What CRS version are you using?
How do you have the SecRuleEngine configured?  Unless it is set to On, you
can't rely upon returned status codes for detection.
How have you activated the rules?  Are you sure you have the
modsecurity_crs_41_sql_injection_attacks.conf file activated?

I tested your first payload against the latest CRS version and it
triggered many SQLi alerts -

[Wed Mar 28 08:30:23 2012] [error] [client 127.0.0.1] ModSecurity:
Warning. Pattern match
"(?i:(\\\\!\\\\=|\\\\&\\\\&|\\\\|\\\\||>>|<<|>=|<=|<>|<=>|xor|rlike|regexp|
isnull)|(?:not\\\\s+between\\\\s+0\\\\s+and)|(?:is\\\\s+null)|(like\\\\s+nu
ll)|(?:(?:^|\\\\W)in[+\\\\s]*\\\\([\\\\s\\\\d\\"]+[^()]*\\\\))|(?:xor|<>|rl
ike(?:\\\\s+binary)?)|(?:regexp\\\\s+binary))" at ARGS:id. [file
"/usr/local/apache/conf/crs/base_rules/modsecurity_crs_41_sql_injection_att
acks.conf"] [line "70"] [id "981319"] [rev "2.2.5"] [msg "SQL Injection
Attack: SQL Operator Detected"] [data "REGEXP"] [severity "CRITICAL"] [tag
"WEB_ATTACK/SQL_INJECTION"] [tag "WASCTC/WASC-19"] [tag "OWASP_TOP_10/A1"]
[tag "OWASP_AppSensor/CIE1"] [tag "PCI/6.5.2"] [hostname "localhost"] [uri
"/index.php"] [unique_id "T3MEX8CoqAEAAWNHI4gAAAAE"]
[Wed Mar 28 08:30:23 2012] [error] [client 127.0.0.1] ModSecurity:
Warning. Pattern match
"(?i:(?:m(?:s(?:ysaccessobjects|msysaces|msysobjects|msysqueries|msysrelati
onships|msysaccessstorage|msysaccessxml|msysmodules|msysmodules2|db)|aster\
\\\.\\\\.sysdatabases|ysql\\\\.db)|s(?:ys(?:\\\\.database_name|aux)|chema(?
:\\\\W*\\\\(|_name)|qlite(_temp)?_master ..." at ARGS:id. [file
"/usr/local/apache/conf/crs/base_rules/modsecurity_crs_41_sql_injection_att
acks.conf"] [line "84"] [id "981320"] [rev "2.2.5"] [msg "SQL Injection
Attack: Common DB Names Detected"] [data "information_schema"] [severity
"CRITICAL"] [tag "WEB_ATTACK/SQL_INJECTION"] [tag "WASCTC/WASC-19"] [tag
"OWASP_TOP_10/A1"] [tag "OWASP_AppSensor/CIE1"] [tag "PCI/6.5.2"]
[hostname "localhost"] [uri "/index.php"] [unique_id
"T3MEX8CoqAEAAWNHI4gAAAAE"]
[Wed Mar 28 08:30:23 2012] [error] [client 127.0.0.1] ModSecurity:
Warning. Operator GE matched 3 at TX:sqli_select_statement_count. [file
"/usr/local/apache/conf/crs/base_rules/modsecurity_crs_41_sql_injection_att
acks.conf"] [line "108"] [id "981317"] [rev "2.2.5"] [msg "SQL SELECT
Statement Anomaly Detection Alert"] [data "4"] [tag
"WEB_ATTACK/SQL_INJECTION"] [tag "WASCTC/WASC-19"] [tag "OWASP_TOP_10/A1"]
[tag "OWASP_AppSensor/CIE1"] [tag "PCI/6.5.2"] [hostname "localhost"] [uri
"/index.php"] [unique_id "T3MEX8CoqAEAAWNHI4gAAAAE"]
[Wed Mar 28 08:30:23 2012] [error] [client 127.0.0.1] ModSecurity:
Warning. Pattern match
"(?i:(?:\\\\b(?:(?:s(?:ys\\\\.(?:user_(?:(?:t(?:ab(?:_column|le)|rigger)|ob
ject|view)s|c(?:onstraints|atalog))|all_tables|tab)|elect\\\\b.{0,40}\\\\b(
?:substring|users?|ascii))|m(?:sys(?:(?:queri|ac)e|relationship|column|obje
ct)s|ysql\\\\.(db|user))|c(?:onstraint ..." at ARGS:id. [file
"/usr/local/apache/conf/crs/base_rules/modsecurity_crs_41_sql_injection_att
acks.conf"] [line "116"] [id "950007"] [rev "2.2.5"] [msg "Blind SQL
Injection Attack"] [data "table_name"] [severity "CRITICAL"] [tag
"WEB_ATTACK/SQL_INJECTION"] [tag "WASCTC/WASC-19"] [tag "OWASP_TOP_10/A1"]
[tag "OWASP_AppSensor/CIE1"] [tag "PCI/6.5.2"] [hostname "localhost"] [uri
"/index.php"] [unique_id "T3MEX8CoqAEAAWNHI4gAAAAE"]
[Wed Mar 28 08:30:23 2012] [error] [client 127.0.0.1] ModSecurity:
Warning. Pattern match
"(?i:(?:(?:s(?:t(?:d(?:dev(_pop|_samp)?)?|r(?:_to_date|cmp))|u(?:b(?:str(?:
ing(_index)?)?|(?:dat|tim)e)|m)|e(?:c(?:_to_time|ond)|ssion_user)|ys(?:tem_
user|date)|ha(1|2)?|oundex|chema|ig?n|pace|qrt)|i(?:s(null|_(free_lock|ipv4
_compat|ipv4_mapped|ipv4|ipv ..." at ARGS:id. [file
"/usr/local/apache/conf/crs/base_rules/modsecurity_crs_41_sql_injection_att
acks.conf"] [line "125"] [id "950001"] [rev "2.2.5"] [msg "SQL Injection
Attack"] [data "SELECT 1 FROM information_schema.tables WHERE"] [severity
"CRITICAL"] [tag "WEB_ATTACK/SQL_INJECTION"] [tag "WASCTC/WASC-19"] [tag
"OWASP_TOP_10/A1"] [tag "OWASP_AppSensor/CIE1"] [tag "PCI/6.5.2"]
[hostname "localhost"] [uri "/index.php"] [unique_id
"T3MEX8CoqAEAAWNHI4gAAAAE"]
[Wed Mar 28 08:30:23 2012] [error] [client 127.0.0.1] ModSecurity:
Warning. Pattern match
"\\\\b(?i:having)\\\\b\\\\s+(\\\\d{1,10}|'[^=]{1,10}')\\\\s*[=<>]|(?i:\\\\b
execute(\\\\s{1,5}[\\\\w\\\\.$]{1,5}\\\\s{0,3})?\\\\()|\\\\bhaving\\\\b
?(?:\\\\d{1,10}|[\\\\'\\"][^=]{1,10}[\\\\'\\"])
?[=<>]+|(?i:\\\\bcreate\\\\s+?table.{0,20}?\\\\()|(?i:\\\\blike\\\\W*?char\
\\\W*?\\\\()|(?i:(?:(select(.*) ..." at ARGS:id. [file
"/usr/local/apache/conf/crs/base_rules/modsecurity_crs_41_sql_injection_att
acks.conf"] [line "131"] [id "959070"] [rev "2.2.5"] [msg "SQL Injection
Attack"] [data "FROM information_schema.tables WHERE
TABLE_SCHEMA=\\x22blind_sqli\\x22 AND table_name REGEXP '^[a-z]' LIMIT"]
[severity "CRITICAL"] [tag "WEB_ATTACK/SQL_INJECTION"] [tag
"WASCTC/WASC-19"] [tag "OWASP_TOP_10/A1"] [tag "OWASP_AppSensor/CIE1"]
[tag "PCI/6.5.2"] [hostname "localhost"] [uri "/index.php"] [unique_id
"T3MEX8CoqAEAAWNHI4gAAAAE"]
[Wed Mar 28 08:30:23 2012] [error] [client 127.0.0.1] ModSecurity:
Warning. Pattern match
"(?i)\\\\b(?i:and)\\\\b\\\\s+(\\\\d{1,10}|'[^=]{1,10}')\\\\s*[=]|\\\\b(?i:a
nd)\\\\b\\\\s+(\\\\d{1,10}|'[^=]{1,10}')\\\\s*[<>]|\\\\band\\\\b
?(?:\\\\d{1,10}|[\\\\'\\"][^=]{1,10}[\\\\'\\"])
?[=<>]+|\\\\b(?i:and)\\\\b\\\\s+(\\\\d{1,10}|'[^=]{1,10}')" at ARGS:id.
[file
"/usr/local/apache/conf/crs/base_rules/modsecurity_crs_41_sql_injection_att
acks.conf"] [line "137"] [id "959072"] [rev "2.2.5"] [msg "SQL Injection
Attack"] [data "and 1="] [severity "CRITICAL"] [tag
"WEB_ATTACK/SQL_INJECTION"] [tag "WASCTC/WASC-19"] [tag "OWASP_TOP_10/A1"]
[tag "OWASP_AppSensor/CIE1"] [tag "PCI/6.5.2"] [hostname "localhost"] [uri
"/index.php"] [unique_id "T3MEX8CoqAEAAWNHI4gAAAAE"]
[Wed Mar 28 08:30:23 2012] [error] [client 127.0.0.1] ModSecurity:
Warning. Pattern match
"(?i:(?:(?:s(?:t(?:d(?:dev(_pop|_samp)?)?|r(?:_to_date|cmp))|u(?:b(?:str(?:
ing(_index)?)?|(?:dat|tim)e)|m)|e(?:c(?:_to_time|ond)|ssion_user)|ys(?:tem_
user|date)|ha(1|2)?|oundex|chema|ig?n|pace|qrt)|i(?:s(null|_(free_lock|ipv4
_compat|ipv4_mapped|ipv4|ipv ..." at ARGS:id. [file
"/usr/local/apache/conf/crs/base_rules/modsecurity_crs_41_sql_injection_att
acks.conf"] [line "144"] [id "959073"] [rev "2.2.5"] [msg "SQL Injection
Attack"] [data "SELECT 1 FROM information_schema.tables WHERE"] [severity
"CRITICAL"] [tag "WEB_ATTACK/SQL_INJECTION"] [tag "WASCTC/WASC-19"] [tag
"OWASP_TOP_10/A1"] [tag "OWASP_AppSensor/CIE1"] [tag "PCI/6.5.2"]
[hostname "localhost"] [uri "/index.php"] [unique_id
"T3MEX8CoqAEAAWNHI4gAAAAE"]
[Wed Mar 28 08:30:23 2012] [error] [client 127.0.0.1] ModSecurity:
Warning. Pattern match "\\\\W{4,}" at ARGS:id. [file
"/usr/local/apache/conf/crs/base_rules/modsecurity_crs_41_sql_injection_att
acks.conf"] [line "155"] [id "960024"] [rev "2.2.5"] [msg "SQL Character
Anomaly Detection Alert - Repetative Non-Word Characters"] [data " '^["]
[hostname "localhost"] [uri "/index.php"] [unique_id
"T3MEX8CoqAEAAWNHI4gAAAAE"]
[Wed Mar 28 08:30:23 2012] [error] [client 127.0.0.1] ModSecurity:
Warning. Pattern match
"([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\
\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\
\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*){4,}" at ARGS:id. [file
"/usr/local/apache/conf/crs/base_rules/modsecurity_crs_41_sql_injection_att
acks.conf"] [line "171"] [id "981173"] [rev "2.2.5"] [msg "Restricted SQL
Character Anomaly Detection Alert - Total # of special characters
exceeded"] [data ")"] [hostname "localhost"] [uri "/index.php"] [unique_id
"T3MEX8CoqAEAAWNHI4gAAAAE"]
[Wed Mar 28 08:30:23 2012] [error] [client 127.0.0.1] ModSecurity:
Warning. Pattern match
"(?i:(?:\\\\sexec\\\\s+xp_cmdshell)|(?:[\\"'`\\xc2\\xb4\\xe2\\x80\\x99\\xe2
\\x80\\x98]\\\\s*?!\\\\s*?[\\"'`\\xc2\\xb4\\xe2\\x80\\x99\\xe2\\x80\\x98\\\
\w])|(?:from\\\\W+information_schema\\\\W)|(?:(?:(?:current_)?user|database
|schema|connection_id)\\\\s*?\\\\([^\\\\)]*?)|(?:[\\"'`\\xc2\\xb4\\xe2
..." at ARGS:id. [file
"/usr/local/apache/conf/crs/base_rules/modsecurity_crs_41_sql_injection_att
acks.conf"] [line "219"] [id "981255"] [msg "Detects MSSQL code execution
and information gathering attempts"] [data "FROM information_schema."]
[severity "CRITICAL"] [tag "WEB_ATTACK/SQLI"] [hostname "localhost"] [uri
"/index.php"] [unique_id "T3MEX8CoqAEAAWNHI4gAAAAE"]
[Wed Mar 28 08:30:23 2012] [error] [client 127.0.0.1] ModSecurity:
Warning. Pattern match
"(?i:(?:,.*[)\\\\da-f\\"'`\\xc2\\xb4\\xe2\\x80\\x99\\xe2\\x80\\x98][\\"'`\\
xc2\\xb4\\xe2\\x80\\x99\\xe2\\x80\\x98](?:[\\"'`\\xc2\\xb4\\xe2\\x80\\x99\\
xe2\\x80\\x98].*?[\\"'`\\xc2\\xb4\\xe2\\x80\\x99\\xe2\\x80\\x98]|\\\\Z|[^\\
"'`\\xc2\\xb4\\xe2\\x80\\x99\\xe2\\x80\\x98]+))|(?:\\\\Wselect.+\\\\W*from)
|((?:s ..." at ARGS:id. [file
"/usr/local/apache/conf/crs/base_rules/modsecurity_crs_41_sql_injection_att
acks.conf"] [line "221"] [id "981257"] [msg "Detects MySQL
comment-/space-obfuscated injections and backtick termination"] [data
"(SELECT 1 FROM"] [severity "CRITICAL"] [tag "WEB_ATTACK/SQLI"] [hostname
"localhost"] [uri "/index.php"] [unique_id "T3MEX8CoqAEAAWNHI4gAAAAE"]
[Wed Mar 28 08:30:23 2012] [error] [client 127.0.0.1] ModSecurity:
Warning. Pattern match
"(?i:(?:@.+=\\\\s*?\\\\(\\\\s*?select)|(?:\\\\d+\\\\s*?(x?or|div|like|betwe
en|and)\\\\s*?\\\\d+\\\\s*?[\\\\-+])|(?:\\\\/\\\\w+;?\\\\s+(?:having|and|x?
or|div|like|between|and|select)\\\\W)|(?:\\\\d\\\\s+group\\\\s+by.+\\\\()|(
?:(?:;|#|--)\\\\s*?(?:drop|alter))|(?:(?:;|#|--)\\\\s*?(?:update|i ..." at
ARGS:id. [file
"/usr/local/apache/conf/crs/base_rules/modsecurity_crs_41_sql_injection_att
acks.conf"] [line "223"] [id "981248"] [msg "Detects chained SQL injection
attempts 1/2"] [data "and 1=("] [severity "CRITICAL"] [tag
"WEB_ATTACK/SQLI"] [hostname "localhost"] [uri "/index.php"] [unique_id
"T3MEX8CoqAEAAWNHI4gAAAAE"]
[Wed Mar 28 08:30:23 2012] [error] [client 127.0.0.1] ModSecurity:
Warning. Pattern match
"(?i:(?:union\\\\s*?(?:all|distinct|[(!@]*?)?\\\\s*?[([]*?\\\\s*?select)|(?
:\\\\w+\\\\s+like\\\\s+[\\"'`\\xc2\\xb4\\xe2\\x80\\x99\\xe2\\x80\\x98])|(?:
like\\\\s*?[\\"'`\\xc2\\xb4\\xe2\\x80\\x99\\xe2\\x80\\x98]\\\\%)|(?:[\\"'`\
\xc2\\xb4\\xe2\\x80\\x99\\xe2\\x80\\x98]\\\\s*?like\\\\W*?[\\"'`\\xc2\\xb4\
\xe2 ..." at ARGS:id. [file
"/usr/local/apache/conf/crs/base_rules/modsecurity_crs_41_sql_injection_att
acks.conf"] [line "235"] [id "981245"] [msg "Detects basic SQL
authentication bypass attempts 2/3"] [data "SELECT 1 FROM"] [severity
"CRITICAL"] [tag "WEB_ATTACK/SQLI"] [hostname "localhost"] [uri
"/index.php"] [unique_id "T3MEX8CoqAEAAWNHI4gAAAAE"]
[Wed Mar 28 08:30:23 2012] [error] [client 127.0.0.1] ModSecurity:
Warning. Pattern match
"(?i:(?:[\\"'`\\xc2\\xb4\\xe2\\x80\\x99\\xe2\\x80\\x98]\\\\s*?(x?or|div|lik
e|between|and)\\\\s*?[\\"'`\\xc2\\xb4\\xe2\\x80\\x99\\xe2\\x80\\x98]?\\\\d)
|(?:\\\\\\\\x(?:23|27|3d))|(?:^.?[\\"'`\\xc2\\xb4\\xe2\\x80\\x99\\xe2\\x80\
\x98]$)|(?:(?:^[\\"'`\\xc2\\xb4\\xe2\\x80\\x99\\xe2\\x80\\x98\\\\\\\\]*?(?:
[\\\\ ..." at ARGS:id. [file
"/usr/local/apache/conf/crs/base_rules/modsecurity_crs_41_sql_injection_att
acks.conf"] [line "249"] [id "981242"] [msg "Detects classic SQL injection
probings 1/2"] [data " information_schema"] [severity "CRITICAL"] [tag
"WEB_ATTACK/SQLI"] [hostname "localhost"] [uri "/index.php"] [unique_id
"T3MEX8CoqAEAAWNHI4gAAAAE"]
[Wed Mar 28 08:30:23 2012] [error] [client 127.0.0.1] ModSecurity:
Warning. Pattern match
"(?i:(?:[\\"'`\\xc2\\xb4\\xe2\\x80\\x99\\xe2\\x80\\x98]\\\\s*?\\\\*.+(?:x?o
r|div|like|between|and|id)\\\\W*?[\\"'`\\xc2\\xb4\\xe2\\x80\\x99\\xe2\\x80\
\x98]\\\\d)|(?:\\\\^[\\"'`\\xc2\\xb4\\xe2\\x80\\x99\\xe2\\x80\\x98])|(?:^[\
\\\w\\\\s\\"'`\\xc2\\xb4\\xe2\\x80\\x99\\xe2\\x80\\x98-]+(?<=and\\\\s)(?<=o
r|xor ..." at ARGS:id. [file
"/usr/local/apache/conf/crs/base_rules/modsecurity_crs_41_sql_injection_att
acks.conf"] [line "257"] [id "981243"] [msg "Detects classic SQL injection
probings 2/2"] [data "\\x22 AND table_name REGEXP '^[a-z]' LIMIT 0,1"]
[severity "CRITICAL"] [tag "WEB_ATTACK/SQLI"] [hostname "localhost"] [uri
"/index.php"] [unique_id "T3MEX8CoqAEAAWNHI4gAAAAE"]





On 3/28/12 2:18 AM, "Tzury Bar Yochay" <tzury...@reguluslabs.com> wrote:

>Hi,
>
>below is an output of a small program I wrote to test sites protected
>by modSecurity
>I tried pushing in some SQL injection tests and was surprised to find
>out the following just passed through and not being blocked despite
>having all default rules active)
>
>test failed: GET --
>/index.php?id=1+and+1=(SELECT+1+FROM+information_schema.tables+WHERE+TABLE
>_SCHEMA="blind_sqli"+AND+table_name+REGEXP+'^[a-z]'+LIMIT+0,1)
>{}. Expected: <class 'requests.exceptions.ConnectionError'>, got 200
>instead
>test failed: GET --
