942310 regular suspected error
See original GitHub issueDescribe the bug
There may be a problem with [\“'`]\s+and\s*?=\W in the 942310 rule. You can view this part in the /util/regexp-assemble/regexp-942310.data file. By analyzing the regularity, There can only be \s
between [\”'`] and and
, and \w
cannot be after and, such as " and =;
, but I check related payloads such as: AND 1=1 AND '%'='
Unable to be hit, more related payloads can refer to:
https://github.com/payloadbox/sql-injection-payload-list ,
https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/ .
Maybe I didn’t find the corresponding detection payload, let’s take a look at it together~
Steps to reproduce
Expected behaviour
Actual behaviour
Additional context
Your Environment
CRS version v3.4/dev
- CRS version (e.g., v3.2.0):
- Paranoia level setting:
- ModSecurity version (e.g., 2.9.3):
- Web Server and version (e.g., apache 2.4.41):
- Operating System and version:
Issue Analytics
- State:
- Created 2 years ago
- Comments:21 (21 by maintainers)
Top Results From Across the Web
Monthly Chat Agenda August 2021 (2021-08-02 and 2021-08-16 ...
Issue slot 1: Go Test WAF bypasses #1991 - pending; Issue slot 2: 942310 regular suspected error #2118 - pending; Issue slot 3:...
Read more >Errors when using Profile 2 with Date module [#1021512] | Drupal.org
Given the similarity of the error messages, I suspect it's the same problem. ... In short, after #942310: Field form cannot be attached...
Read more >Post-glacial reactivation of the Bollnäs fault, central Sweden
Abstract. Glacially induced intraplate faults are conspicu- ous in Fennoscandia where they reach trace lengths of up to 155km with estimated magnitudes up ......
Read more >Venson v. Vashaw, 2:20-CV-11865 | Casetext Search + Citator
Hall notified the Sex Crimes Unit about the alleged assault. ... criminal justice systems, not a substitute for ordinary error correction through appeal....
Read more >Rhino Screw Together 24:1/48:1 & 32:1/65:1 Pumps
Standard Cast Drum Follower Plate Assembly ... If you are injured or even suspect an injury: ... S Tell the doctor that you...
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
I just spent some time with this too. The longer I look at it the more it seems to me that the expression contains at least one typo. For the expression to match there must be an engine accepting something like
AND =
which doesn’t make sense because there is no left hand side to the=
. Unless there existed a “boolean compound assignment” somewhere (e.g.x := y AND= z
).While the idea of compound operators sounded promising at first, I haven’t been able to find any operator where the
=
is the the first of the two characters. In every dialect the=
is always the last character of the compound operator. Even if there where such an operator, the observation above still holds: there would be no left hand side to the operator.In conclusion, I think the odds of opening us up to an attack are slim (even if there were an exploit, it doesn’t seem to be widely known) and I think we should remove the expression.
Thanks @NiceYouKnow, these kinds of issues are so hard to find and we really need the support of CRS users to help us improve the quality of the rules.
I looked up the relevant information and found nothing to match. https://github.com/payloadbox/sql-injection-payload-list https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/