Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

bypass with additional single quote #135

Open
funkluk opened this issue Dec 21, 2017 · 0 comments
Open

bypass with additional single quote #135

funkluk opened this issue Dec 21, 2017 · 0 comments

Comments

@funkluk
Copy link

funkluk commented Dec 21, 2017

Hi,
I'm using libinjection with ModSecurity and the OWASP CRS 3.0.2 and found a simple bypass issue.

When providing an input of a filed like ' OR 1=1;' it's not detected as an SQLinjection
Whereas ' OR 1=1; is detected (note the difference of the last single quote) and triggers the according ModSecurity rule.

As I don't have full insight how the pattern matching works in the library I can't really judge if this is a issue to fix.
But I would expect that such a slight modification should also be detected.

mod_security 2.9.2 with libinjection 3.9.2

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant