Minor patching of logics in WAF scripts

This commit is contained in:
Miroslav Stampar
2019-04-16 13:37:02 +02:00
parent faf154d2b3
commit 9043d9dd05
77 changed files with 96 additions and 80 deletions

View File

@@ -14,7 +14,7 @@ def detect(get_page):
for vector in WAF_ATTACK_VECTORS:
page, _, code = get_page(get=vector)
retval = "ASP.NET has detected data in the request that is potentially dangerous" in (page or "")
retval |= "ASP.NET has detected data in the request that is potentially dangerous" in (page or "")
retval |= "Request Validation has detected a potentially dangerous client input value" in (page or "")
retval |= code == 500 and "HttpRequestValidationException" in page
if retval: