Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit f47b493

Browse files
committed
Minor update
1 parent 2115fc1 commit f47b493

1 file changed

Lines changed: 3 additions & 2 deletions

File tree

waf/requestvalidationmode.py

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
See the file 'doc/COPYING' for copying permission
66
"""
77

8-
from lib.core.common import randomInt
8+
from lib.core.settings import WAF_ATTACK_VECTORS
99

1010
__product__ = "ASP.NET RequestValidationMode (Microsoft)"
1111

@@ -14,7 +14,8 @@ def detect(get_page):
1414

1515
for vector in WAF_ATTACK_VECTORS:
1616
page, headers, code = get_page(get=vector)
17-
retval = re.search(r"ASP\.NET has detected data in the request that is potentially dangerous", page, re.I) is not None
17+
retval = "ASP.NET has detected data in the request that is potentially dangerous" in page
18+
retval |= "Request Validation has detected a potentially dangerous client input value" in page
1819
if retval:
1920
break
2021

0 commit comments

Comments
 (0)