You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Describe the bug
The SQL Injection detection rule (sql-injection-attacks) is being triggered erroneously when accessing a simple HTML page containing only a few lines of plain HTML. No SQL keywords, suspicious patterns, or malicious inputs are present in the request or response. This results in a 403 Forbidden response from the WAF, despite the request being entirely benign.
To Reproduce
Steps to reproduce the behavior:
Code sample used was this:
`
<title>Test Page</title>
Welcome to the Test Page
This is a simple page for testing.
`
and rules were default one from rules.json.
Expected behavior
The WAF should not trigger the sql-injection-attacks rule for harmless HTML pages with no SQL-related patterns or suspicious content. The page should load successfully with a 200 OK response.
Screenshots { "level": "warn", "ts": 1737119537.976, "msg": "Request blocked", "source_ip": "myip:55393", "user_agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36", "request_method": "GET", "request_path": "/favicon.ico", "query_params": "", "status_code": 403, "timestamp": "2025/01/22 08:22:17.079", "reason": "Anomaly threshold exceeded", "rule_id": "sql-injection-attacks", "matched_value": "Connection: keep-alive; User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36; Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8; Accept-Encoding: gzip, deflate; Accept-Language: en-GB,en-US;q=0.9,en;q=0.8", "total_score": 10, "anomaly_threshold": 5, "log_id": "d0906951-d242-4194-af9c-d18756bb9981" }
Desktop (please complete the following information):
OS: MacOS
Browser: Chrome
Additional context
Once sql-injection-attacks rule is deleted, XSS rules is triggered and so on.
The text was updated successfully, but these errors were encountered:
Describe the bug
The SQL Injection detection rule (sql-injection-attacks) is being triggered erroneously when accessing a simple HTML page containing only a few lines of plain HTML. No SQL keywords, suspicious patterns, or malicious inputs are present in the request or response. This results in a 403 Forbidden response from the WAF, despite the request being entirely benign.
To Reproduce
Steps to reproduce the behavior:
Code sample used was this:
`
<title>Test Page</title>Welcome to the Test Page
This is a simple page for testing.
`and rules were default one from rules.json.
Expected behavior
The WAF should not trigger the sql-injection-attacks rule for harmless HTML pages with no SQL-related patterns or suspicious content. The page should load successfully with a 200 OK response.
Screenshots
{ "level": "warn", "ts": 1737119537.976, "msg": "Request blocked", "source_ip": "myip:55393", "user_agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36", "request_method": "GET", "request_path": "/favicon.ico", "query_params": "", "status_code": 403, "timestamp": "2025/01/22 08:22:17.079", "reason": "Anomaly threshold exceeded", "rule_id": "sql-injection-attacks", "matched_value": "Connection: keep-alive; User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36; Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8; Accept-Encoding: gzip, deflate; Accept-Language: en-GB,en-US;q=0.9,en;q=0.8", "total_score": 10, "anomaly_threshold": 5, "log_id": "d0906951-d242-4194-af9c-d18756bb9981" }
Desktop (please complete the following information):
Additional context
Once sql-injection-attacks rule is deleted, XSS rules is triggered and so on.
The text was updated successfully, but these errors were encountered: