ModSecurity
ModSecurity copied to clipboard
ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. It has a robust event-based programming language which provides protection from a range o...
Currently, all XML parser errors are written to stderr, which in case of Apache means that the messages end up randomly in error_log, unformatted. This pull request adds custom XML...
PR for [issue 533](https://github.com/SpiderLabs/ModSecurity/issues/533)
Regex in setvar variables https://github.com/SpiderLabs/ModSecurity/issues/2927
Allow multiple digits in sanitizeMatchedBytes
Fixes https://github.com/SpiderLabs/ModSecurity/issues/2970
`REQUEST_URI` variable content goes automatically through a URL decoding transformation process: https://github.com/SpiderLabs/ModSecurity/blob/5b094c0ce9044044f740e135df2a60c5f0858d4d/src/transaction.cc#L466 Internally the transformation is based on the `HEX2DEC` array mapping. https://github.com/SpiderLabs/ModSecurity/blob/5b094c0ce9044044f740e135df2a60c5f0858d4d/src/utils/string.h#L34-L55 `HEX2DEC` array returns `(char)-1` when the conversion...
Currently `REQUEST_FILENAME` variable includes the domain name from the URL while according to the documentation this is not the expected behaviour. The details of the existing bug can be found...