You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We have implemented a Azure WAF around the installation of this accelerator , and have the default OWASP managed rule set implemented . We get hundreds of failures when users use this application , it is unsafe .
Can you look at fixing this code , so it can be used without fear of SQL Injection ?
QUEST-942-APPLICATION-ATTACK-SQLI.conf
Pattern match (?i:(?:\A|[^\d])0x[a-f\d]{3,}) at REQUEST_COOKIES.
REQUEST-942-APPLICATION-ATTACK-SQLI
REQUEST-949-BLOCKING-EVALUATION.conf
Missing User Agent Header
Thanks
The text was updated successfully, but these errors were encountered:
We have implemented a Azure WAF around the installation of this accelerator , and have the default OWASP managed rule set implemented . We get hundreds of failures when users use this application , it is unsafe .
Can you look at fixing this code , so it can be used without fear of SQL Injection ?
Thanks
The text was updated successfully, but these errors were encountered: