We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Mod security using libinjection blocks a valid request having [0: 006--u-m4YIaIyga-cq8yK] as payload.
[0: 006--u-m4YIaIyga-cq8yK]
ModSecurity: Warning. detected SQLi using libinjection. [file "/etc/nginx/owasp-modsecurity-crs/rules/REQUEST-942-APPLICATION-ATTACK-SQLI.conf"] [line "43"] [id "942100"] [rev "1"] [msg "SQL Injection Attack Detected via libinjection"] [data "Matched Data: 1c found within ARGS:json.array_0: 006--u-m4YIaIyga-cq8yK"] [severity "2"] [ver "OWASP_CRS/3.0.0"] [maturity "1"] [accuracy "8"] [hostname "XXXXX"] [uri "/some/url"] [unique_id "XXXXX"] [ref "XXX"] ModSecurity: Access denied with code 302 (phase 2). Matched "Operator `Ge' with parameter `5' against variable `TX:ANOMALY_SCORE' (Value: `5' ) [file "/etc/nginx/owasp-modsecurity-crs/rules/REQUEST-949-BLOCKING-EVALUATION.conf"] [line "44"] [id "949110"] [rev ""] [msg "Inbound Anomaly Score Exceeded (Total Score: 5)"] [data ""] [severity "2"] [ver ""] [maturity "0"] [accuracy "0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-generic"] [hostname "XXXXX"] [uri "/some/url"] [unique_id "XXXXX"] [ref ""] ModSecurity: Warning. Matched "Operator `Ge' with parameter `5' against variable `TX:INBOUND_ANOMALY_SCORE' (Value: `5' ) [file "/etc/nginx/owasp-modsecurity-crs/rules/RESPONSE-980-CORRELATION.conf"] [line "65"] [id "980130"] [rev ""] [msg "Inbound Anomaly Score Exceeded (Total Inbound Score: 5 - SQLI=5,XSS=0,RFI=0,LFI=0,RCE=0,PHPI=0,HTTP=0,SESS=0): SQL Injection Attack Detected via libinjection"] [data ""] [severity "0"] [ver ""] [maturity "0"] [accuracy "0"] [tag "event-correlation"] [hostname "XXXXX"] [uri "/some/url"] [unique_id "XXXXX"] [ref ""]
From: SpiderLabs/owasp-modsecurity-crs#1416
The text was updated successfully, but these errors were encountered:
@osamamaruf Is this resolved?
I'm also facing the same issue. Please let me know if you found any solution for this.
#161
Thanks,
Sorry, something went wrong.
No branches or pull requests
False Positive
Mod security using libinjection blocks a valid request having
[0: 006--u-m4YIaIyga-cq8yK]
as payload.
Description
Your Environment
From: SpiderLabs/owasp-modsecurity-crs#1416
The text was updated successfully, but these errors were encountered: