We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
The following errors trigger for us with all page requests to our site after installing the banner:
Rule ID 981172:
[Tue Feb 11 16:42:50 2014] [error] [client 201.145.211.51] ModSecurity: [file "/etc/httpd/modsecurity.d/activated_rules-owasp/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: \\x22 found within REQUEST_COOKIES:thedaywefightback_locationb: {\\x22country\\x22:{\\x22iso_code\\x22:\\x22MX\\x22}}"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:thedaywefightback_locationb. [hostname "www.strangecode.com"] [uri "/favicon.ico"] [unique_id "LQyjpcCoZOQAAB34cGEAAAAP"]
Rule ID 981246:
[Tue Feb 11 16:45:53 2014] [error] [client 201.145.211.51] ModSecurity: [file "/etc/httpd/modsecurity.d/activated_rules-owasp/modsecurity_crs_41_sql_injection_attacks.conf"] [line "239"] [id "981246"] [msg "Detects basic SQL authentication bypass attempts 3/3"] [data "Matched Data: \\x22country\\x22:{\\x22 found within REQUEST_COOKIES:thedaywefightback_locationb: {\\x22country\\x22:{\\x22iso_code\\x22:\\x22MX\\x22}}"] [severity "CRITICAL"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] Access denied with code 403 (phase 2). Pattern match "(?i:(?:in\\\\s*?\\\\(+\\\\s*?select)|(?:(?:n?and|x?x?or|div|like|between|and|not |\\\\|\\\\||\\\\&\\\\&)\\\\s+[\\\\s\\\\w+]+(?:regexp\\\\s*?\\\\(|sounds\\\\s+like\\\\s*?[\\"'`\\xc2\\xb4\\xe2\\x80\\x99\\xe2\\x80\\x98]|[=\\\\d]+x))|([\\"'`\\xc2\\xb4\\xe2\\x80\\x99\\xe2\\x80\\x98]\\\\s*?\\\\d\\\\s*?(?:--|#)) ..." at REQUEST_COOKIES:thedaywefightback_locationb. [hostname "www.strangecode.com"] [uri "/favicon.ico"] [unique_id "N-8J8MCoZOQAAEFsPBAAAAAE"]
Rule ID 981243:
[Tue Feb 11 16:47:50 2014] [error] [client 201.145.211.51] ModSecurity: [file "/etc/httpd/modsecurity.d/activated_rules-owasp/modsecurity_crs_41_sql_injection_attacks.conf"] [line "245"] [id "981243"] [msg "Detects classic SQL injection probings 2/2"] [data "Matched Data: \\x22:{\\x22 found within REQUEST_COOKIES:thedaywefightback_locationb: {\\x22country\\x22:{\\x22iso_code\\x22:\\x22MX\\x22}}"] [severity "CRITICAL"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] Access denied with code 403 (phase 2). Pattern match "(?i:(?:[\\"'`\\xc2\\xb4\\xe2\\x80\\x99\\xe2\\x80\\x98]\\\\s*?\\\\*.+(?:x?or|div|like|between|and|id)\\\\W*?[\\"'`\\xc2\\xb4\\xe2\\x80\\x99\\xe2\\x80\\x98]\\\\d)|(?:\\\\^[\\"'`\\xc2\\xb4\\xe2\\x80\\x99\\xe2\\x80\\x98])|(?:^[\\\\w\\\\s\\"'`\\xc2\\xb4\\xe2\\x80\\x99\\xe2\\x80\\x98-]+(?<=and\\\\s)(?<=or|xor ..." at REQUEST_COOKIES:thedaywefightback_locationb. [hostname "www.strangecode.com"] [uri "/favicon.ico"] [unique_id "Pu8NKcCoZOQAAEOgfDoAAAAH"]
The text was updated successfully, but these errors were encountered:
No branches or pull requests
The following errors trigger for us with all page requests to our site after installing the banner:
Rule ID 981172:
Rule ID 981246:
Rule ID 981243:
The text was updated successfully, but these errors were encountered: