The problem is that when I try to inject in the database of my OPENCART mod security detects it as an attack and OPENCART works with random token always changes the id to be inserted in mod security
Mod security log attachment
[Tue Apr 04 07:28:21.239112 2017] [:error] [pid 26775:tid 139839557129984] [client 190.206.63.203:56908] [client 190.206.63.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?i:(\\\\!\\\\=|\\\\&\\\\&|\\\\|\\\\||>>|<<|>=|<=|<>|<=>|xor|rlike|regexp|isnull)|(?:not\\\\s+between\\\\s+0\\\\s+and)|(?:is\\\\s+null)|(like\\\\s+null)|(?
?:^|\\\\W)in[+\\\\s]*\\\\([\\\\s\\\\d\\"]+[^()]*\\\\))|(?:xor|<>|rlike(?:\\\\s+binary)?)|(?:regexp\\\\s+binary))" at ARGS:google_analytics_code. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "70"] [id "981319"] [rev "2"] [msg "SQL Injection Attack: SQL Operator Detected"] [data "Matched Data: || found within ARGS:google_analytics_code: <script>\\x0d\\x0a (function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){\\x0d\\x0a (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o),\\x0d\\x0a m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m)\\x0d\\x0a })(window,document,'script','
https://www.google-analytics.com/analytics.js','ga');\\x0d\\x0a\\x0d\\x0a ga('create', 'UA-96537384-1', 'auto');\\x0d\\x0a ga('send', 'pagevi [hostname "
www.solodvdfull.com.ve"] [uri "/tienda/admin/index.php"] [unique_id "WOODVX8AAAEAAGiXuXUAAADA"], referer:
https://www.solodvdfull.com.ve/tienda/admin/index.php?route=extension/analytics/google_analytics&token=iI0zE3kZKqDxfJYyiYIFSqQm8eAVYf39&store_id=0Closed session and returned to open, now see the message that the security token changes again
[Tue Apr 04 07:41:23.639685 2017] [:error] [pid 27577:tid 140466452403968] [client 190.206.63.203:57046] [client 190.206.63.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?i:(\\\\!\\\\=|\\\\&\\\\&|\\\\|\\\\||>>|<<|>=|<=|<>|<=>|xor|rlike|regexp|isnull)|(?:not\\\\s+between\\\\s+0\\\\s+and)|(?:is\\\\s+null)|(like\\\\s+null)|(?
?:^|\\\\W)in[+\\\\s]*\\\\([\\\\s\\\\d\\"]+[^()]*\\\\))|(?:xor|<>|rlike(?:\\\\s+binary)?)|(?:regexp\\\\s+binary))" at ARGS:google_analytics_code. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "70"] [id "981319"] [rev "2"] [msg "SQL Injection Attack: SQL Operator Detected"] [data "Matched Data: || found within ARGS:google_analytics_code: <script>\\x0d\\x0a (function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){\\x0d\\x0a (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o),\\x0d\\x0a m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m)\\x0d\\x0a })(window,document,'script','
https://www.google-analytics.com/analytics.js','ga');\\x0d\\x0a\\x0d\\x0a ga('create', 'UA-96537384-1', 'auto');\\x0d\\x0a ga('send', 'pagevi [hostname "
www.solodvdfull.com.ve"] [uri "/tienda/admin/index.php"] [unique_id "WOOGY38AAAEAAGu5VT4AAABJ"], referer:
https://www.solodvdfull.com.ve/tienda/admin/index.php?route=extension/analytics/google_analytics&token=usqA3PUepbuQwPK5sitsxCLjSRwlqLZN&store_id=0And try to include the user in the
-rw-r--r-- 1 root root 40 Apr 4 07:41 /usr/local/apache/userdata/solodvdf/solodvdfull.com.ve/modsec.conf
and nothing