Because nobody’s perfect and coding while drunk is dangerous !
As stated on the project’s homepage, you can send me an email directly. Or, you can use the issues
Naxsi does not suppress/decode incorrectly url-encoded characters. On the other hand, IIS/ASP will treat “s%e%l%e%c%t” as “select”, while naxsi will still see it as “s%e%l%e%c%t”, thus rendering SQL keywords rule ineffective. Only the SQL-keywords rule is affected, thus the exploitation window is limited to quote-less, two-fields (max) SQL injections.
Local includes in nx_extract are not properly filtered, allowing a remote attacker to disclose files local to nx_extract. More details https://code.google.com/p/naxsi/source/detail?r=307
Ironically, an SQL Injection is present in naxsi’s new python learning daemon (nx_intercept.py). The vulnerability is rated as low, as:
if md5 is not None and ip is not None:
cursor.execute("INSERT INTO http_monitor (peer_ip, md5) VALUES ('%s', '%s')" % (ip, md5))
return