-
-
Notifications
You must be signed in to change notification settings - Fork 417
New rule 942550 (PL1) JSON in SQL #3055
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
This is a draft, I'm working to a more stricter version for SQLite and PostgreSQL in order to avoid FPs |
@theMiddleBlue We don't seem to match against this example, which appears to be path-based (original example screenshot):
We don't catch it when the attack is in the path, but we do catch it when it's in
|
thanks @RedXanadu ! |
This PR contains a new rule at PL1 that tries to catch SQL in JSON payloads not covered at PL1. For more information about the bypass technique, please refer to https://claroty.com/team82/research/js-on-security-off-abusing-json-based-sql-to-bypass-waf