client9 / libinjection

SQL / SQLI tokenizer parser analyzer
Other
995 stars 274 forks source link

bypass with additional single quote #135

Open funkluk opened 6 years ago

funkluk commented 6 years ago

Hi, I'm using libinjection with ModSecurity and the OWASP CRS 3.0.2 and found a simple bypass issue.

When providing an input of a filed like ' OR 1=1;' it's not detected as an SQLinjection Whereas ' OR 1=1; is detected (note the difference of the last single quote) and triggers the according ModSecurity rule.

As I don't have full insight how the pattern matching works in the library I can't really judge if this is a issue to fix. But I would expect that such a slight modification should also be detected.

mod_security 2.9.2 with libinjection 3.9.2