mirror of
https://github.com/owasp-modsecurity/ModSecurity.git
synced 2025-09-30 03:34:29 +03:00
Fixed: return msgs at detectSQLi
This commit is contained in:
@@ -2144,19 +2144,24 @@ static int msre_op_detectSQLi_execute(modsec_rec *msr, msre_rule *rule, msre_var
|
|||||||
int issqli = is_sqli(&sf, var->value, var->value_len, is_sqli_pattern);
|
int issqli = is_sqli(&sf, var->value, var->value_len, is_sqli_pattern);
|
||||||
int capture = apr_table_get(rule->actionset->actions, "capture") ? 1 : 0;
|
int capture = apr_table_get(rule->actionset->actions, "capture") ? 1 : 0;
|
||||||
|
|
||||||
|
if (error_msg == NULL) return -1;
|
||||||
|
*error_msg = NULL;
|
||||||
|
|
||||||
if (issqli) {
|
if (issqli) {
|
||||||
set_match_to_tx(msr, capture, sf.pat, 0);
|
set_match_to_tx(msr, capture, sf.pat, 0);
|
||||||
|
|
||||||
*error_msg = apr_psprintf(msr->mp, "detected SQLi using libinjection fingerprint '%s'",
|
*error_msg = apr_psprintf(msr->mp, "detected SQLi using libinjection fingerprint '%s' at %s",
|
||||||
sf.pat);
|
sf.pat, var->name);
|
||||||
|
|
||||||
if (msr->txcfg->debuglog_level >= 9) {
|
if (msr->txcfg->debuglog_level >= 9) {
|
||||||
msr_log(msr, 9, "ISSQL: libinjection fingerprint '%s' matched input '%s'",
|
msr_log(msr, 9, "detectSQLi: libinjection fingerprint '%s' matched input '%s'",
|
||||||
sf.pat,
|
sf.pat,
|
||||||
log_escape_ex(msr->mp, var->value, var->value_len));
|
log_escape_ex(msr->mp, var->value, var->value_len));
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
if (msr->txcfg->debuglog_level >= 9) {
|
if (msr->txcfg->debuglog_level >= 9) {
|
||||||
msr_log(msr, 9, "ISSQL: not sqli, no libinjection sqli fingerprint matched input '%s'",
|
msr_log(msr, 9, "detectSQLi: no sql, libinjection fingerprint '%s' no match input '%s'",
|
||||||
|
sf.pat,
|
||||||
log_escape_ex(msr->mp, var->value, var->value_len));
|
log_escape_ex(msr->mp, var->value, var->value_len));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
Reference in New Issue
Block a user