-
Notifications
You must be signed in to change notification settings - Fork 728
False positive on Cyrillic input 942120 (PL2) #823
Comments
I am not able to reproduce this.
No alert written. Can you please provide the full call? |
Are you running in PL2? |
Confirm. Believe it or not, I managed to lose my 942 file without noticing it. I'm such a n00b. Full debug log:
|
Hi @lifeforms, @dune73 is anyone doing something to fix this? any ideas? I have a few cyrilic sites and this is a very welcome fix. |
No, not really. It's also part of a bigger problem with cyrilic character sets. So maybe a quick fix here and somebody making the bigger problem his/her problem. |
I guess we should close this issue as at the CRS level what can be done is a user configuration to white-list the argument (e.g. |
This issue has been open 120 days with no activity. Remove the stale label or comment, or this will be closed in 14 days |
Decision during the CRS project chat on March 2, 2020: This has been stale far too long. We are closing this - let the bot close it and try to find somebody working on Unicode support in general and not limited to one isolated finding. |
This is a different rule from #794 although the mechanism is comparable.
Input:
name=%D1%81%D0%B5%D1%80%D0%BF+%D0%B8+%D0%BC%D0%BE%D0%BB%D0%BE%D1%82
Decoded:
серп и молот
Result:
Matched Data: <> found within ARGS:name: A5@? 8 <>;>B
Log:
Message: Warning. Pattern match "(?i:(\\!\\=|\\&\\&|\\|\\||>>|<<|>=|<=|<>|<=>|\\bxor\\b|\\brlike\\b|\\bregexp\\b|\\bisnull\\b)|(?:not\\s+between\\s+0\\s+and)|(?:is\\s+null)|(like\\s+null)|(?:(?:^|\\W)in[+\\s]*\\([\\s\\d\"]+[^()]*\\))|(?:\\bxor\\b|<>|rlike(?:\\s+binary)?)|(?:regexp\\s+ ..." at ARGS:name. [file "/usr/local/etc/apache24/security2/crs/rules/REQUEST-942-APPLICATION-ATTACK-SQLI.conf"] [line "526"] [id "942120"] [rev "3"] [msg "SQL Injection Attack: SQL Operator Detected"] [data "Matched Data: <> found within ARGS:name: A5@? 8 <>;>B"] [severity "CRITICAL"] [ver "OWASP_CRS/3.0.0"] [maturity "9"] [accuracy "8"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-sqli"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [tag "WASCTC/WASC-19"] [tag "OWASP_TOP_10/A1"] [tag "OWASP_AppSensor/CIE1"] [tag "PCI/6.5.2"] [tag "paranoia-level/2"]
The problem is
%D0%BC%D0%BE
getting decoded to<>
.The text was updated successfully, but these errors were encountered: