crs-sandbox
The OWASP ModSecurity Core Rule Set project is very happy to present the CRS Sandbox. It’s an API that allows you to test an attack payload against CRS …
DuckDuckGo

Introducing the CRS Sandbox
The OWASP ModSecurity Core Rule Set project is very happy to present the CRS Sandbox. It’s an API that allows you to test an attack payload against CRS …
General Meta Tags
10- titleIntroducing the CRS Sandbox | CRS Project
- charsetutf-8
- viewportwidth=device-width,initial-scale=1
- Content-Security-Policyupgrade-insecure-requests
- descriptionThe OWASP ModSecurity Core Rule Set project is very happy to present the CRS Sandbox. It’s an API that allows you to test an attack payload against CRS …
Open Graph Meta Tags
7- og:urlhttps://coreruleset.org/20211209/introducing-the-crs-sandbox/
- og:site_nameCRS Project
- og:titleIntroducing the CRS Sandbox
- og:descriptionThe OWASP ModSecurity Core Rule Set project is very happy to present the CRS Sandbox. It’s an API that allows you to test an attack payload against CRS without the need to install a ModSecurity box or anything. Here is how to do this: $ curl -H "x-format-output: txt-matched-rules" "https://sandbox.coreruleset.org/?search=<script>alert('CRS+Sandbox+Release')</script>" 941100 PL1 XSS Attack Detected via libinjection 941110 PL1 XSS Filter - Category 1: Script Tag Vector 941160 PL1 NoScript XSS InjectionChecker: HTML Injection 949110 PL1 Inbound Anomaly Score Exceeded (Total Score: 15) 980130 PL1 Inbound Anomaly Score Exceeded (Total Inbound Score: 15 - SQLI=0,XSS=15,RFI=0,LFI=0,RCE=0,PHPI=0,HTTP=0,SESS=0): individual paranoia level scores: 15, 0, 0, 0 As you can see, curl is calling our sandbox with an XSS payload and the sandbox returns the list of CRS rules that the request triggered. If you are unfamiliar with CRS, then the important part is that there are several rules that triggered / detected something. And the total “anomaly score” of 15, which is far beyond the default anomaly threshold of 5 that gets a request blocked for looking like an attack.
- og:localeen
Twitter Meta Tags
4- twitter:cardsummary_large_image
- twitter:imagehttps://coreruleset.org/images/social-preview.svg
- twitter:titleIntroducing the CRS Sandbox
- twitter:descriptionThe OWASP ModSecurity Core Rule Set project is very happy to present the CRS Sandbox. It’s an API that allows you to test an attack payload against CRS without the need to install a ModSecurity box or anything. Here is how to do this: $ curl -H "x-format-output: txt-matched-rules" "https://sandbox.coreruleset.org/?search=<script>alert('CRS+Sandbox+Release')</script>" 941100 PL1 XSS Attack Detected via libinjection 941110 PL1 XSS Filter - Category 1: Script Tag Vector 941160 PL1 NoScript XSS InjectionChecker: HTML Injection 949110 PL1 Inbound Anomaly Score Exceeded (Total Score: 15) 980130 PL1 Inbound Anomaly Score Exceeded (Total Inbound Score: 15 - SQLI=0,XSS=15,RFI=0,LFI=0,RCE=0,PHPI=0,HTTP=0,SESS=0): individual paranoia level scores: 15, 0, 0, 0 As you can see, curl is calling our sandbox with an XSS payload and the sandbox returns the list of CRS rules that the request triggered. If you are unfamiliar with CRS, then the important part is that there are several rules that triggered / detected something. And the total “anomaly score” of 15, which is far beyond the default anomaly threshold of 5 that gets a request blocked for looking like an attack.
Link Tags
9- apple-touch-iconhttps://coreruleset.org/apple-touch-icon.png
- iconhttps://coreruleset.org/favicon.ico
- iconhttps://coreruleset.org/favicon.svg
- iconhttps://coreruleset.org/favicon-32x32.png
- preloadhttps://coreruleset.org/fonts/nunito-v25-latin-regular.woff2
Links
22- https://coreruleset.org
- https://coreruleset.org/blog
- https://coreruleset.org/docs/1-getting-started/1-1-crs-installation
- https://coreruleset.org/docs/3-about-rules/creating
- https://coreruleset.org/docs/6-development/6-1-contribution-guidelines