You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on May 14, 2020. It is now read-only.
The rule 942450 uses "(?i:(?:\A|[^\d])0x[a-f\d]{3,}[a-f\d]*)+" regexp to identify SQL Hex Encoding which is considered as a possible SQL injection atack.
Unfortunately Ethereum addresses (like 0xc2d7cf95645d33006175b78989035c7c9061d3f9 ) and transaction hashes (like 0x653351a883a4a82512dbaceadd9d9ef266658547829a0d30d7aaf26647a144cb ) are also catched by this rule.
Can we make an exception for this hex strings with lenght of 40 and 66 symbols?
The text was updated successfully, but these errors were encountered:
The rule 942450 uses "(?i:(?:\A|[^\d])0x[a-f\d]{3,}[a-f\d]*)+" regexp to identify SQL Hex Encoding which is considered as a possible SQL injection atack.
Unfortunately Ethereum addresses (like 0xc2d7cf95645d33006175b78989035c7c9061d3f9 ) and transaction hashes (like 0x653351a883a4a82512dbaceadd9d9ef266658547829a0d30d7aaf26647a144cb ) are also catched by this rule.
Can we make an exception for this hex strings with lenght of 40 and 66 symbols?
The text was updated successfully, but these errors were encountered: