This repository was archived by the owner on May 14, 2020. It is now read-only.
File tree Expand file tree Collapse file tree 1 file changed +3
-2
lines changed Expand file tree Collapse file tree 1 file changed +3
-2
lines changed Original file line number Diff line number Diff line change @@ -1484,8 +1484,8 @@ SecRule REQUEST_HEADERS|!REQUEST_HEADERS:User-Agent|!REQUEST_HEADERS:Referer|!RE
1484
1484
# a bit different though, as \t is a natural escape for the TAB character,
1485
1485
# so we will avoid this (and \n, \r, etc.).
1486
1486
#
1487
- # This rule aims to detect non-necessary, abnormal esacpes . You could say it is
1488
- # a nice # way to forbid the backslash character where it is not needed.
1487
+ # This rule aims to detect non-necessary, abnormal escapes . You could say it is
1488
+ # a nice way to forbid the backslash character where it is not needed.
1489
1489
#
1490
1490
# This is a new rule at paranoia level 4. We expect quite a few false positives
1491
1491
# for this rule and we will later evaluate if the rule makes any sense at all.
@@ -1511,6 +1511,7 @@ SecRule REQUEST_URI|REQUEST_HEADERS|ARGS|ARGS_NAMES "(?<!\Q\\\E)\Q\\\E[cdeghijkl
1511
1511
ver:'OWASP_CRS/3.0.0',\
1512
1512
block,\
1513
1513
log,\
1514
+ msg:'Abnormal character escapes in request',\
1514
1515
severity:'CRITICAL',\
1515
1516
capture,\
1516
1517
tag:'application-multi',\
You can’t perform that action at this time.
0 commit comments