On Wed, Sep 5, 2012 at 9:14 PM, Leonardo Bacha Abrantes <
leona...@lbasolutions.com> wrote:

> Hi Josh,
>
> Please, help me!
>
> I used the rule below, but it is allowing everyone instead of 192.168.1.10.
>
>
> SecRule REQUEST_URI "^/update.php"
> id:1,phase:1,chain,allow,nolog,t:none,ctl:ruleEngine=off
>    SecRule REMOTE_ADDR "^192\.168\.1\.10$" t:none
>
> I'm looking for the solution in internet, but I didn't find any solution :(
>
>
Hi Leonardo,

When dealing with chained rules, non-disruptive actions are executed as
soon as the rule matches. The ctl action is considered a
non-disruptive action (examples of disruptive actions are: allow, deny.
block etc.). That is why the ruleEngine is disabled anytime ModSecurity
sees a request to /update.php (and the 2nd half of the chain isn't even
considered). Try moving the ctl action to the latter half of your rule,
e.g.:

SecRule REQUEST_URI "^/update.php" id:1,phase:1,chain,allow,nolog,t:none
   SecRule REMOTE_ADDR "^192\.168\.1\.10$" t:none,ctl:ruleEngine=off

--
 - Josh
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to