mirror of
https://github.com/owasp-modsecurity/ModSecurity.git
synced 2025-11-21 11:36:40 +03:00
Updated Reference Manual (mediawiki)
@@ -2261,6 +2261,9 @@ SCRIPT_USERNAME "^apache$" "id:66"
|
|||||||
|
|
||||||
; Note : Not available in proxy mode.
|
; Note : Not available in proxy mode.
|
||||||
|
|
||||||
|
== SDBM_DELETE_ERROR ==
|
||||||
|
This variable is set to 1 when APR fails to delete SDBM entries.
|
||||||
|
|
||||||
== SERVER_ADDR ==
|
== SERVER_ADDR ==
|
||||||
This variable contains the IP address of the server.
|
This variable contains the IP address of the server.
|
||||||
|
|
||||||
@@ -3430,6 +3433,15 @@ Would match on - <br>
|
|||||||
But not on - <br>
|
But not on - <br>
|
||||||
Your site has a wide '''select'''ion of computers.
|
Your site has a wide '''select'''ion of computers.
|
||||||
|
|
||||||
|
== detectSQLi ==
|
||||||
|
'''Description:''' Returns true if SQL injection payload is found. This operator uses LibInjection to detect SQLi attacks.
|
||||||
|
|
||||||
|
'''Example:'''
|
||||||
|
<pre>
|
||||||
|
# Detect SQL Injection inside request uri data"
|
||||||
|
SecRule REQUEST_URI "@detectSQLi" "id:152"
|
||||||
|
</pre>
|
||||||
|
|
||||||
== endsWith ==
|
== endsWith ==
|
||||||
'''Description:''' Returns true if the parameter string is found at the end of the input. Macro expansion is performed on the parameter string before comparison.
|
'''Description:''' Returns true if the parameter string is found at the end of the input. Macro expansion is performed on the parameter string before comparison.
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user