OWASP ModSecurity Core Rule Set (Official Repository) https://coreruleset.org
Go to file
Christian Folini 11d7540fe6
Merge pull request #3315 from theseion/update-941160
feat: update 941160
2023-09-19 13:27:43 +02:00
.github fix: one workflow per file 2023-09-18 20:16:26 +02:00
docs docs: improve command 2021-10-29 09:39:11 +02:00
plugins bump versions to 4.0.0-rc1 2022-04-27 21:04:05 +02:00
regex-assembly Update 941160.ra 2023-09-19 12:57:43 +02:00
rules fix: revert tag order change 2023-09-19 12:58:28 +02:00
tests fix: moves FP prone phrase `file size is` to PL2 (#3314) 2023-09-19 10:35:27 +02:00
util feat: add ability to strip suffix in spell.sh 2023-09-18 16:49:24 +02:00
.editorconfig docs: add editorconfig file to keep spacing in good shape 2022-02-22 13:26:17 +00:00
.gitignore address review, run with spell extendend, set default frequency file, updates php-high-risk-functions.txt 2023-09-04 15:31:18 +02:00
.gitmodules feat: remove regexp-assemble (#3008) 2022-11-19 16:26:49 +01:00
.linelint.yml feat(lint): split actions in linting and regression 2020-06-15 19:22:10 -03:00
.pre-commit-config.yaml feat: enable dependencies for issues 2023-09-16 15:22:24 +02:00
.yamllint.yml fix: update ignore on yamllint 2022-06-20 19:32:27 -03:00
CHANGES.md chore: update internal links 2023-06-05 12:05:02 +01:00
CONTRIBUTING.md Bring CONTRIBUTING.MD back in line w/ HTML version 2023-09-11 12:14:30 +01:00
CONTRIBUTORS.md Adds Matteo Pace to list of Developers 2023-05-01 22:59:15 +02:00
INSTALL Refactor scoring variables. 2022-04-06 21:24:56 +02:00
KNOWN_BUGS.md chore: update internal links (cont) 2023-06-05 12:10:08 +01:00
LICENSE Bring LICENSE copyright notice in line with others 2022-04-09 22:45:51 +01:00
README.md chore: update internal links (cont) 2023-06-05 12:10:08 +01:00
SECURITY.md Update SECURITY.md 2022-09-05 15:37:38 +02:00
SPONSORS.md Reorder alphabetically 2022-09-14 23:08:37 +02:00
crs-setup.conf.example chore: adds http3 to 900230 description 2023-07-18 13:24:55 +02:00


GHA build v4.0/dev GHA build v3.3/dev GHA build v3.2/dev
OWASP Flagship CII Best Practices License

OWASP ModSecurity Core Rule Set (CRS)

The OWASP ModSecurity Core Rule Set (CRS) is a set of generic attack detection rules for use with ModSecurity or compatible web application firewalls. The CRS aims to protect web applications from a wide range of attacks, including the OWASP Top Ten, with a minimum of false alerts.

CRS Resources

Please see the OWASP ModSecurity Core Rule Set page to get introduced to the CRS and view resources on installation, configuration, and working with the CRS.

Contributing to the CRS

We strive to make the OWASP ModSecurity CRS accessible to a wide audience of beginner and experienced users. We are interested in hearing any bug reports, false-positive alert reports, evasions, usability issues, and suggestions for new detections.

Create an issue on GitHub to report a false positive or false negative (evasion). Please include your installed version and the relevant portions of your ModSecurity audit log. We will try and address your issue and potentially ask for additional information to reproduce your problem. Please also note that stale issues will be flagged and closed after 120 days. You can search for stale issues with the following search query.

Sign up for our Google Group to ask general usage questions and participate in discussions on the CRS. Also here you can find the archives for the previous mailing list.

Join the #coreruleset channel on OWASP Slack to chat about the CRS. (Click here to get an invitation if you are not yet registered on the OWASP slack. It's open to non-members too.)


Copyright (c) 2006-2020 Trustwave and contributors. All rights reserved.
Copyright (c) 2021-2023 Core Rule Set project. All rights reserved.

The OWASP ModSecurity Core Rule Set is distributed under Apache Software License (ASL) version 2. Please see the enclosed LICENSE file for full details.