New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SQLI Bypass #191

Closed
marioskourtesis opened this Issue Jul 24, 2014 · 1 comment

Comments

Projects
None yet
2 participants
@marioskourtesis

marioskourtesis commented Jul 24, 2014

The community has been privately informed about this bypass.
Tested on version: 2.2.9

@rcbarnett

This comment has been minimized.

Show comment
Hide comment
@rcbarnett

rcbarnett Jul 24, 2014

Contributor

This bypass is caught by the new @detectSQLi operator that is part of the v3.0.0-dev branch -

https://github.com/SpiderLabs/owasp-modsecurity-crs/blob/v3.0.0-dev/rules/REQUEST-42-APPLICATION-ATTACK-SQLI.conf#L27-53

Contributor

rcbarnett commented Jul 24, 2014

This bypass is caught by the new @detectSQLi operator that is part of the v3.0.0-dev branch -

https://github.com/SpiderLabs/owasp-modsecurity-crs/blob/v3.0.0-dev/rules/REQUEST-42-APPLICATION-ATTACK-SQLI.conf#L27-53

@rcbarnett rcbarnett closed this Jul 24, 2014

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment