Hi,
I would like a little help if possible writing an exception for what
is being tagged as a SQL Injection attempt.
here is the audit log data:
[Wed Aug 13 16:58:59 2014] [error] [client aaa.bbb.ccc.ddd]
ModSecurity: Access denied with code 403 (phase 2). Pattern match
"\\\\b(\\\\d+)
?(?:=|<>|<=>|<|>|!=)
?\\\\1\\\\b|[\\\\'\\"\\\\`\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98](\\\\d+)[\\\\'\\"\\\\`\\\\\\xc2\\x
b4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98] ?(?:=|<>|<=>|<|>|!=)
?[\\\\'\\"\\\\`\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98]\\\\
2\\\\b|[\\\\'\\"\\\\`\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x98 ..." at
ARGS:position[e_statement]. [file "/usr/share/modsecurity-crs/activate
d_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "435"]
[id "950901"] [rev "2.2.0"] [msg "SQL Injection Attack"] [data " a
nd 60"] [severity "CRITICAL"] [hostname "test.example.com"] [uri
"/api/search/posit/509"] [unique_id "U@uZUwoAZa
IAAEDBdrsAAAAG"]
The text in a PUT validated by the web app contains a statement about
some regulations all URL encoded:
The string it is objecting to is in the PUT body here:
CFR+%26sect%3B%26sect%3B+60-1.4(a)%2C+60-300.5(a)+and+60-741.5(a).
My current rule is:
SecRule REQUEST_LINE "PUT /api/search/posit/\d{3}"
"chain,phase:2,t:none,t:compressWhiteSpace,nolog,pass"
SecRule ARGS|REQUEST_BODY "@streq and60"
"nolog,ctl:ruleRemoveById=905901"
Any ideas? please?
Thanks Dan
--
--
[email protected]
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
[email protected]
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set