Hi, I am also annoyed by this bug in the CRS and suprised nobody responded to the two messages explaining the bug.
Is it plan to integrate this in 2.2.7? Or is there a need for a GitHub pull request (even for such a trivial fix)? If this is not fixed upstream, some users (including me) might need to backport this manually, this is really annoying. Many thanks in advance, Damien > Hi Ryan, are you planning to add this little fix to the 2.2.7? That would > really be great! > Thank you! > On Friday, November 9, 2012, rm4dillo D wrote: > Hi, > The "base_rules/modsecurity_crs_41_xss_attacks.conf" rules file starts with a > smart rule that checks the presence of some keywords (Ex. script > javascript...) and depending on the result, it decides to run deeper rules or > just skip them. The problem is that the conditional "skip" never works > because it tests the "pm_xss_score" variable which is not initialized. > SecRule TX:PM_XSS_SCORE "@eq 0" > "phase:2,id:'981018',t:none,pass,skipAfter:END_XSS_CHECK,nolog" > To fix this, I just directive this at the beginning of the file: > SecAction "phase:2,rev:'2.2.5',t:none,pass,nolog,setvar:tx.pm_xss_score=0" > It would be nice to fix this in the next core rule set release. > Thank you in advance. > Rm4dillo _______________________________________________ Owasp-modsecurity-core-rule-set mailing list Owasp-modsecurity-core-rule-set@lists.owasp.org https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set