-
Notifications
You must be signed in to change notification settings - Fork 728
Rule 942450 (SQL Hex Encoding Identified) too lax? #833
Comments
This rule is indeed mighty aggressive. But I am not very experienced with exploits leveraging hex encoding and how the payload looks. Right now we trigger on anything but numbers before the |
I've little experience with this too, maybe someone else can chime in? If I look at this example: http://www.pwntester.com/blog/2014/01/15/hackyou2014-web100-write-up/ it would suggest that the Interestingly the regexp already contains My gut feeling says that we could get away with As it's PL2, it's not the highest prio however. |
@pash7ka reports false positives with ethereum addresses and transactions with this rule too in issue #951 (closed in favor of this issue here).
|
FWIW it happens with Laravel too in REQUEST_COOKIES:XSRF-TOKEN. |
Ok, now I seen it in REQUEST_COOKIES:laravel_session too, which makes sense, since I guess they use the same algorithm to generate it. |
This issue has been open 120 days with no activity. Remove the stale label or comment, or this will be closed in 14 days |
Decision during the CRS project chat on March 2, 2020: @lifeforms will take this on. |
The great thing is that @wjwoodson already fixed this in #1662, so this issue can be closed! |
Rule 942450 (SQL Hex Encoding Identified; PL2) gives FPs in alphanumeric strings that contain the substring
0x
. Examples:N0X5d1
bKjyGu1pGxza4NGsxfqxoSTPA6acPA12pshj0xddfda
reported in #832Could we be a little less annoying and not fire if there is a letter before the
0x
substring? This should not diminish detecting actual attacks.The text was updated successfully, but these errors were encountered: