Class CfnWebACL.SqliMatchStatementProperty
A rule statement that inspects for malicious SQL code.
Inheritance
Implements
Namespace: Amazon.CDK.AWS.WAFv2
Assembly: Amazon.CDK.Lib.dll
Syntax (csharp)
public class SqliMatchStatementProperty : Object, CfnWebACL.ISqliMatchStatementProperty
Syntax (vb)
Public Class SqliMatchStatementProperty
Inherits Object
Implements CfnWebACL.ISqliMatchStatementProperty
Remarks
Attackers insert malicious SQL code into web requests to do things like modify your database or extract data from it.
ExampleMetadata: fixture=_generated
Examples
// The code below shows an example of how to instantiate this type.
// The values are placeholders you should change.
using Amazon.CDK.AWS.WAFv2;
var all;
var allQueryArguments;
var method;
var queryString;
var singleHeader;
var singleQueryArgument;
var uriPath;
var sqliMatchStatementProperty = new SqliMatchStatementProperty {
FieldToMatch = new FieldToMatchProperty {
AllQueryArguments = allQueryArguments,
Body = new BodyProperty {
OversizeHandling = "oversizeHandling"
},
Cookies = new CookiesProperty {
MatchPattern = new CookieMatchPatternProperty {
All = all,
ExcludedCookies = new [] { "excludedCookies" },
IncludedCookies = new [] { "includedCookies" }
},
MatchScope = "matchScope",
OversizeHandling = "oversizeHandling"
},
Headers = new HeadersProperty {
MatchPattern = new HeaderMatchPatternProperty {
All = all,
ExcludedHeaders = new [] { "excludedHeaders" },
IncludedHeaders = new [] { "includedHeaders" }
},
MatchScope = "matchScope",
OversizeHandling = "oversizeHandling"
},
Ja3Fingerprint = new JA3FingerprintProperty {
FallbackBehavior = "fallbackBehavior"
},
Ja4Fingerprint = new JA4FingerprintProperty {
FallbackBehavior = "fallbackBehavior"
},
JsonBody = new JsonBodyProperty {
MatchPattern = new JsonMatchPatternProperty {
All = all,
IncludedPaths = new [] { "includedPaths" }
},
MatchScope = "matchScope",
// the properties below are optional
InvalidFallbackBehavior = "invalidFallbackBehavior",
OversizeHandling = "oversizeHandling"
},
Method = method,
QueryString = queryString,
SingleHeader = singleHeader,
SingleQueryArgument = singleQueryArgument,
UriPath = uriPath
},
TextTransformations = new [] { new TextTransformationProperty {
Priority = 123,
Type = "type"
} },
// the properties below are optional
SensitivityLevel = "sensitivityLevel"
};
Synopsis
Constructors
Sqli |
Properties
Field |
The part of the web request that you want AWS WAF to inspect. |
Sensitivity |
The sensitivity that you want AWS WAF to use to inspect for SQL injection attacks. |
Text |
Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass detection. |
Constructors
SqliMatchStatementProperty()
public SqliMatchStatementProperty()
Properties
FieldToMatch
The part of the web request that you want AWS WAF to inspect.
public object FieldToMatch { get; set; }
Property Value
System.
Remarks
SensitivityLevel
The sensitivity that you want AWS WAF to use to inspect for SQL injection attacks.
public string SensitivityLevel { get; set; }
Property Value
System.
Remarks
HIGH
detects more attacks, but might generate more false positives, especially if your web requests frequently contain unusual strings. For information about identifying and mitigating false positives, see Testing and tuning in the AWS WAF Developer Guide .
LOW
is generally a better choice for resources that already have other protections against SQL injection attacks or that have a low tolerance for false positives.
Default: LOW
TextTransformations
Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass detection.
public object TextTransformations { get; set; }
Property Value
System.
Remarks
If you specify one or more transformations in a rule statement, AWS WAF performs all transformations on the content of the request component identified by FieldToMatch
, starting from the lowest priority setting, before inspecting the content for a match.