-
-
Notifications
You must be signed in to change notification settings - Fork 402
Rule: 942190: False positive 0202 #2075
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Hi @Shajinraj! Thanks for reporting this. Can you, please, post a full request log? You can enable logging in |
Ok, maybe it's not needed. If i'm looking correctly, this regexp from file Maybe it can be rewritten into these two regexpes:
|
As we are new to OWASP CRS, Could you please help us that we can modify the regexp-942190.data and add the given fix or we need to add it an separate file as conf? |
Edit file
|
Please be aware that changing a rule file will prevent you from upgrading to a future version of the rule set. It's usually better to address false positives with a rule exclusion. This technique is explained at length at https://www.netnea.com/cms/apache-tutorial-8_handling-false-positives-modsecurity-core-rule-set/ |
Please be aware that changing a rule file will prevent you from upgrading to a future version of the rule set. It's usually better to address false positives with a rule exclusion. This technique is explained at length at https://www.netnea.com/cms/apache-tutorial-8_handling-false-positives-modsecurity-core-rule-set/ I'm closing this issue in favor of the pull request at #2078. |
Description
[-:error] ModSecurity: Warning. Pattern match "(?i:(?:[\"'
](?:;?\\\\s*?(?:having|select|union)\\\\b\\\\s*?[^\\\\s]|\\\\s*?!\\\\s*?[\\"'
\\w])|(?:c(?:onnection_id|urrent_user)|database)\\s*?\\([^\\\\)]?|u(?:nion(?:[\\w(\\s]?select| select @)|ser\\s*?\\([^\\\\)]?)|s(?:chema\\s?\\([^\\\\)]?|elect.?\\w?user\\()|in ..." at ARGS:q. [file "../../../coreruleset-3.4-dev/rules/REQUEST-942-APPLICATION-ATTACK-SQLI.conf"] [line "200"] [id "942190"] [msg "Detects MSSQL code execution and information gathering attempts"] [data "Matched Data: User( found within ARGS:q: appUser(sitename,user)"] [severity "CRITICAL"] ["OWASP_CRS/3.3.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-sqli"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/152/248/66"] [tag "PCI/6.5.2"] [hostname "*******************"]Audit Logs / Triggered Rule Numbers
Confirmation
[ ] I have removed any personal data (email addresses, IP addresses,
passwords, domain names) from any logs posted.
Hi Guys,
I am getting this false positive when I click a particular tab in my website. Could you please help me that this rule can be removed or we have any other fix?
The text was updated successfully, but these errors were encountered: