This repository was archived by the owner on May 14, 2020. It is now read-only.

Description
Type of Issue
Incorrect blocking (false positive)
Description
[email protected] is detected as conditional SQL injection attempt
Email address is fictional
Message: Warning. Pattern match "(?i:[\\s()]case\\s*?\\(|\\)\\s*?like\\s*?\\(|having\\s*?[^\\s]+\\s*?[^\\w\\s]|if\\s?\\([\\d\\w]\\s*?[=<>~])" at ARGS:email. [file "/etc/modsecurity/modsecurity.d/owasp-modsecurity-crs/rules/REQUEST-942-APPLICATION-ATTACK-SQLI.conf"] [line "227"] [id "942230"] [msg "Detects conditional SQL injection attempts"] [data "Matched Data: havingu@gmail. found within ARGS:email: [email protected]"] [severity "CRITICAL"] [ver "OWASP_CRS/3.1.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-sqli"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [tag "WASCTC/WASC-19"] [tag "OWASP_TOP_10/A1"] [tag "OWASP_AppSensor/CIE1"] [tag "PCI/6.5.2"]
Your Environment
- CRS version: 3.1.0
- ModSecurity version: 2.9.2-1
- Web Server and version: Apache/2.4.29 (Ubuntu)
Confirmation
[x ] I have removed any personal data (email addresses, IP addresses,
passwords, domain names) from any logs posted.