Something I don't understand. Here is a sample:


--6e7a4c70-E--

--6e7a4c70-H--
Message: Warning. Operator GE matched 5 at TX:anomaly_score. [file "/etc/httpd/owasp-modsecurity-crs-3.0.0/rules/REQUEST-949-BLOCKING-EVALUATION.conf"] [line "57"] [id "949110"] [msg "Inbound Anomaly Score Exceeded (Total Score: 5)"] [severity "CRITICAL"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-generic"] Message: Warning. Operator GE matched 5 at TX:inbound_anomaly_score. [file "/etc/httpd/owasp-modsecurity-crs-3.0.0/rules/RESPONSE-980-CORRELATION.conf"] [line "73"] [id "980130"] [msg "Inbound Anomaly Score Exceeded (Total Inbound Score: 5 - SQLI=0,XSS=5,RFI=0,LFI=0,RCE=0,PHPI=0,HTTP=0,SESS=0):
Engine-Mode: "DETECTION_ONLY"

--6e7a4c70-Z--

I tried to post the entire log entry, but the barracuda that protects this list objected. I'm hoping that cutting down the content will work.

So I know that this is some sort of XSS problem, but no more than that. I checked with our web apps people, and the url parameters are quite legitimate.

What is the underlying rule that triggered this? More importantly, how would I tell?

Finally, how do I turn this off so that the call continues to work once we take ModSecurity out of DETECTION_ONLY?


Thanks

Ed


_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to