Kirk,

This is a tricky one. Actually your recipe should work. But then it does
not. I dug a bit deeper and found out an issue.

SecRuleUpdateTargetByID 942000-942999 "ARGS:SearchTerm"

adds the arg SearchTerm to all rules including steering commando rules
used for Paranoia Levels. And this seems to f**k them up. At least this
is my first impression.

Could you try and apply the Update only to those rules that really
apply and report back?

There might be a deeper issue here, so let's try and work together
to find a good recipe to solve your use case - which is actually a very
useful one.

Ahoj,

Christian


On Mon, Aug 14, 2017 at 10:03:15AM +1200, Kirk Jackson wrote:
> Hi,
> 
> I'd like to run the SQLi checks on only the one parameter on my site that
> is vulnerable to those attacks.
> 
> I was wondering if there's a pattern to do this, or if I need to copy the
> rules from REQUEST-942-APPLICATION-ATTACK-SQLI.conf into my own file, and
> change the variables to my ARGS:ParamName?
> 
> I tried doing this, to disable the rules, and then re-enable for just my
> param, but that didn't work:
> 
> SecRuleUpdateTargetByID 942000-942999 "!REQUEST_COOKIES"
> SecRuleUpdateTargetByID 942000-942999 "!REQUEST_COOKIES_NAMES"
> SecRuleUpdateTargetByID 942000-942999 "!ARGS_NAMES"
> SecRuleUpdateTargetByID 942000-942999 "!ARGS"
> SecRuleUpdateTargetByID 942000-942999 "!XML"
> 
> SecRuleUpdateTargetByID 942000-942999 "ARGS:SearchTerm"
> 
> Many thanks!
> 
> Kirk

> _______________________________________________
> Owasp-modsecurity-core-rule-set mailing list
> Owasp-modsecurity-core-rule-set@lists.owasp.org
> https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set


-- 
https://www.feistyduck.com/books/modsecurity-handbook/
mailto:christian.fol...@netnea.com
twitter: @ChrFolini
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to