Rule 942360 false-positive on Keyword alter
See original GitHub issue_Issue originally created by user shadow4040 on date 2018-01-22 08:21:29. Link to original issue: https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/997._
False Positive because of the keyword: alter (from SQL)
/modsecurity-crs/REQUEST-942-APPLICATION-ATTACK-SQLI.conf"] [line "81"] [id "942360"] [rev "2"] [msg "Detects concatenated basic SQL injection and SQLLFI attempts"] [data "Matched Data: Alter found within ARGS:request.debtors.privatePerson.birthName: Alter XYZ "]
Issue Analytics
- State:
- Created 3 years ago
- Comments:16
Top Results From Across the Web
Rule 942360 false-positive on Keyword alter #997
So this is a very similar case to #988. It is unfortunate that "Alter" is a German word (here), but the whole group...
Read more >Handling False Positives with the OWASP ModSecurity ...
We will take a vanilla installation of the OWASP ModSecurity Core Rule Set (CRS) troubled by a large number of false positives and...
Read more >owasp-modsecurity-crs: REQUEST-942-APPLICATION- ...
This rule has a stricter sibling: 942361. # The keywords 'alter' and 'union' led to false positives. # The keywords 'alter' and 'union'...
Read more >CRS rule groups and rules - Azure Web Application Firewall
CRS 3.2 offers a new engine and new rule sets defending against Java ... 942361, Detects basic SQL injection based on keyword alter...
Read more >Protections for Web Application Firewall - WAF
Capability Key Version Name
943120 1 Session Fixation No Referer in SessionID
943110 1 Session Fixation Off‑Domain Referer in SessionID
943100 1 Session Fixation cookie in...
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
User dune73 commented on date 2018-02-08 06:56:36:
We have FPs in the default installation. Your work allows us to keep this part of the rule in PL1. If we do not do that, I think we need to push it to PL2 which lowers the security at PL1.
There is a fair chance that we miss future development in the DBMS and a new keywords show up. However, we would still cover the basic alter keyword at PL2 as a stricter sibling, so I think we could live with that shortcoming (let’s rather cover 98% of an issue than 0% because we can not reach 100%).
If you do the PL, please include the name of the DBMS or maybe even the links to their documentation. That would help with future updates of the list of keywords.
User spartantri commented on date 2018-01-30 10:12:31:
yep, you’re right, also using non capturing groups maybe better as capturing those keywords may not be really required