>/index.php?id=1+and+1=(SELECT+1+FROM+information_schema.tables++WHERE+TABL
>E_SCHEMA="blind_sqli"+AND+table_name+REGEXP+'^[a-n]'+LIMIT+0,1)
>{}. Expected: <class 'requests.exceptions.ConnectionError'>, got 200
>instead
>test failed: GET --
>/index.php?id=1+and+1=(SELECT+1+FROM+information_schema.tables++WHERE+TABL
>E_SCHEMA="blind_sqli"+AND+table_name+REGEXP+'^[a-g]'+LIMIT+0,1)
>{}. Expected: <class 'requests.exceptions.ConnectionError'>, got 200
>instead
>test failed: GET --
>/index.php?id=1+and+1=(SELECT+1+FROM+information_schema.tables++WHERE+TABL
>E_SCHEMA="blind_sqli"+AND+table_name+REGEXP+'^[h-n]'+LIMIT+0,1)
>{}. Expected: <class 'requests.exceptions.ConnectionError'>, got 200
>instead
>test failed: GET --
>/index.php?id=1+and+1=(SELECT+1+FROM+information_schema.tables++WHERE+TABL
>E_SCHEMA="blind_sqli"+AND+table_name+REGEXP+'^[h-l]'+LIMIT+0,1)
>{}. Expected: <class 'requests.exceptions.ConnectionError'>, got 200
>instead
>test failed: GET --
>/index.php?id=1+and+1=(SELECT+1+FROM+information_schema.tables++WHERE+TABL
>E_SCHEMA="blind_sqli"+AND+table_name+REGEXP+'^m'+LIMIT+0,1)
>{}. Expected: <class 'requests.exceptions.ConnectionError'>, got 200
>instead
>test failed: GET --
>/index.php?id=1+and+1=(SELECT+1+FROM+information_schema.tables++WHERE+TABL
>E_SCHEMA="blind_sqli"+AND+table_name+REGEXP+'^n'+LIMIT+0,1)+
>{}. Expected: <class 'requests.exceptions.ConnectionError'>, got 200
>instead
>test failed: GET --
>/index.php?id=1+and+1=(SELECT+1+FROM+information_schema.tables++WHERE+TABL
>E_SCHEMA="blind_sqli"+AND+table_name+REGEXP+'^n'+LIMIT+1,1)+
>{}. Expected: <class 'requests.exceptions.ConnectionError'>, got 200
>instead
>test failed: GET --
>/default.asp?id=1+AND+1=(SELECT+TOP+1+1+FROM+information_schema.tables+WHE
>RE+TABLE_SCHEMA="blind_sqli"+and+table_name+LIKE+'[a-z]%'+)
>{}. Expected: <class 'requests.exceptions.ConnectionError'>, got 200
>instead
>test failed: GET --
>/default.asp?id=1+AND+1=(SELECT+TOP+1+1+FROM+information_schema.tables+WHE
>RE+TABLE_SCHEMA="blind_sqli"+and+table_name+NOT+IN+(+SELECT+TOP+1+table_na
>me+FROM+information_schema.tables)+and+table_name+LIKE+'[a-z]%'+)
>{}. Expected: <class 'requests.exceptions.ConnectionError'>, got 200
>instead
>test failed: GET --
>/index.php?id=1+and+1=(SELECT+1+FROM+users+WHERE+password+REGEXP+'^[a-f]'+
>AND+ID=1)
>{}. Expected: <class 'requests.exceptions.ConnectionError'>, got 200
>instead
>test failed: GET --
>/index.php?id=1+and+1=(SELECT+1+FROM+users+WHERE+password+REGEXP+'^[0-9]'+
>AND+ID=1)
>{}. Expected: <class 'requests.exceptions.ConnectionError'>, got 200
>instead
>test failed: GET --
>/index.php?id=1+and+1=(SELECT+1+FROM+users+WHERE+password+REGEXP+'^[0-4]'+
>AND+ID=1)
>{}. Expected: <class 'requests.exceptions.ConnectionError'>, got 200
