Skip to content

WAF Bypass Command Injection #4204

Open
@HackingRepo

Description

@HackingRepo

Hello, team

i noticed today a bypass of WAF at PL3 my request

curl -ig -H "x-format-output: txt-matched-rules" -H "x-crs-paranoia-level: 3" -H "x-backend: coraza-caddy" --data-urlencode "q=;PATH=/inexistent" "https://sandbox.coreruleset.org/"
HTTP/1.1 200 OK
Date: Fri, 11 Jul 2025 13:17:44 GMT
Content-Type: text/plain
Transfer-Encoding: chunked
Connection: keep-alive
X-Unique-ID: aHEO-A3ZsEJGA-19Uz8-sAAAAM0
x-backend: invalid, fallback to apache-latest
x-crs-last-commit: none

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions