Hi there,

You may want to ask this on the mosecurity-development mailinglist.

In this mailinglist, we are talking about the OWASP ModSecurity Core
Rules.

Good luck!

Christian Folini

On Mon, Feb 22, 2016 at 09:36:43AM +0000, Big Whale wrote:
> Hello,
> 
> i'm having a hard time in finding the function call that actually detect 
> injection payload (e.g <script>alert(1)</script>). The payload does not 
> necessarily need to
> exactly like the one i provided in the brackets. 
> 
> Based on the code flow 
> (https://github.com/SpiderLabs/ModSecurity/blob/libmodsecurity/examples/simple_example_using_c/test.c),
>  the code basically just initiate the rules to the modsecurity instance and 
> also try to initiate remote rules and i don't find any function call that 
> actually does the payload detection, is it already implemented? maybe i 
> missed somewhere. Thanks.
> _______________________________________________
> Owasp-modsecurity-core-rule-set mailing list
> Owasp-modsecurity-core-rule-set@lists.owasp.org
> https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

-- 
mailto:christian.fol...@netnea.com
http://www.christian-folini.ch
twitter: @ChrFolini
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to