I was doing some testing on my webpageprotected by crowdsec and I realized that some bad agents are not working properly, for example, I execute an Sqlmap to my page and the bad-agent scenario only parse logs with the "Sqlmap" agent but the tool created an agent like this "sqlmap/1.6.7#stable (https://sqlmap.org)" and the regular expression don't match the expression due to the capital letter.
What did you expect to happen?
The regular expression for bad agents should not be case-sensitivity.
How can we reproduce it (as minimally and precisely as possible)?
I run a SQLmap v1.6.6 to the webpage, then I copied the logs and changed the agent to capital letter from this:
"sqlmap/1.6.7#stable (https://sqlmap.org)
To this:
"sqlmap/1.6.7#stable (https://Sqlmap.org)
What happened?
I was doing some testing on my webpageprotected by crowdsec and I realized that some bad agents are not working properly, for example, I execute an Sqlmap to my page and the bad-agent scenario only parse logs with the "Sqlmap" agent but the tool created an agent like this "sqlmap/1.6.7#stable (https://sqlmap.org)" and the regular expression don't match the expression due to the capital letter.
What did you expect to happen?
The regular expression for bad agents should not be case-sensitivity.
How can we reproduce it (as minimally and precisely as possible)?
I run a SQLmap v1.6.6 to the webpage, then I copied the logs and changed the agent to capital letter from this: "sqlmap/1.6.7#stable (https://sqlmap.org) To this: "sqlmap/1.6.7#stable (https://Sqlmap.org)
and It works.
Anything else we need to know?
No response
Crowdsec version
OS version
Enabled collections and parsers
Acquisition config
Config show
Prometheus metrics
Related custom configs versions (if applicable) : notification plugins, custom scenarios, parsers etc.