-
-
Notifications
You must be signed in to change notification settings - Fork 402
fix(942100): remove multiMatch action #2478
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix(942100): remove multiMatch action #2478
Conversation
seems that all tests for 942100 passed. any thoughts?
|
If loginject does the lowercase itself, then there is maybe really no point in carrying it. Yet this is the workhorse of sqli detection, so this is a substantial risk for false negatives. So I'd really think twice, even if our tests seem to be limited in this regard. |
libinject? |
I agree with @dune73. I would say, write a test case that requires
This should show us whether libinjection requires |
Added "needs action" label so it really stands out in the PR overview. |
IIRC this was related to an old libmodsecurity bug (sort of owasp-modsecurity/ModSecurity#2573) and now seems to be fixed. closing, feel free to reopen if needed |
Not sure why you had opened this PR. It seemed to me that you wanted to remove the overhead of |
from the ModSecurity wiki:
multiMatch
If enabled, ModSecurity will perform multiple operator invocations for every target, before and after every anti-evasion transformation is performed.
Action Group: Non-disruptive
Example:
Normally, variables are inspected only once per rule, and only after all transformation functions have been completed. With multiMatch, variables are checked against the operator before and after every transformation function that changes the input.