December 2012
Intermediate to advanced
552 pages
13h 16m
English
# # -=[ SQL Tautologies ]=- # SecRule REQUEST_COOKIES|!REQUEST_COOKIES:/__utm/| REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/* \ "(?i:([\s'\"'´''\(\)]*)([\d\w]++)([\s'\"'´''\(\)]*)(?:(?:=|<=>|r?lik e|sounds\s+like|regexp)([\s'\"'´''\(\)]*)\2|(?:!=|<=|>=|<>|<|>|\^|is \s+not|not\s+like|not\s+regexp)([\s'\"'´''\(\)]*)(?!\2)([\d\w]+)))"\ "phase:2,rev:'2',ver:'OWASP_CRS/2.2.6',maturity:'9',accuracy :'8',capture,multiMatch,t:none,t:urlDecodeUni,t:replaceComments, ctl:auditLogParts=+E,block,msg:'SQL Injection Attack',id:'950901', logdata:'Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}',severity:'2', tag:'OWASP_CRS/WEB_ATTACK/SQL_INJECTION', tag:'WASCTC/WASC-19',tag:'OWASP_TOP_10/A1', tag:'OWASP_AppSensor/CIE1', tag:'PCI/6.5.2',setvar:'tx.msg=%{rule.msg}', setvar:tx.sql_injection_score=+%{tx.critical_anomaly_score}, ...Read now
Unlock full access