-
-
Notifications
You must be signed in to change notification settings - Fork 402
fix(sqli): additional sqli auth bypasses #2575
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
CRS Bug Bounty PR assessment
This is not meant to be final. As a CRS dev, feel free to comment below and edit this form directly. As committer or observer, feel free to comment below with feedback and we will think about updating the assessment accordingly. |
@lifeforms Can you run this on some traffic to see how it behaves? |
Updated rule 942180 and running it now on 3 machines. |
I looked at the logs. I'm impressed that all my 942180 logs truly point to extensive SQLi attempts. Here are some:
That's quite some. Very nice that this is all detected by the rule! 🥳
Note though: I have many exclusions for my hosted apps, so I may be missing some false positives. I'm tempted to try it out, and if during testing of nightly and the next RC it appears to be unusably trigger happy, we can move it to PL2. |
This is not really solving the HTTP Parameter Pollution problem in See #2747 for a solution. |
fixes related to
8PPEUO5P
and partial for5UXE4RK0