>instead
>test failed: GET --
>/index.php?id=1+and+1=(SELECT+1+FROM+users+WHERE+password+REGEXP+'^[5-9]'+
>AND+ID=1)
>{}. Expected: <class 'requests.exceptions.ConnectionError'>, got 200
>instead
>test failed: GET --
>/index.php?id=1+and+1=(SELECT+1+FROM+users+WHERE+password+REGEXP+'^[5-7]'+
>AND+ID=1)
>{}. Expected: <class 'requests.exceptions.ConnectionError'>, got 200
>instead
>test failed: GET --
>/index.php?id=1+and+1=(SELECT+1+FROM+users+WHERE+password+REGEXP+'^5'+AND+
>ID=1)
>{}. Expected: <class 'requests.exceptions.ConnectionError'>, got 200
>instead
>test failed: GET --
>/default.asp?id=1+AND+1=(SELECT+1+FROM+users+WHERE+password+LIKE+'5[a-f]%'
>+AND+ID=1)
>{}. Expected: <class 'requests.exceptions.ConnectionError'>, got 200
>instead
>test failed: GET --
>/default.asp?id=1+AND+1=(SELECT+1+FROM+users+WHERE+password+LIKE+'5[a-c]%'
>+AND+ID=1)
>{}. Expected: <class 'requests.exceptions.ConnectionError'>, got 200
>instead
>test failed: GET --
>/default.asp?id=1+AND+1=(SELECT+1+FROM+users+WHERE+password+LIKE+'5[d-f]%'
>+AND+ID=1)
>{}. Expected: <class 'requests.exceptions.ConnectionError'>, got 200
>instead
>test failed: GET --
>/default.asp?id=1+AND+1=(SELECT+1+FROM+users+WHERE+password+LIKE+'5[d-e]%'
>+AND+ID=1)
>{}. Expected: <class 'requests.exceptions.ConnectionError'>, got 200
>instead
>test failed: GET --
>/default.asp?id=1+AND+1=(SELECT+1+FROM+users+WHERE+password+LIKE+'5f%'+AND
>+ID=1)
>{}. Expected: <class 'requests.exceptions.ConnectionError'>, got 200
>instead
>test failed: GET --
>/http://example/article.asp?ID=2+union+all+select+name+from+sysobjects
>{}. Expected: <class 'requests.exceptions.ConnectionError'>, got 200
>instead
>test failed: GET -- /article.asp?ID=2'+and+1=1 {}. Expected: <class
>'requests.exceptions.ConnectionError'>, got 200 instead
>test failed: GET -- /article.asp?ID=2'+and+1=0+ {}. Expected: <class
>'requests.exceptions.ConnectionError'>, got 200 instead
>_______________________________________________
>Owasp-modsecurity-core-rule-set mailing list
>Owasp-modsecurity-core-rule-set@lists.owasp.org
>https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set
>


This transmission may contain information that is privileged, confidential, 
and/or exempt from disclosure under applicable law. If you are not the intended 
recipient, you are hereby notified that any disclosure, copying, distribution, 
or use of the information contained herein (including any reliance thereon) is 
STRICTLY PROHIBITED. If you received this transmission in error, please 
immediately contact the sender and destroy the material in its entirety, 
whether in electronic or hard copy format.

_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to