Hey people, I'm using drupal and I created a list of IPs to access it using this rule:
# This rule was created to allow a list of IPs in a file to access /update.php SecRule REQUEST_URI "^/update.php" id:1,phase:1,chain,nolog,t:none,allow,setvar:tx.remote_addr=/%{REMOTE_ADDR}/ SecRule TX:REMOTE_ADDR "@pmFromFile /etc/httpd/conf.d/modsecurity/base_rules/Allowed_to_run_update_php" t:none,ctl:ruleEngine=off # to access /user interface SecRule REQUEST_URI "^/user" id:2,phase:1,chain,nolog,t:none,allow,setvar:tx.remote_add=/%{REMOTE_ADD}/ SecRule TX:REMOTE_ADD "@pmFromFile /etc/httpd/conf.d/modsecurity/base_rules/Allowed_to_run_admin" t:none,ctl:ruleEngine=off when I try to access /user and log am receiving the error below: [19/Sep/2012:14:40:36 --0300] [ 10.1.125.204/sid#228f4e8][rid#35c23f0][/user][1] Access denied with code 403 (phase 2). Pattern match "(/\\*!?|\\*/|[';]--|--[\\s\\r\\n\\v\\f]|(?:--[^-]*?-)|([^\\-&])#.*?[\\s\\r\\n\\v\\f]|;?\\x00)" at ARGS:pass. [file "/etc/httpd/conf.d/modsecurity/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "49"] [id "981231"] [rev "2.2.5"] [msg "SQL Comment Sequence Detected."] [data "--Ancine-"] [tag "WEB_ATTACK/SQL_INJECTION"] [tag "WASCTC/WASC-19"] [tag "OWASP_TOP_10/A1"] [tag "OWASP_AppSensor/CIE1"] [tag "PCI/6.5.2"] [19/Sep/2012:14:40:39 --0300] [ 10.1.125.204/sid#228f4e8][rid#35c23f0][/user][1] Access denied with code 501 (phase 2). Pattern match "^(?:ht|f)tps?:\\/\\/(\\d{1,3}\\.\\d{1,3}\\.\\d{1,3}\\.\\d{1,3})" at ARGS:pass. [file "/etc/httpd/conf.d/modsecurity/base_rules/modsecurity_crs_40_generic_attacks.conf"] [line "142"] [id "950117"] [rev "2.2.5"] [msg "Remote File Inclusion Attack"] [severity "CRITICAL"] [tag "WEB_ATTACK/RFI"] [19/Sep/2012:14:40:46 --0300] [ 10.1.125.204/sid#228f4e8][rid#35c23f0][/user][1] Access denied with code 501 (phase 2). Pattern match "^(?:ht|f)tps?:\\/\\/(\\d{1,3}\\.\\d{1,3}\\.\\d{1,3}\\.\\d{1,3})" at ARGS:pass. [file "/etc/httpd/conf.d/modsecurity/base_rules/modsecurity_crs_40_generic_attacks.conf"] [line "142"] [id "950117"] [rev "2.2.5"] [msg "Remote File Inclusion Attack"] [severity "CRITICAL"] [tag "WEB_ATTACK/RFI"] in the exception files I'm doing this: /10.1.125.204/ what is wrong ? many thanks!
_______________________________________________ Owasp-modsecurity-core-rule-set mailing list Owasp-modsecurity-core-rule-set@lists.owasp.org https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set